killvxk / CVE-2024-38193-NephsterLinks
☆59Updated 10 months ago
Alternatives and similar repositories for CVE-2024-38193-Nephster
Users that are interested in CVE-2024-38193-Nephster are comparing it to the libraries listed below
Sorting:
- WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler☆128Updated 2 months ago
- Windows LPE☆130Updated last year
- Exploit for CVE-2023-36802 targeting MSKSSRV.SYS driver☆112Updated last year
- Write-up for another forgotten Windows vulnerability (0day): Microsoft Windows Contacts (VCF/Contact/LDAP) syslink control href attribute…☆155Updated 2 years ago
- ☆136Updated last year
- ☆244Updated 2 years ago
- ☆141Updated 6 months ago
- A Tool that aims to evade av with binary padding☆155Updated last year
- ☆58Updated last year
- This repository contains a proof-of-concept exploit written in C++ that demonstrates the exploitation of a vulnerability affecting the Wi…☆77Updated last year
- PoC for CVE-2025-22457☆69Updated 5 months ago
- LPE exploit for CVE-2023-36802☆164Updated last year
- SharpSilentChrome is a C# project that "silently" installs browser extensions on Google Chrome or MS Edge by updating the browsers' Prefe…☆176Updated last month
- Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE☆205Updated 2 years ago
- CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overfl…☆49Updated 8 months ago
- Exploit for CVE-2024-29847☆18Updated last year
- Positional Independent Code to extract clear text password from mstsc.exe using API Hooking via HWBP.☆247Updated last year
- TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.☆135Updated 9 months ago
- lazy way to create CVE-2023-38831 winrar file for testing☆93Updated 2 years ago
- Fuegoshell is a powershell oneliner generator for Windows remote shell re-using TCP 445☆54Updated last year
- ☆57Updated last year
- 一款基于James Forshaw的.NET Remoting反序列化工具升级版在TypeFilterLevel.Low模式无文件payload任意代码执行poc的开发心得☆48Updated 8 months ago
- frida based script which automates the process of discovering and exploiting DLL Hijacks in target binaries. The discovered binaries can …☆53Updated 2 years ago
- Just a simple silly PoC demonstrating executable "exe" file that can be used like exe, dll or shellcode...☆159Updated last year
- ☆100Updated last year
- C2 redirector base on caddy☆208Updated last year
- Palo Alto Networks PAN-OS 身份验证绕过漏洞批量检测脚本(CVE-2025-0108)☆30Updated 6 months ago
- Go implementation of the self-deletion of an running executable from disk☆112Updated 2 years ago
- A simple Sleepmask BOF example☆136Updated 3 months ago
- Homemade Aggressor scripts kit for Cobalt Strike☆79Updated 2 months ago