mbanyamer / CVE-2025-30397---Windows-Server-2025-JScript-RCE-Use-After-Free-Links
Remote Code Execution via Use-After-Free in JScript.dll (CVE-2025-30397)
☆69Updated 8 months ago
Alternatives and similar repositories for CVE-2025-30397---Windows-Server-2025-JScript-RCE-Use-After-Free-
Users that are interested in CVE-2025-30397---Windows-Server-2025-JScript-RCE-Use-After-Free- are comparing it to the libraries listed below
Sorting:
- ☆63Updated last year
- ☆26Updated 6 months ago
- POC of GITHUB simple C2 in rust☆52Updated 6 months ago
- ☆59Updated last year
- CVE-2024-30090 - LPE PoC☆108Updated last year
- ☆31Updated last year
- Windows Administrator level Implant.☆50Updated last year
- Work, timer, and wait callback example using solely Native Windows APIs.☆88Updated 2 years ago
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated last year
- .NET tool used to enrich RPC telemetry☆101Updated 2 weeks ago
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆50Updated last year
- POCs for CVE-2025-50154 and CVE-2025-59214, zero day vulnerabilities on windows file explorer disclosing NTLMv2-SSP without user interact…☆52Updated 3 months ago
- Folder Or File Delete to Get System Shell on Current Session Desktop☆47Updated last year
- Early cascade injection PoC based on Outflanks blog post written in Rust☆67Updated last month
- ☆108Updated last year
- in-process powershell runner for BRC4☆48Updated 2 years ago
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆40Updated last year
- A truly Position Independent Code (PIC) NimPlant C2 beacon written in C, without reflective loading.☆66Updated last year
- BOF for C2 framework☆44Updated last year
- ☆59Updated last year
- Docker container for running CobaltStrike 4.10☆38Updated last year
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Updated 2 years ago
- Some of the presentations, workshops, and labs I gave at public conferences.☆34Updated 3 months ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆46Updated last year
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆26Updated last year
- Manage Shadows Copies via the VSS API using C#, C++, Crystal or Python. Working on Windows 11☆80Updated 2 weeks ago
- Enable or Disable TokenPrivilege(s)☆15Updated last year
- This is a GRE PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆94Updated 5 months ago
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Updated 6 years ago
- An improvement and a different approach to Mockingjay Self-Injection.☆35Updated last year