Remote Code Execution via Use-After-Free in JScript.dll (CVE-2025-30397)
☆68May 31, 2025Updated 9 months ago
Alternatives and similar repositories for CVE-2025-30397---Windows-Server-2025-JScript-RCE-Use-After-Free-
Users that are interested in CVE-2025-30397---Windows-Server-2025-JScript-RCE-Use-After-Free- are comparing it to the libraries listed below
Sorting:
- CVE-2025-33053 Proof Of Concept (PoC)☆63Jun 17, 2025Updated 8 months ago
- Impacket☆49Feb 25, 2026Updated last week
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- ☆18Nov 7, 2024Updated last year
- Evasive shellcode loader with indirect syscalls, Thread name-calling allocation, PoolParty injection☆10Feb 26, 2025Updated last year
- A simple research-focused AES-based shellcode loader demonstrating in-memory execution and NTAPI techniques to help understand how custom…☆38Feb 19, 2026Updated last week
- A tool to attack ARP☆15May 27, 2021Updated 4 years ago
- A critical RCE vulnerability in Windows TCP/IP stack (CVE-2025-26686) leaves sensitive memory unlocked, allowing remote attackers to hija…☆32Sep 16, 2025Updated 5 months ago
- A set of tools and exploits to cause DoS for remote Windows Server & Windows 11 machines☆32Feb 9, 2026Updated 3 weeks ago
- ☆34Apr 14, 2025Updated 10 months ago
- A collection of commands, tools, techniques and procedures of the purplestorm ctf team.☆14Mar 20, 2025Updated 11 months ago
- Impacket is a collection of Python classes for working with network protocols.☆13Oct 29, 2022Updated 3 years ago
- Examples of various container types for Python and Golang☆16Aug 29, 2025Updated 6 months ago
- CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect☆30Apr 17, 2024Updated last year
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- ☆19Nov 26, 2024Updated last year
- Plantronics Desktop Hub LPE☆37May 15, 2024Updated last year
- Static binary analysis with Detect It Easy — 100% in your browser, no uploads.☆53Feb 10, 2026Updated 3 weeks ago
- CVE-2023-21823 PoC☆14Apr 20, 2023Updated 2 years ago
- PowerShell toolkit that extracts locked Windows files (SAM, SYSTEM, NTDS, ...) using MFT parsing and raw disk reads☆240Oct 30, 2025Updated 4 months ago
- A Qemu Proxmox Template builder project using Packer☆72Dec 5, 2025Updated 2 months ago
- ☆19Jan 31, 2023Updated 3 years ago
- Permanently disable EDRs as local admin☆127Dec 19, 2025Updated 2 months ago
- POC exploit for CVE-2024-49138☆267Feb 14, 2025Updated last year
- ZYRA: Your Runtime Armor. ZYRA is an Zig-written obfuscator/packer for executable binaries.☆74Aug 5, 2025Updated 6 months ago
- ☆24Feb 21, 2025Updated last year
- This is the latest version of XenoRAT, updated with configurations and capable of bypassing all system securities. It will be maintained …☆23Apr 16, 2025Updated 10 months ago
- Purple-team telemetry & simulation toolkit.☆108Dec 16, 2025Updated 2 months ago
- A serie of exploits targeting eneio64.sys - Turning Physical Memory R/W into Virtual Memory R/W☆116Oct 19, 2025Updated 4 months ago
- Folder Or File Delete to Get System Shell on Current Session Desktop☆47Jan 14, 2025Updated last year
- ☆62Jan 22, 2026Updated last month
- ☆26Aug 11, 2025Updated 6 months ago
- ☆20Nov 8, 2020Updated 5 years ago
- An XNU kernel race condition bug☆47Jan 30, 2025Updated last year
- CVE-2024-40711-exp☆42Oct 17, 2024Updated last year
- ☆44Aug 8, 2022Updated 3 years ago
- A fucking real shellcode loader with a GUI. Work-in-Progress.☆82Jun 25, 2025Updated 8 months ago
- Windows Win32 Kernel Subsystem☆36Aug 23, 2025Updated 6 months ago
- A Kubernetes Forensic Collection Framework for Azure Kubernetes Service☆41Feb 9, 2026Updated 3 weeks ago