mbanyamer / CVE-2025-30397---Windows-Server-2025-JScript-RCE-Use-After-Free-Links
Remote Code Execution via Use-After-Free in JScript.dll (CVE-2025-30397)
☆59Updated last month
Alternatives and similar repositories for CVE-2025-30397---Windows-Server-2025-JScript-RCE-Use-After-Free-
Users that are interested in CVE-2025-30397---Windows-Server-2025-JScript-RCE-Use-After-Free- are comparing it to the libraries listed below
Sorting:
- ☆59Updated last year
- POC of GITHUB simple C2 in rust☆53Updated 5 months ago
- ☆55Updated 8 months ago
- Early cascade injection PoC based on Outflanks blog post written in Rust☆54Updated 5 months ago
- ☆22Updated 4 months ago
- Docker container for running CobaltStrike 4.10☆37Updated 9 months ago
- Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.☆73Updated last week
- .NET tool used to enrich RPC telemetry☆87Updated last month
- Folder Or File Delete to Get System Shell on Current Session Desktop☆44Updated 6 months ago
- Work, timer, and wait callback example using solely Native Windows APIs.☆89Updated last year
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆47Updated 6 months ago
- Situational Awareness script to identify how and where to run implants☆54Updated 7 months ago
- Proof of Concept for CVE-2025-32756 - A critical stack-based buffer overflow vulnerability affecting multiple Fortinet products.☆80Updated last month
- ☆57Updated 8 months ago
- ☆28Updated last year
- Backdooring VSCode Projects☆74Updated last month
- Convert your shellcode into an ASCII string☆94Updated 2 weeks ago
- A proof-of-concept shellcode loader that leverages AI/ML face recognition models to verify the identity of a user on a target system☆39Updated 8 months ago
- CVE-2024-30090 - LPE PoC☆107Updated 9 months ago
- Seamless remote browser session control☆39Updated last week
- ☆29Updated last year
- A truly Position Independent Code (PIC) NimPlant C2 beacon written in C, without reflective loading.☆61Updated 5 months ago
- ☆35Updated last year
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated 11 months ago
- Beacon Object Files (BOF) for Cobalt Strike.☆31Updated 10 months ago
- BOF for C2 framework☆41Updated 8 months ago
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆35Updated 2 months ago
- Proof of Concept Exploit for CVE-2024-9464☆45Updated 9 months ago
- ☆42Updated last year
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆43Updated 11 months ago