mbanyamer / CVE-2025-30397---Windows-Server-2025-JScript-RCE-Use-After-Free-Links
Remote Code Execution via Use-After-Free in JScript.dll (CVE-2025-30397)
☆35Updated this week
Alternatives and similar repositories for CVE-2025-30397---Windows-Server-2025-JScript-RCE-Use-After-Free-
Users that are interested in CVE-2025-30397---Windows-Server-2025-JScript-RCE-Use-After-Free- are comparing it to the libraries listed below
Sorting:
- ☆22Updated 2 months ago
- A simple rpc2socks alternative in pure Go.☆28Updated 10 months ago
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆32Updated last year
- powershell script i wrote that can suspend an arbitrary process (with limits)☆20Updated 2 years ago
- ☆18Updated 7 months ago
- Docker container for running CobaltStrike 4.10☆37Updated 8 months ago
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆32Updated last month
- ☆48Updated 2 years ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆33Updated 2 years ago
- A Dynamic MSBuild task to help with minor obfuscation of C# Binaries to evade static signatures on each compilation☆36Updated last month
- Folder Or File Delete to Get System Shell on Current Session Desktop☆39Updated 4 months ago
- Tools for Attacking Pleasant Password Server☆22Updated last year
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆42Updated 10 months ago
- Exploit for Arbitrary File Move vulnerability in ZoneAlarm AV☆26Updated 2 years ago
- BOF for C2 framework☆41Updated 6 months ago
- Giga-byte Control Center (GCC) is a software package designed for improved user experience of Gigabyte hardware, often found in gaming an…☆31Updated 2 years ago
- Aggressor script to automatically download and load an arsenal of open source and private Cobalt Strike tooling.☆25Updated 9 months ago
- OSED Practice binary☆24Updated last year
- This is the latest version of XenoRAT, updated with configurations and capable of bypassing all system securities. It will be maintained …☆13Updated last month
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆41Updated last year
- .NET port of Leron Gray's azbelt tool.☆26Updated last year
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆22Updated 4 months ago
- Unix Process hollowing in rust☆22Updated 5 months ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆31Updated last year
- Slides and POC demo for my talk at Divizion Zero on EDR evasion titled "Evasion Adventures"☆26Updated 2 years ago
- DFSCoerce exe revisited version with custom authentication☆40Updated last year
- ☆19Updated last year
- A simple C++ Windows tool to get information about processes exposing named pipes.☆37Updated 2 months ago
- ☆26Updated 2 years ago