mbanyamer / CVE-2025-30397---Windows-Server-2025-JScript-RCE-Use-After-Free-Links
Remote Code Execution via Use-After-Free in JScript.dll (CVE-2025-30397)
☆68Updated 7 months ago
Alternatives and similar repositories for CVE-2025-30397---Windows-Server-2025-JScript-RCE-Use-After-Free-
Users that are interested in CVE-2025-30397---Windows-Server-2025-JScript-RCE-Use-After-Free- are comparing it to the libraries listed below
Sorting:
- POC of GITHUB simple C2 in rust☆52Updated 5 months ago
- ☆26Updated 5 months ago
- Work, timer, and wait callback example using solely Native Windows APIs.☆88Updated last year
- .NET tool used to enrich RPC telemetry☆101Updated 7 months ago
- Adaptive DLL hijacking / dynamic export forwarding - EAT preserve☆78Updated last year
- ☆59Updated last year
- ☆63Updated last year
- Gain insights into COM/DCOM implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By…☆154Updated last month
- Folder Or File Delete to Get System Shell on Current Session Desktop☆47Updated last year
- CVE-2024-30090 - LPE PoC☆107Updated last year
- ☆108Updated last year
- Windows AppLocker Driver (appid.sys) LPE☆71Updated last year
- ☆31Updated last year
- Execute shellcode via ASPNET compiler☆60Updated 3 months ago
- ☆59Updated last year
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆46Updated last year
- EvtPsst☆55Updated 2 years ago
- Docker container for running CobaltStrike 4.10☆37Updated last year
- Windows Administrator level Implant.☆50Updated last year
- PoC for CVE-2023-36802 Microsoft Kernel Streaming Service Proxy☆36Updated 2 years ago
- This repo contains PoCs for vulnerable Windows drivers.☆88Updated last month
- ☆36Updated 2 years ago
- Early cascade injection PoC based on Outflanks blog post written in Rust☆67Updated 3 weeks ago
- in-process powershell runner for BRC4☆48Updated 2 years ago
- Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C☆39Updated 6 years ago
- A simple C++ Windows tool to get information about processes exposing named pipes.☆40Updated 10 months ago
- Detection of indirect syscall techniques using hardware breakpoints and vectored exception handling.☆50Updated 3 months ago
- Convert your shellcode into an ASCII string☆124Updated 6 months ago
- DLL Unlinking from InLoadOrderModuleList, InMemoryOrderModuleList, InInitializationOrderModuleList, and LdrpHashTable☆58Updated 2 years ago
- Experimental PoC for unhooking API functions using in-memory patching, without VirtualProtect, for one specific EDR.☆14Updated 2 years ago