Remote Code Execution via Use-After-Free in JScript.dll (CVE-2025-30397)
☆66May 31, 2025Updated 10 months ago
Alternatives and similar repositories for CVE-2025-30397---Windows-Server-2025-JScript-RCE-Use-After-Free-
Users that are interested in CVE-2025-30397---Windows-Server-2025-JScript-RCE-Use-After-Free- are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE-2025-33053 Proof Of Concept (PoC)☆63Jun 17, 2025Updated 9 months ago
- Impacket☆50Feb 25, 2026Updated last month
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- ☆34Apr 14, 2025Updated last year
- A critical RCE vulnerability in Windows TCP/IP stack (CVE-2025-26686) leaves sensitive memory unlocked, allowing remote attackers to hija…☆32Sep 16, 2025Updated 6 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Purple-team telemetry & simulation toolkit.☆114Dec 16, 2025Updated 3 months ago
- Examples of various container types for Python and Golang☆15Aug 29, 2025Updated 7 months ago
- Static binary analysis with Detect It Easy — 100% in your browser, no uploads.☆57Feb 10, 2026Updated 2 months ago
- This is the latest version of XenoRAT, updated with configurations and capable of bypassing all system securities. It will be maintained …☆23Apr 16, 2025Updated 11 months ago
- A Qemu Proxmox Template builder project using Packer☆74Dec 5, 2025Updated 4 months ago
- ☆18Nov 7, 2024Updated last year
- ☆19Nov 26, 2024Updated last year
- Windows usermode rootkit with inline hooking for process/file/registry hiding, indirect syscalls, keylogger, HTTPS C2, dropper, and EDR/A…☆35Jan 22, 2026Updated 2 months ago
- A tool to attack ARP☆15May 27, 2021Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Folder Or File Delete to Get System Shell on Current Session Desktop☆47Jan 14, 2025Updated last year
- Evasive shellcode loader with indirect syscalls, Thread name-calling allocation, PoolParty injection☆10Feb 26, 2025Updated last year
- A Kubernetes Forensic Collection Framework for Azure Kubernetes Service☆41Feb 9, 2026Updated 2 months ago
- A set of tools and exploits to cause DoS for remote Windows Server & Windows 11 machines☆32Feb 9, 2026Updated 2 months ago
- An XNU kernel race condition bug☆48Jan 30, 2025Updated last year
- Plantronics Desktop Hub LPE☆37May 15, 2024Updated last year
- A series of cloud focused KQL queries for threat hunting and DFIR☆12Oct 21, 2025Updated 5 months ago
- Enable or Disable TokenPrivilege(s)☆15May 17, 2024Updated last year
- CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect☆29Apr 17, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Metasploit module for CVE-2025-24071 - Windows NTLM Hash Leak via .library-ms☆25Mar 18, 2025Updated last year
- A fucking real shellcode loader with a GUI. Work-in-Progress.☆82Jun 25, 2025Updated 9 months ago
- Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management☆18Jan 24, 2024Updated 2 years ago
- PowerShell toolkit that extracts locked Windows files (SAM, SYSTEM, NTDS, ...) using MFT parsing and raw disk reads☆249Oct 30, 2025Updated 5 months ago
- A Dockerized build pipeline for custom Windows x64 shellcode☆53Dec 12, 2025Updated 4 months ago
- Phantom Keylogger is an advanced, stealth-enabled keystroke and visual intelligence gathering system.☆76Dec 10, 2025Updated 4 months ago
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆130Dec 2, 2023Updated 2 years ago
- iOS 18.4-18.6.2 userland exploit chain with JS injection into SpringBoard and other processes. Derived from DarkSword.☆42Updated this week
- POC exploit for CVE-2024-49138☆267Feb 14, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- PS3 EncDec emulator☆15Apr 26, 2018Updated 7 years ago
- CVE-2023-21823 PoC☆14Apr 20, 2023Updated 2 years ago
- ☆19Jan 31, 2023Updated 3 years ago
- Permanently disable EDRs as local admin☆129Dec 19, 2025Updated 3 months ago
- A simple UEFI bootkit made by @NSG650 and me.☆26Dec 29, 2024Updated last year
- PoC for CVE-2025-22457 - A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Pulse Connect Secure, Ivan…☆72Apr 25, 2025Updated 11 months ago
- ☆64Jan 22, 2026Updated 2 months ago