CVE-2025-30406 ViewState Exploit PoC
☆89Jul 31, 2025Updated 7 months ago
Alternatives and similar repositories for CVE-2025-30406
Users that are interested in CVE-2025-30406 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Port scanning is crucial in recon, but running it manually on big scopes? Nope. That’s why I made Nmap Bomber a Python script that runs f…☆40Jul 31, 2025Updated 7 months ago
- ☆18Jul 11, 2025Updated 8 months ago
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 9 months ago
- Repro for Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!☆21Aug 25, 2024Updated last year
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆61Feb 4, 2026Updated last month
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆10Nov 2, 2023Updated 2 years ago
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆27Nov 20, 2024Updated last year
- Evasive shellcode loader with indirect syscalls, Thread name-calling allocation, PoolParty injection☆10Feb 26, 2025Updated last year
- 批量生成修改的图标+数字签名+详细说明后的PE文件☆19Aug 20, 2024Updated last year
- XSTREAM<=1.4.17漏洞复现(CVE-2021-39141、CVE-2021-39144、CVE-2021-39150)☆62Aug 25, 2021Updated 4 years ago
- Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from mem…☆71Mar 16, 2026Updated 2 weeks ago
- CVE-2020-1337 a bypass of (PrintDemon) CVE-2020-1048’s patch☆14Aug 11, 2020Updated 5 years ago
- EMQX Dashboard Malicious Plugin leading to RCE☆47Jun 16, 2025Updated 9 months ago
- I was searching for such resource to work as cheat sheet series and guide me through different attack scenarios for API attacks, didn’t f…☆15May 5, 2025Updated 10 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆95Jan 16, 2025Updated last year
- This tool exploits Golden DMSA attack against delegated Managed Service Accounts.☆93Jul 15, 2025Updated 8 months ago
- ☆18Jul 21, 2025Updated 8 months ago
- idea插件,快速生成反序列化中常用的方法,比如setFieldValue、createTemplatesImpl等☆29Oct 2, 2024Updated last year
- Vulnerability analyze☆17Sep 21, 2020Updated 5 years ago
- Hacker Animation Cool Console Kryptographic Sequencer (haccks)☆14Oct 14, 2024Updated last year
- linux ebpf backdoor demo☆12Nov 20, 2024Updated last year
- Extract entire function source code based on giving line number using Javaparser☆21Jul 15, 2025Updated 8 months ago
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆28Jul 21, 2025Updated 8 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- SOCKS5 proxy tool that uses Azure Storage services as a means of communication.☆339Mar 21, 2026Updated last week
- Certipy in Docker☆13Mar 28, 2024Updated 2 years ago
- 一个简易的woodpecker反序列化插件☆44Jun 7, 2024Updated last year
- 利用EFSRPC协议批量探测出网☆67Oct 12, 2023Updated 2 years ago
- 基于多种策略, 对已有 JAR 包中的全限定类名进行变换, 无限生成高度相似的虚假类名☆18Jul 30, 2025Updated 8 months ago
- A Tool that aims to evade av with binary padding☆161Jun 28, 2024Updated last year
- Anonymize your hashcat formatted files for online cracking☆31Oct 27, 2024Updated last year
- Shellcode loader☆102Nov 24, 2024Updated last year
- The following code when compiled in go takes a domain name as an argument and outputs an HTML file with Google Search links for various d…☆17Sep 11, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- BOF template with boflink and mutator kit support☆49Jan 8, 2026Updated 2 months ago
- Enumerate Subdomains Through Google Dorks (Bypassed Page Filter)☆125Jul 1, 2025Updated 8 months ago
- nginx WebShell/内存马,更优雅的nignx backdoor☆324Jan 4, 2024Updated 2 years ago
- Collect infrastructure and permissions data from vCenter and export it as a BloodHound‑compatible graph using Custom Nodes/Edges☆174Aug 13, 2025Updated 7 months ago
- GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city.☆11Nov 24, 2023Updated 2 years ago
- A method of bypassing EDR's active projection DLL's by preventing entry point exection☆24May 10, 2021Updated 4 years ago
- Geoserver综合利用工具☆112Jan 7, 2026Updated 2 months ago