Proof of Concept CVE-2025-21420 (Windows Disk Cleanup Tool EoP)
☆56Jun 12, 2025Updated 10 months ago
Alternatives and similar repositories for CVE-2025-21420_POC
Users that are interested in CVE-2025-21420_POC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE-2025-62215 is an Elevation of Privilege (EoP) vulnerability in the Windows Kernel, disclosed in November 2025 and confirmed to be act…☆32Nov 14, 2025Updated 5 months ago
- THOR APT Scanner User Manual☆20Mar 31, 2026Updated 2 weeks ago
- Tiny Windows executable that outputs version information about the OS.☆11Feb 1, 2026Updated 2 months ago
- 7z exploit POC versions prior to 25.01☆33Aug 11, 2025Updated 8 months ago
- ☆19Jan 31, 2023Updated 3 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆31May 16, 2024Updated last year
- A set of tools and exploits to cause DoS for remote Windows Server & Windows 11 machines☆32Feb 9, 2026Updated 2 months ago
- ☆16Nov 23, 2021Updated 4 years ago
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆13Oct 27, 2023Updated 2 years ago
- Toolset to manipulate RPC clients by finding delayed services and masquerading as them☆110Aug 18, 2025Updated 8 months ago
- phpfuck: using only 5 different characters to write and execute php // (^.9)☆20Nov 26, 2021Updated 4 years ago
- Repo for talk slides & materials☆21Nov 22, 2024Updated last year
- A Reflective Loader for macOS☆148Jul 20, 2025Updated 8 months ago
- RCE on Apache Solr 8.3.1☆42May 6, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ( 0day ) Local Privilege Escalation in IObit Malware Fighter☆172Mar 30, 2025Updated last year
- Bof of RegPwn by MDSec☆117Mar 15, 2026Updated last month
- From C to binary shellcode converter.☆56Nov 11, 2025Updated 5 months ago
- Windows AppLocker Driver (appid.sys) LPE☆76Jul 29, 2024Updated last year
- ☆59Jan 17, 2026Updated 3 months ago
- LiveCTF challenges and infrastructure at DEFCON 32 CTF☆23Aug 18, 2025Updated 8 months ago
- A bunch of shenanigans using functions, VEH and more☆37Jun 8, 2025Updated 10 months ago
- ☆28Feb 6, 2024Updated 2 years ago
- ☆54Oct 6, 2025Updated 6 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Proof of concept & details for CVE-2025-21298☆198Jan 20, 2025Updated last year
- This tool is designed to seamlessly convert Postman collections into OpenAPI schemas. This conversion is essential for API security testi…☆12Sep 3, 2024Updated last year
- A BOF to retrieve decryption keys for WhatsApp Desktop and a utility script to decrypt the databases.☆87Mar 2, 2025Updated last year
- Discuz3.x代码注入☆11Jul 14, 2019Updated 6 years ago
- Keycloak admin API allows low privilege users to use administrative functions☆29Oct 12, 2024Updated last year
- POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY☆233Apr 12, 2025Updated last year
- The code I write in my blog☆94Feb 21, 2026Updated last month
- Ivanti EPM AgentPortal RCE Vulnerability☆20Sep 16, 2024Updated last year
- Shellcode Loader Library.☆15Sep 21, 2025Updated 6 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆67Dec 29, 2023Updated 2 years ago
- Claude MCP server to perform analysis on ROADrecon data☆50Mar 30, 2025Updated last year
- A command line tool to interact with Microsoft Graph API☆23May 27, 2024Updated last year
- Leaking kernel addresses from ETW consumers. Requires Administrator privileges.☆92Nov 6, 2025Updated 5 months ago
- This is a PoC code to exploit the IngressNightmare vulnerabilities (CVE-2025-1097, CVE-2025-1098, CVE-2025-24514, and CVE-2025-1974).☆249Mar 26, 2025Updated last year
- Weaponizing DCOM for NTLM Authentication Coercions☆275Jul 1, 2025Updated 9 months ago
- Telegram localStorage Security Vulnerability Proof-of-Concept☆14Aug 18, 2025Updated 8 months ago