Proof of Concept CVE-2025-24990 (Agere Systems's driver)
☆55Oct 31, 2025Updated 4 months ago
Alternatives and similar repositories for CVE-2025-24990_POC
Users that are interested in CVE-2025-24990_POC are comparing it to the libraries listed below
Sorting:
- Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75☆39Sep 16, 2025Updated 5 months ago
- Mass Hunting & Exploitation PoC for CVE-2025-55182 & CVE-2025-66478☆38Dec 7, 2025Updated 3 months ago
- Bare Knuckled AV Breaking☆58Aug 30, 2018Updated 7 years ago
- PoC for popping a system shell against the LnvMSRIO.sys driver☆118Oct 6, 2025Updated 5 months ago
- shellcode transformation tool for YARA evasion☆55Dec 17, 2025Updated 2 months ago
- A lightweight tool that injects a custom assembly proxy into a target process to silently bypass ETW scanning by redirecting ETW calls to…☆45Jun 1, 2025Updated 9 months ago
- <?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE html><html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en" xml:lang="en" class=…☆10Jun 13, 2017Updated 8 years ago
- Rust unsafe bindings for Vid API (Hyper-V)☆22Feb 23, 2025Updated last year
- IDA Plugin - GraphSlick☆55Nov 20, 2014Updated 11 years ago
- RProxy LAB is intended solely for educational purposes and authorized security testing with EvilGinx / Modlishka / EvilPuppet e.t.c tools☆54Updated this week
- Minimalistic HTTP(S) client for the NT kernel☆62Dec 1, 2025Updated 3 months ago
- Sample Rust crate used to implement a VBS enclave in Rust☆44Jun 3, 2025Updated 9 months ago
- Linux Shared Library to Shellcode Loader☆84Feb 15, 2026Updated 3 weeks ago
- Python and BOF utilites to the determine EPA enforcement levels of popular NTLM relay targets from the offensive perspective☆166Jan 12, 2026Updated last month
- Windows C++ Implant for Exploration C2☆44Jan 26, 2026Updated last month
- ☆10Sep 11, 2021Updated 4 years ago
- Process Hollowing Packer☆29Sep 5, 2017Updated 8 years ago
- Headless Binary Ninja MCP server — giving AI agents deep reverse-engineering capabilities via 180 tools.☆100Updated this week
- WinRAR 0day CVE-2025-8088 PoC RAR Archive☆45Aug 12, 2025Updated 6 months ago
- sigreturn-oriented programming (SROP) based sleep obfuscation poc for Linux☆66Dec 15, 2025Updated 2 months ago
- NASM Linux x86_64 pure (no deps) shared library (.so), POC for Reflective ELF SO injection☆31Aug 11, 2023Updated 2 years ago
- ☆50Nov 24, 2021Updated 4 years ago
- deobfuscated JS and blobs from https://b27[.]icu, first attempt at using claude☆123Updated this week
- abusing Process Hacker driver to terminate other processes (BYOVD)☆82May 23, 2023Updated 2 years ago
- nmi stackwalking + module verification☆163Dec 28, 2023Updated 2 years ago
- Bypassing UAC with SSPI Datagram Contexts☆462Sep 24, 2023Updated 2 years ago
- HEVD Exploits for fun and learning.☆15Aug 30, 2025Updated 6 months ago
- QRSS Plus: live QRSS grabbers from around the world☆10Feb 9, 2026Updated last month
- ☆10Sep 3, 2021Updated 4 years ago
- BadUSB ile Penetrasyon☆13Jun 15, 2019Updated 6 years ago
- Remote service-staging tool built on Impacket, designed for BOF-style lateral movement workflows that lets you upload custom service load…☆119Dec 7, 2025Updated 3 months ago
- In progress persistent download/upload/execution tool using Windows BITS.☆41Sep 13, 2021Updated 4 years ago
- A simple POC to show how to chain multiple callbacks via tail calls to artificially construct a call stack☆99Dec 22, 2025Updated 2 months ago
- IDA Terminal☆17Feb 27, 2026Updated last week
- Classic DLL injection. Download dll from url and inject. Simple C++ implementation☆10Apr 16, 2022Updated 3 years ago
- 🔍 Bug Bounty Search Engine - Advanced reconnaissance toolkit with 64+ Google dork queries organized into 10 categories for security rese…☆40Oct 6, 2025Updated 5 months ago
- ☆19Updated this week
- Red Teaming utilities that I can open source. Used in various tests and CTFS☆12Aug 19, 2024Updated last year
- poc for cve-2025-53772☆46Dec 10, 2025Updated 2 months ago