Kernel Information Disclosure
☆32Jan 13, 2026Updated last month
Alternatives and similar repositories for CVE-2025-53136
Users that are interested in CVE-2025-53136 are comparing it to the libraries listed below
Sorting:
- Windows Win32 Kernel Subsystem☆36Aug 23, 2025Updated 6 months ago
- ☆41Mar 12, 2025Updated 11 months ago
- Reports and POCs for CVE 2024-43570 and CVE-2024-43535☆29Jun 7, 2025Updated 8 months ago
- Accelerated execution for fast Windows fuzzing☆25Jan 9, 2025Updated last year
- ☆21Apr 6, 2025Updated 11 months ago
- By manipulating LSASS memory flags like UseLogonCredential and IsCredGuardEnabled, this repo demonstrates how Credential Guard can be byp…☆14May 25, 2025Updated 9 months ago
- Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)☆31Jan 18, 2025Updated last year
- ☆28Jan 10, 2024Updated 2 years ago
- My browser pwn collections. Mainly JavaScript engine stuff.☆33Jan 27, 2025Updated last year
- HvLoader.efi is an EFI application for loading an external hypervisor loader☆66Jun 12, 2023Updated 2 years ago
- ☆38Jan 6, 2025Updated last year
- Windows KASLR bypass using prefetch side-channel☆178Apr 26, 2024Updated last year
- ☆82Aug 30, 2024Updated last year
- Slides from Off-By-One Conferences☆33Sep 9, 2024Updated last year
- ☆39Dec 10, 2024Updated last year
- Easy-to-use IDA plugin for code emulation☆54Nov 29, 2025Updated 3 months ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- black Ip lists, dorks-collection☆16Updated this week
- 用於 Java, Design Pattern 的教育學習專案,包含一些 demo code。☆10Nov 29, 2017Updated 8 years ago
- 安全API接口测试Demo,围绕时间戳,ticket,签名三个参数☆12Jan 5, 2021Updated 5 years ago
- A large collection of blogs 🦐☆13Apr 12, 2025Updated 10 months ago
- 基金管理系统后台代码☆10Jul 3, 2017Updated 8 years ago
- CVE-2024-40711-exp☆42Oct 17, 2024Updated last year
- PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Iv…☆49Jan 16, 2025Updated last year
- A lightweight tool that injects a custom assembly proxy into a target process to silently bypass AMSI scanning by redirecting AmsiScanBuf…☆62May 16, 2025Updated 9 months ago
- Orsted C2 Framework☆114Feb 9, 2026Updated 3 weeks ago
- ☆10Apr 13, 2025Updated 10 months ago
- A C# implementation that disables Windows Firewall bypassing UAC☆17Oct 23, 2024Updated last year
- Find unicode codepoints to use in normalisation and transformation attacks.☆11Mar 15, 2021Updated 4 years ago
- ☆12Mar 15, 2020Updated 5 years ago
- 一個關於資訊社群的集散地☆13Sep 17, 2023Updated 2 years ago
- Proof of concept & details for CVE-2025-21298☆195Jan 20, 2025Updated last year
- Hands-on challenges for learning how to reverse engineer Flutter applications.☆39Jan 31, 2026Updated last month
- CVE-2025-64155: Fortinet FortiSIEM Argument Injection to Remote Code Execution☆31Jan 13, 2026Updated last month
- Leveraging TPM2 TCG Logs (Measured Boot) to Detect UEFI Drivers and Pre-Boot Applications☆22Mar 28, 2025Updated 11 months ago
- A mix of learning resources, my notes and mostly ctf writeup of sandbox escape challenges☆10Jun 6, 2023Updated 2 years ago
- This program implements a nondeterministic Turing machine simulator in C.☆24Oct 14, 2018Updated 7 years ago
- MuddyWater C2 framework research☆12Jun 28, 2023Updated 2 years ago
- CLI version of NetworkMiner (https://www.netresec.com/?page=NetworkMiner)☆13Dec 1, 2025Updated 3 months ago