pentestfunctions / CVE-2025-8088-Multi-DocumentLinks
Exploit systems using older WinRAR without knowing their username (unlike other projects)
☆34Updated 4 months ago
Alternatives and similar repositories for CVE-2025-8088-Multi-Document
Users that are interested in CVE-2025-8088-Multi-Document are comparing it to the libraries listed below
Sorting:
- A collection of PoCs for different injection techniques on Windows!☆48Updated 2 years ago
- A simple website to act as a store for havoc modules and extensions☆28Updated 11 months ago
- Make an Linux Kernel rootkit visible again.☆59Updated 10 months ago
- GenZ Shellcode Generator to execute commands with winExec API☆22Updated 8 months ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 3 years ago
- ☆63Updated last year
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆49Updated last year
- ☆49Updated 2 years ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Updated 4 years ago
- Docker container for running CobaltStrike 4.10☆37Updated last year
- The authentication bypass vulnerability in GitHub Enterprise Server (GHES) allows an unauthorized attacker to access an instance of GHES …☆50Updated last year
- Keycloak admin API allows low privilege users to use administrative functions☆28Updated last year
- ☆20Updated 4 months ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆40Updated 3 years ago
- ☆59Updated last year
- Exploit for Symfony CVE-2024-50340 (forked eos)☆29Updated last year
- A service container for interacting with SRA's VECTR☆14Updated 9 months ago
- 「🚪」Linux Backdoor based on ICMP protocol☆63Updated last year
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆40Updated 2 years ago
- POC for DLL Proxying / Hijacking☆62Updated 7 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆51Updated 2 years ago
- OSED Practice binary☆24Updated 2 years ago
- Brute Ratel LDAP filtering and sorting tool. Easily take BR log output and pull hostnames for ease of use with other red team tooling. Su…☆39Updated 2 years ago
- Universal exploitation tool for CVE-2025-33073 targeting Windows Domain Controllers with DNSAdmins privileges and WinRM enabled.☆63Updated last month
- Backdoor that leverages Nmap with setuid permissions to execute commands as root through a Lua-loaded C library☆52Updated 2 months ago
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 3 years ago
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Updated last year
- ShootCutMe an .LNK file creator tool for redteamer☆15Updated last year
- HashKitty is a user-friendly cross-platform Python wrapper for Hashcat designed to provide an easy password cracking experience for both …☆42Updated last year
- Hunt for C2 servers and phishing web sites using VirusTotal API , you can modify code to kill the malicious process☆73Updated last year