rubenformation / CVE-2025-50154Links
POCs for CVE-2025-50154 and CVE-2025-59214, zero day vulnerabilities on windows file explorer disclosing NTLMv2-SSP without user interaction. It is a bypass for the CVE-2025-24054 Security Patch
☆35Updated last week
Alternatives and similar repositories for CVE-2025-50154
Users that are interested in CVE-2025-50154 are comparing it to the libraries listed below
Sorting:
- ☆57Updated 8 months ago
- PowerShell Implementation of ADFSDump to assist with GoldenSAML☆37Updated 6 months ago
- Pure PowerShell port of PassTheCert tool to authenticate to an LDAP/S server with a certificate through Schannel☆47Updated 6 months ago
- rust port of pspy with support for process monitoring over dbus☆35Updated 4 months ago
- ☆49Updated 6 months ago
- Source code and examples for PassiveAggression☆63Updated last year
- A python script that automates a C2 Profile build☆48Updated last month
- ☆51Updated 11 months ago
- ☆41Updated 8 months ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆40Updated 10 months ago
- Your Skyfall Infrastructure Pack☆77Updated last week
- A Python script for creating `.lnk` (shortcut) files with embedded encoded data and packaging them into ZIP archives.☆88Updated 9 months ago
- This technique leverages PowerShell's .NET interop layer and COM automation to achieve stealthy command execution by abusing implicit typ…☆51Updated 5 months ago
- ☆41Updated last year
- Sniffing files generator☆59Updated 8 months ago
- tool for requesting Entra ID's P2P certificate and authenticating to a remote Entra joinned devices with it☆124Updated 2 months ago
- Demo code JavaScript POC that tricks user into sending Windows hash to responder☆35Updated 4 months ago
- ☆148Updated 5 months ago
- Blog/Journal on how to backdoor VSCode extensions☆74Updated 3 months ago
- Extract registry and NTDS secrets from local or remote disk images☆43Updated 7 months ago
- GetSystem-LCI is a PowerShell script to escalate privileges from Administrator to NT AUTHORITY\SYSTEM by abusing LanguageComponentsInstal…☆34Updated 11 months ago
- time-based user enum via Basic Auth in Azure against Autodiscover☆33Updated last year
- TokenCert☆100Updated 11 months ago
- SCEP request tool for AD CS and Intune☆69Updated this week
- Client-side Encrypted Upload Server Python Script☆64Updated 3 months ago
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆81Updated 3 months ago
- Python3 rewrite of AsOutsider features of AADInternals☆55Updated 3 months ago
- The DCERPC only printerbug.py version☆84Updated this week
- Tool to enumerate privileged Scheduled Tasks on Remote Systems☆86Updated this week
- Custom Amsi Bypass by patching AmsiOpenSession function in amsi.dll☆43Updated 4 months ago