poc for cve-2025-53772
☆47Dec 10, 2025Updated 4 months ago
Alternatives and similar repositories for CVE-2025-53772
Users that are interested in CVE-2025-53772 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- AES Encryption using x86 Assembly (NASM)☆15Jun 15, 2020Updated 5 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- Some V8 n-day exploits that I've written☆55Mar 1, 2026Updated 2 months ago
- A tool for controlling the MoonDrop Dawn Pro DAC/AMP☆25Apr 22, 2026Updated 2 weeks ago
- Execute commands, in/exfiltrate files using your custom RPC Server☆68Jan 13, 2026Updated 3 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Crystal Palace library for proxying Nt API calls via the Threadpool. Updated for call gadgets.☆20Nov 11, 2025Updated 5 months ago
- ☆12Oct 9, 2020Updated 5 years ago
- ☆14Nov 29, 2019Updated 6 years ago
- ☆13Nov 25, 2024Updated last year
- A C# tool for extracting information from SCCM PXE boot media.☆53Jan 14, 2026Updated 3 months ago
- ☆11Apr 23, 2019Updated 7 years ago
- Stop Windows Defender programmatically☆15Jan 17, 2022Updated 4 years ago
- Tool to obtain hash using MS-SNTP for user accounts☆31Jan 22, 2025Updated last year
- Integer overflow in FreeType software, which also affects Chrome☆30Aug 27, 2025Updated 8 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- C++ tool and library for converting .bin files to shellcode in multiple output formats.☆34Aug 18, 2025Updated 8 months ago
- Impacket with --remove-mic-partial☆41Jan 8, 2026Updated 4 months ago
- AntSword 出网探测插件☆22Jul 6, 2022Updated 3 years ago
- A collection of vibe reverse engineered binaries and malware (for educational purposes only)☆41May 1, 2026Updated last week
- shellcode transformation tool for YARA evasion☆61Dec 17, 2025Updated 4 months ago
- client-server tunnel with IP-Spoofing☆224Updated this week
- Security scanner for CVE-2025-55182 - Critical RCE vulnerability in React Server Components. Scan npm/pnpm/yarn lockfiles, Docker imag…☆57Dec 7, 2025Updated 5 months ago
- Cobalt Strike UDC2 implementation that provides an Slack C2 channel☆69Jan 5, 2026Updated 4 months ago
- CVE-2019-1040 with Kerberos delegation☆33Jun 18, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Shellcode antivirus evasion framework☆27Jan 16, 2021Updated 5 years ago
- An alternative to the builtin clipboard feature in Cobalt Strike that adds the capability to enable/disable and dump the clipboard histor…☆109Apr 16, 2026Updated 3 weeks ago
- Encrypted Shellcode Loader Generator☆22Jan 29, 2019Updated 7 years ago
- 记录一下我学习的Win32CPP☆56Aug 5, 2025Updated 9 months ago
- Educational Chrome extensions simulating real-world attacker behavior in the browser. Built for Red Team demos, threat emulation, and adv…☆21Dec 18, 2025Updated 4 months ago
- A small WinRM client designed for interacting with JEA endpoints.☆17Aug 29, 2024Updated last year
- A Windows Remote Administration Tool in Visual Basic with UNC paths☆23Apr 19, 2019Updated 7 years ago
- Post-exploit a compromised etcd, gain persistence and remote shell to nodes.☆92May 7, 2024Updated 2 years ago
- ☆24Oct 31, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- 驱动层拦截web访问源码☆30Apr 2, 2018Updated 8 years ago
- AV/EDR killer using BYOVD technique☆45Sep 27, 2024Updated last year
- ☆15Aug 17, 2023Updated 2 years ago
- ☆28Oct 5, 2020Updated 5 years ago
- Use to perform Microsoft exchange account brute-force.☆73Apr 17, 2021Updated 5 years ago
- Exhaustive search and flexible filtering of Active Directory ACEs.☆78Nov 10, 2025Updated 5 months ago
- Validates priv escalation of AD trusts☆47Apr 1, 2025Updated last year