CVE-2025-1974
☆90Apr 2, 2025Updated 11 months ago
Alternatives and similar repositories for IngressNightmare-POCs
Users that are interested in IngressNightmare-POCs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆53Mar 25, 2025Updated last year
- This is a PoC code to exploit the IngressNightmare vulnerabilities (CVE-2025-1097, CVE-2025-1098, CVE-2025-24514, and CVE-2025-1974).☆248Mar 26, 2025Updated last year
- Proof of Concept Exploit for CVE-2024-9465☆31Oct 9, 2024Updated last year
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆87Mar 6, 2025Updated last year
- ☆41Mar 12, 2025Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- PoC for CVE-2025-22457 - A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Pulse Connect Secure, Ivan…☆72Apr 25, 2025Updated 11 months ago
- CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE)☆42Feb 19, 2025Updated last year
- Detect Remote Local Credentials Dumping using a Shadow Snapshot☆32Jan 27, 2025Updated last year
- ☆200Mar 28, 2025Updated last year
- Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)☆94Apr 2, 2025Updated 11 months ago
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File☆398Mar 20, 2025Updated last year
- Unix Process hollowing in rust☆22Dec 16, 2024Updated last year
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆61Feb 4, 2026Updated last month
- ☆19May 1, 2025Updated 10 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCE☆200Nov 12, 2024Updated last year
- ☆40Apr 23, 2025Updated 11 months ago
- ☆26Aug 11, 2025Updated 7 months ago
- Tools for attacking Azure Function Apps☆88Oct 28, 2025Updated 5 months ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆37Nov 12, 2025Updated 4 months ago
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆21Jan 20, 2025Updated last year
- Safely manage the unloading of DLLs that have been hooked into a process. Context: https://github.com/KNSoft/KNSoft.SlimDetours/discussio…☆82Jun 21, 2025Updated 9 months ago
- Dump Kerberos tickets from the KCM database of SSSD☆56Dec 31, 2025Updated 2 months ago
- PowerShell SharePoint extraction + auditing tool for red/blue/purple teams. Enumerates all SharePoint sites/drives a user can access via …☆119Jan 25, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulne…☆186Mar 14, 2025Updated last year
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆129Dec 2, 2023Updated 2 years ago
- Detect and bypass Istio sidecar☆21Sep 24, 2021Updated 4 years ago
- ☆40Aug 2, 2024Updated last year
- Minimalistic port-spoofer written in Python☆11Jan 9, 2025Updated last year
- WebSocket and SQL Injection Exploit Script☆41Feb 27, 2025Updated last year
- smugglo - an easy to use script for wrapping files into self-dropping HTML payloads to bypass content filters☆131Mar 25, 2025Updated last year
- ☆59Dec 10, 2025Updated 3 months ago
- ☆164May 5, 2025Updated 10 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Proof of Concept Exploit for CVE-2024-9464☆44Oct 9, 2024Updated last year
- Bypass Credential Guard by patching WDigest.dll using only NTAPI functions☆268Apr 8, 2025Updated 11 months ago
- Azure Post Exploitation Framework☆245Oct 27, 2025Updated 5 months ago
- Advanced test for proxy & waf☆14Feb 10, 2026Updated last month
- 云原生安全漏洞☆17Sep 9, 2025Updated 6 months ago
- CVE-2025-55182-bypass-waf☆31Jan 8, 2026Updated 2 months ago
- CVE-2024-40725 and CVE-2024-40898, affecting Apache HTTP Server versions 2.4.0 through 2.4.61. These flaws pose significant risks to web …☆84Jul 19, 2024Updated last year