soltanali0 / CVE-2025-53770-ExploitLinks
SharePoint WebPart Injection Exploit Tool
☆308Updated 3 weeks ago
Alternatives and similar repositories for CVE-2025-53770-Exploit
Users that are interested in CVE-2025-53770-Exploit are comparing it to the libraries listed below
Sorting:
- Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCE☆197Updated last year
- ☆158Updated last year
- Morpheus is an lsass stealer that extracts lsass.exe in RAM and exfiltrates it via forged and crypted NTP packets. For authorized testin…☆120Updated 6 months ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆146Updated 11 months ago
- Zimbra - Remote Command Execution (CVE-2024-45519)☆134Updated 8 months ago
- peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.☆220Updated 8 months ago
- Microsoft SharePoint Server Elevation of Privilege Vulnerability☆234Updated 2 years ago
- Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762☆105Updated last year
- This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.☆153Updated 9 months ago
- Fortinet Fortimanager Unauthenticated Remote Code Execution AKA FortiJump CVE-2024-47575☆93Updated last year
- CVE-2024-3400 Palo Alto OS Command Injection☆161Updated last year
- ☆136Updated last year
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆257Updated last year
- ☆74Updated 10 months ago
- ☆59Updated 7 months ago
- ☆167Updated 2 years ago
- Deploy reverse shells and perform stealthy process injection with EchoStrike – a Go-based tool for ethical hacking and Red Team operation…☆189Updated last year
- FortiWeb CVE-2025-25257 exploit☆63Updated 5 months ago
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆355Updated this week
- ☆259Updated 5 months ago
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File☆386Updated 9 months ago
- ☆94Updated 5 months ago
- Chrome browser extension-based Command & Control☆224Updated 5 months ago
- Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.☆352Updated 3 months ago
- Different methods to get current username without using whoami☆183Updated last year
- Red teaming tool to dump LSASS memory, bypassing basic countermeasures.☆246Updated last month
- Proof of concept & details for CVE-2025-21298☆190Updated 11 months ago
- Ubuntu Privilege Escalation bash one-liner using CVE-2023-32629 & CVE-2023-2640☆106Updated 2 years ago
- CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit☆74Updated last year
- Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.☆87Updated last year