Proof-of-Concept for Authorization Bypass in Next.js Middleware
☆19Mar 23, 2025Updated 11 months ago
Alternatives and similar repositories for CVE-2025-29927-PoC-Exploit
Users that are interested in CVE-2025-29927-PoC-Exploit are comparing it to the libraries listed below
Sorting:
- Small Script that permits to enumerate folders in Windows Defender Exclusion List with no Administrative privileges☆27Nov 20, 2024Updated last year
- ☆12Jun 26, 2023Updated 2 years ago
- runs sliver command on all hosts, partially based on example in sliver repo☆13Mar 23, 2024Updated last year
- This is my own custom fork of Bhassani's original repo, which contains the (unfinished) reverse-engineered WannaCry Ransomware-related fi…☆10Mar 7, 2023Updated 2 years ago
- Community Eventing and Scripting examples☆18Aug 11, 2025Updated 6 months ago
- 内存加载FRP☆10Sep 11, 2023Updated 2 years ago
- Azure APIs enumeration and abuse☆13Feb 26, 2026Updated last week
- Regex based secret scanner for sccm deployment points sccmcontentlib$ shares. Find secrets automatically and download entire packages for…☆18Aug 13, 2025Updated 6 months ago
- ☆13Dec 28, 2024Updated last year
- Extract entire function source code based on giving line number using Javaparser☆21Jul 15, 2025Updated 7 months ago
- Nemesys: A personal educational project designed to automate the discovery of vulnerabilities 🕵️♂️ using Metasploit 🚀. Learn how to id…☆13May 25, 2025Updated 9 months ago
- ☆20Sep 6, 2025Updated 6 months ago
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆15Apr 21, 2025Updated 10 months ago
- y4er的ysoserial修改版,加入mysql不出网pipe文件生成☆25Jan 30, 2026Updated last month
- The aim of this Github repository is to collect and summarise research works on backdoor attacks and defences on deep learning models.☆13Sep 7, 2022Updated 3 years ago
- Puppeteer Recaptcha solver☆10Jan 10, 2024Updated 2 years ago
- POC Framework☆10Jul 16, 2017Updated 8 years ago
- About C# loader that copies a chunk at the time of the shellcode in memory in a suspended process, rather that all at once☆13Jul 14, 2022Updated 3 years ago
- Dumping LSASS Evaded Endpoint Security Solutions☆18Feb 15, 2025Updated last year
- 腾讯安全沙龙 一 二 三 期PPT集合☆19May 24, 2025Updated 9 months ago
- 一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972/31656以及log4j,提供一键上传webs…☆12Dec 18, 2023Updated 2 years ago
- Simple python3 script to automate CVE-2018-9995☆11Feb 20, 2024Updated 2 years ago
- Apache Superset Auth Bypass (CVE-2023-27524)☆11May 9, 2023Updated 2 years ago
- Obtain emails using the LinkedIn Graph API☆11Oct 1, 2025Updated 5 months ago
- ☆12Aug 27, 2025Updated 6 months ago
- This is a VxLAN PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆28Jul 21, 2025Updated 7 months ago
- Exploit for CVE-2024-0402 in Gitlab☆15Mar 18, 2025Updated 11 months ago
- Shellcode execution via x86 inline assembly based on MSVC syntax☆17Apr 26, 2023Updated 2 years ago
- Attack Active Directory Trusts with a single tool☆14Jan 15, 2025Updated last year
- Chat GPT translator☆10Feb 20, 2023Updated 3 years ago
- ☆22Apr 28, 2025Updated 10 months ago
- NRefactory - Refactoring Your C# Code☆15Jun 22, 2024Updated last year
- 此文件用于配套“卫界安全-阿呆攻防”中所涉及的代码类文档☆11Apr 26, 2025Updated 10 months ago
- PhantomDelay is a precise delay function that uses the Windows high resolution performance counter to pause your program for a specified …☆19May 8, 2025Updated 9 months ago
- Certipy in Docker☆13Mar 28, 2024Updated last year
- ☆10Mar 24, 2024Updated last year
- Documentation for Blueprint build with Jigsaw☆11Dec 9, 2025Updated 2 months ago
- 通达OA OfficeTask udp 2397 端口远程代码执行RCE检测工具☆21Jun 13, 2025Updated 8 months ago
- ☆12May 21, 2025Updated 9 months ago