ynwarcs / CVE-2025-21298
Proof of concept & details for CVE-2025-21298
☆175Updated 3 months ago
Alternatives and similar repositories for CVE-2025-21298:
Users that are interested in CVE-2025-21298 are comparing it to the libraries listed below
- POC exploit for CVE-2024-49138☆248Updated 2 months ago
- POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY☆185Updated last week
- ☆137Updated last year
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆140Updated 3 months ago
- TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.☆137Updated 4 months ago
- Leak of any user's NetNTLM hash. Fixed in KB5040434☆254Updated 8 months ago
- ☆178Updated last year
- Citrix Virtual Apps and Desktops (XEN) Unauthenticated RCE☆193Updated 5 months ago
- Red teaming tool to dump LSASS memory, bypassing basic countermeasures.☆225Updated 3 months ago
- Extract and execute a PE embedded within a PNG file using an LNK file.☆404Updated 5 months ago
- DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely☆357Updated 4 months ago
- Open Source C&C Specification☆243Updated last month
- This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.☆129Updated last month
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆183Updated last month
- CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File☆261Updated last month
- Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability☆219Updated 11 months ago
- ☆164Updated last year
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into W…☆151Updated 11 months ago
- psexecsvc - a python implementation of PSExec's native service implementation☆195Updated 2 months ago
- Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762☆101Updated 9 months ago
- Nameless C2 - A C2 with all its components written in Rust☆266Updated 6 months ago
- Windows Kernel Pool (clfs.sys) Corruption Privilege Escalation☆127Updated last year
- Python implementation of GhostPack's Seatbelt situational awareness tool☆257Updated 5 months ago
- Windows rootkit designed to work with BYOVD exploits☆183Updated 3 months ago
- A new technique that can be used to bypass memory scanners. This can be useful in hiding problematic code (such as reflective loaders imp…☆303Updated 6 months ago
- ☆301Updated 5 months ago
- A set of programs for analyzing common vulnerabilities in COM☆210Updated 7 months ago
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆187Updated 4 months ago
- ☆276Updated last year
- Proof-of-Concept for CVE-2023-38146 ("ThemeBleed")☆196Updated last year