CVE-2025-56383-Proof-of-Concept
☆54Sep 26, 2025Updated 7 months ago
Alternatives and similar repositories for CVE-2025-56383-Proof-of-Concept
Users that are interested in CVE-2025-56383-Proof-of-Concept are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Proof of concept source code and misc files for my CVE-2025-21692 exploit, kernel version 6.6.75☆40Sep 16, 2025Updated 7 months ago
- ☆19May 18, 2025Updated 11 months ago
- Various shellcodes☆12Sep 1, 2020Updated 5 years ago
- ☆14Aug 22, 2025Updated 8 months ago
- The different ways to dump lsass☆286Aug 15, 2025Updated 8 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆12Jul 4, 2024Updated last year
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆65Jan 21, 2025Updated last year
- A C# PE loader for x64 and x86 PE files.☆53Mar 9, 2026Updated last month
- Deobfuscator for DashO 8.x String Obfuscation☆15Sep 22, 2017Updated 8 years ago
- Windows 7/2008 R2 EoP☆13Feb 12, 2021Updated 5 years ago
- Modern PE/ARM/.NET analyzer and editor rebuilt with Qt 5.15☆23Dec 20, 2025Updated 4 months ago
- Disables LibOemCrypto.so on rooted devices to bypass DRM restrictions and allow e.g. Netflix, My5 playbacka☆10Dec 20, 2020Updated 5 years ago
- HTA Visual Basic script for remote shell on windows machines☆23Sep 4, 2018Updated 7 years ago
- Integer overflow in FreeType software, which also affects Chrome☆30Aug 27, 2025Updated 8 months ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Bind shell that uses Named Pipes as transport and execute PowerShell code through Runspaces.☆17Sep 13, 2019Updated 6 years ago
- ExecEvasion is a lightweight execution-evasion toolkit that generates command variants designed to bypass naive filters and WAF rules by …☆50Jan 31, 2026Updated 3 months ago
- A simple Meterpreter stager written in Rust.☆45Nov 2, 2025Updated 5 months ago
- stack based buffer overflow in MsIo64.sys, Proof of Concept Local Privilege Escalation to nt authority/system☆13Jun 7, 2021Updated 4 years ago
- ☆10Dec 19, 2024Updated last year
- CVE-2024-34102: Unauthenticated Magento XXE☆14Jan 12, 2025Updated last year
- A list of OSINT resources and tools that may be useful to you when conducting investigations related to the United States of America. Thi…☆25Sep 9, 2025Updated 7 months ago
- Convert batch script to executable with advanced obfuscator. Based on Batch-Obfuscator bat2exe very advanced and very well made.☆15Jan 5, 2022Updated 4 years ago
- ⚔️ Red Team tools for capturing credentials & planting payloads using native Windows features.☆13Jan 25, 2026Updated 3 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Capture The Flag | Cyber SEA GAME 2019 | Writeup☆12Nov 24, 2019Updated 6 years ago
- PHP WebShell Backdoor for Access all dir/file in the Website.☆14Jul 29, 2021Updated 4 years ago
- de4dot deobfuscator with full support for vanilla ConfuserEx☆20Mar 24, 2018Updated 8 years ago
- Exploit ConnectWise ScreenConnect (bypass authentication)☆13Feb 21, 2024Updated 2 years ago
- Plugin Driven Remote Administration Tool (Unsupported)☆14Sep 23, 2015Updated 10 years ago
- Shabak Challenge 2018 in Software and Data Science☆16Dec 23, 2018Updated 7 years ago
- สามารถโหลดไปลองศึกษาได้เลยนะครับ ติดปัญหาหรืออยากให้สอนบอกได้นะครับ☆17Jan 22, 2024Updated 2 years ago
- A checklist for systematically going through the OWASP Testing Guide V4☆17Jan 14, 2025Updated last year
- CVE-2024-21893 to CVE-2024-21887 Exploit Toolkit☆26Apr 6, 2025Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A repository with data about APTs☆13Nov 24, 2022Updated 3 years ago
- ☆28May 14, 2025Updated 11 months ago
- CVE-2025-5777 Citrix NetScaler Memory Leak Exploit (CitrixBleed 2)☆32Jul 11, 2025Updated 9 months ago
- Indirect Syscall invocation via thread hijacking☆26May 5, 2023Updated 2 years ago
- ☆13Sep 15, 2024Updated last year
- Browser-based QRLJacking tool written in pure JavaScript. For educational use only.☆16Sep 13, 2024Updated last year
- Fork of jadx with support for editing and recompiling Java source☆24Jun 8, 2019Updated 6 years ago