zer0t0 / CVE-2025-56383-Proof-of-ConceptLinks
CVE-2025-56383-Proof-of-Concept
☆53Updated 2 months ago
Alternatives and similar repositories for CVE-2025-56383-Proof-of-Concept
Users that are interested in CVE-2025-56383-Proof-of-Concept are comparing it to the libraries listed below
Sorting:
- ModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.☆87Updated 9 months ago
- CVE-2025-49144 PoC for security researchers to test and try.☆84Updated 5 months ago
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆94Updated 2 weeks ago
- ☆87Updated last year
- Make an Linux Kernel rootkit visible again.☆60Updated 9 months ago
- RunAs Utility Credential Stealer implementing 3 techniques : Hooking CreateProcessWithLogonW, Smart Keylogging, Remote Debugging☆203Updated 9 months ago
- Basic reverse shell in C using socket() with complete explanation☆67Updated 2 years ago
- ☆106Updated last year
- Lena's scripts/code/resources for malware analysis☆26Updated last year
- ☆74Updated 10 months ago
- ☆36Updated last year
- New 0 day vulnerability allowing to leak NTLM hashes from browsers with one click☆116Updated 3 weeks ago
- BSides Prishtina 2024 Malware Development and Persistence workshop☆118Updated 6 months ago
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆49Updated 11 months ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆77Updated last year
- ☆101Updated 10 months ago
- Repo for all my exploits/PoCs☆53Updated 7 months ago
- Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.☆87Updated last year
- Modular framework for automating triaging, malware analysis, and analyst workflows☆43Updated 7 months ago
- ShadowPhish is an advanced APT awareness toolkit designed to simulate real-world phishing, malware delivery, deepfakes, smishing/vishing,…☆215Updated 7 months ago
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆85Updated last year
- Encodes a payload within a generated mock-CSS file☆59Updated 2 years ago
- ☆164Updated 9 months ago
- Swiss Army Knife for payload encryption, obfuscation, and conversion to byte arrays – all in a single command (14 output formats supporte…☆204Updated 2 months ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆76Updated 2 years ago
- Permanently disable EDRs as local admin☆122Updated 2 months ago
- ☆59Updated last year
- ☆62Updated this week
- vulnlab.com reaper writeup☆27Updated 2 years ago
- Vast.ai Password Kracking☆91Updated last month