GitHub / SetKursma / Phantom-Registy-Exploit-CVE2025-20682-Runtime-FUD-LNK
Exploit development involves tools like exploitation frameworks and CVE databases. Registry exploits, such as reg exploit or registry-based payloads, leverage vulnerabilities for silent execution, often using FUD techniques to evade detection.
JSON API: http://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/SetKursma%2FPhantom-Registy-Exploit-CVE2025-20682-Runtime-FUD-LNK
PURL: pkg:github/SetKursma/Phantom-Registy-Exploit-CVE2025-20682-Runtime-FUD-LNK
Stars: 0
Forks: 0
Open issues: 0
License: mit
Language: Visual Basic .NET
Size: 12.3 MB
Dependencies parsed at: Pending
Created at: 4 months ago
Updated at: 3 months ago
Pushed at: 3 months ago
Last synced at: 3 months ago
Topics: cve, cve-2025-44228, cve-scanning, exploit, exploit-code, exploit-database, exploit-development, exploit-exercises, exploit-kit, exploitation, exploitation-framework, reg, reg-downloader, reg-exploit, reg-fud, reg-password, reg-setup, registry, registry-exploit, slient-exploit-builder