MorDavid / CVE-2023-38831-Winrar-Exploit-Generator-POCLinks
This is a POC for the CVE-2023-3883 exploit targeting WinRAR up to 6.22. Modified some existing internet-sourced POCs by introducing greater dynamism and incorporated additional try-except blocks within the code.
☆13Updated 2 years ago
Alternatives and similar repositories for CVE-2023-38831-Winrar-Exploit-Generator-POC
Users that are interested in CVE-2023-38831-Winrar-Exploit-Generator-POC are comparing it to the libraries listed below
Sorting:
- Windows Privilege Escalation Tool☆18Updated last month
- Resilient, Stealthy & Capable Windows Backdoor. Utilizing Telegram for command relays☆13Updated 2 years ago
- Golang C2 Client + PHP API Handler☆12Updated 2 years ago
- A dynamic cross-site scripting (XSS) payload delivery system with team server abilities.☆16Updated last year
- A windows backdoor that's use Telegram as a C2 server.☆14Updated last year
- C2 Server for pentesting, exploitation, and payload creation☆12Updated last year
- Offensive Powershell obfuscator☆27Updated last year
- Monarch - The Adversary Emulation Toolkit☆63Updated last year
- Command and Control (C2) framework☆132Updated 8 months ago
- Just another elf library☆31Updated 2 years ago
- Curated list of projects, articles and more related to Offensive Security and Red Teaming. Completely written in Rust.☆112Updated 7 months ago
- A tool designed for smuggling interactive command and control traffic through legitimate TURN servers hosted by reputable providers such …☆383Updated 5 months ago
- An interactive mock C2 server☆17Updated 2 years ago
- Pure Go rewrite of knockknock☆11Updated 2 years ago
- ElfDoor-gcc is an LD_PRELOAD that hijacks gcc to inject malicious code into binaries during linking, without touching the source code.☆130Updated 9 months ago
- Remote Administration Tool made in golang language.☆11Updated 2 years ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆146Updated last year
- Simple ELF runtime packer for creating self-protecting binaries☆22Updated 2 years ago
- Proof of concept & details for CVE-2025-21298☆193Updated last year
- Automated Persistence and Lateral Movement using GCP Patch Management☆16Updated 3 years ago
- Remote Command executor☆82Updated 2 years ago
- GrizzlyTunnel is a automation script designed to create seamless Layer 3 VPN like tunnels over SSH.☆26Updated last year
- Linux Loadable Kernel Module (LKM) based rootkit (ring-0), capable of hiding itself, processes/implants, rmmod proof, has ability to bypa…☆262Updated last month
- Get root via TTY / TIOCSTI stuffing☆76Updated 8 months ago
- SSHD Based implant supporting tunneling mecanisms to reach the C2 (DNS, ICMP, HTTP Encapsulation, HTTP/Socks Proxies, UDP...)☆281Updated 10 months ago
- The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.☆444Updated 3 weeks ago
- dlopen() filelessly a shared object or even a program (and run it).☆56Updated 2 years ago
- Using fibers to run in-memory code.☆240Updated 2 years ago
- NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. with Dual-bui…☆231Updated 11 months ago
- Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.☆87Updated last year