CVE-2023-38831 winrar exploit generator
☆787Nov 26, 2023Updated 2 years ago
Alternatives and similar repositories for CVE-2023-38831-winrar-exploit
Users that are interested in CVE-2023-38831-winrar-exploit are comparing it to the libraries listed below
Sorting:
- lazy way to create CVE-2023-38831 winrar file for testing☆94Aug 24, 2023Updated 2 years ago
- HVNC for Cobalt Strike☆1,301Dec 7, 2023Updated 2 years ago
- Escalate Service Account To LocalSystem via Kerberos☆403Sep 14, 2023Updated 2 years ago
- Vcenter综合渗透利用工具包 | Vcenter Comprehensive Penetration and Exploitation Toolkit☆1,230Oct 24, 2025Updated 4 months ago
- UAC Bypass By Abusing Kerberos Tickets☆507Aug 10, 2023Updated 2 years ago
- ☆706Nov 7, 2023Updated 2 years ago
- ☆137Jan 8, 2024Updated 2 years ago
- A keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard input hook, allowing i…☆398Aug 2, 2023Updated 2 years ago
- Remote Shellcode Injector☆219Aug 27, 2023Updated 2 years ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,197Oct 16, 2023Updated 2 years ago
- C# obfuscator that bypass windows defender☆806Jun 4, 2023Updated 2 years ago
- An easy to install and easy to run tool for generating exploit payloads for CVE-2023-38831, WinRAR RCE before versions 6.23☆115Aug 27, 2023Updated 2 years ago
- Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE☆205Aug 25, 2023Updated 2 years ago
- ☆162Jun 18, 2023Updated 2 years ago
- ☆2,205Nov 24, 2023Updated 2 years ago
- ☆114Aug 25, 2023Updated 2 years ago
- Terminate AV/EDR Processes using kernel driver☆352Jun 12, 2023Updated 2 years ago
- CVE-2023-32233: Linux内核中的安全漏洞☆372May 16, 2023Updated 2 years ago
- CIA UAC bypass implementation of Stinger that obtains the token from an auto-elevated process, modifies it, and reuses it to execute as A…☆301Feb 2, 2026Updated last month
- This map lists the essential techniques to bypass anti-virus and EDR☆3,166Mar 28, 2025Updated 11 months ago
- Amsi Bypass payload that works on Windwos 11☆378Jul 30, 2023Updated 2 years ago
- The Havoc Framework☆8,203Dec 18, 2025Updated 2 months ago
- ☆152Oct 2, 2023Updated 2 years ago
- kill anti-malware protected processes ( BYOVD )☆968Jul 21, 2023Updated 2 years ago
- Local privilege escalation via PetitPotam (Abusing impersonate privileges).☆455Mar 30, 2023Updated 2 years ago
- CVE-2023-0386在ubuntu22.04上的提权☆415Jun 13, 2023Updated 2 years ago
- Real fucking shellcode encryptor & obfuscator tool☆1,012Jan 7, 2026Updated 2 months ago
- New generation of wmiexec.py☆1,264Jan 5, 2026Updated 2 months ago
- Loading Remote AES Encrypted PE in memory , Decrypted it and run it☆1,021Aug 29, 2023Updated 2 years ago
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆1,100Jun 10, 2024Updated last year
- A C# Command & Control framework☆1,026Mar 28, 2024Updated last year
- MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.☆537Nov 14, 2025Updated 3 months ago
- Ask a TGS on behalf of another user without password☆482Mar 30, 2025Updated 11 months ago
- ☆168Oct 29, 2023Updated 2 years ago
- Converts a EXE into DLL☆1,359Sep 15, 2025Updated 5 months ago
- Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in…☆514Aug 7, 2024Updated last year
- Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.☆290May 27, 2024Updated last year
- WPS Office RCE On 2023-08-10☆257Aug 11, 2023Updated 2 years ago
- Protected Process Dumper Tool☆581Aug 30, 2023Updated 2 years ago