b1tg / CVE-2023-38831-winrar-exploitView external linksLinks
CVE-2023-38831 winrar exploit generator
☆788Nov 26, 2023Updated 2 years ago
Alternatives and similar repositories for CVE-2023-38831-winrar-exploit
Users that are interested in CVE-2023-38831-winrar-exploit are comparing it to the libraries listed below
Sorting:
- lazy way to create CVE-2023-38831 winrar file for testing☆94Aug 24, 2023Updated 2 years ago
- Escalate Service Account To LocalSystem via Kerberos☆402Sep 14, 2023Updated 2 years ago
- HVNC for Cobalt Strike☆1,297Dec 7, 2023Updated 2 years ago
- Vcenter综合渗透利用工具包 | Vcenter Comprehensive Penetration and Exploitation Toolkit☆1,227Oct 24, 2025Updated 3 months ago
- UAC Bypass By Abusing Kerberos Tickets☆508Aug 10, 2023Updated 2 years ago
- ☆705Nov 7, 2023Updated 2 years ago
- ☆137Jan 8, 2024Updated 2 years ago
- A keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard input hook, allowing i…☆398Aug 2, 2023Updated 2 years ago
- Remote Shellcode Injector☆221Aug 27, 2023Updated 2 years ago
- A memory-based evasion technique which makes shellcode invisible from process start to end.☆1,199Oct 16, 2023Updated 2 years ago
- C# obfuscator that bypass windows defender☆802Jun 4, 2023Updated 2 years ago
- An easy to install and easy to run tool for generating exploit payloads for CVE-2023-38831, WinRAR RCE before versions 6.23☆115Aug 27, 2023Updated 2 years ago
- Weaponized CobaltStrike BOF for CVE-2023-36874 Windows Error Reporting LPE☆205Aug 25, 2023Updated 2 years ago
- ☆161Jun 18, 2023Updated 2 years ago
- ☆2,182Nov 24, 2023Updated 2 years ago
- ☆114Aug 25, 2023Updated 2 years ago
- Terminate AV/EDR Processes using kernel driver☆352Jun 12, 2023Updated 2 years ago
- CVE-2023-32233: Linux内核中的安全漏洞☆370May 16, 2023Updated 2 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆3,143Mar 28, 2025Updated 10 months ago
- CIA UAC bypass implementation of Stinger that obtains the token from an auto-elevated process, modifies it, and reuses it to execute as A…☆300Feb 2, 2026Updated 2 weeks ago
- ☆151Oct 2, 2023Updated 2 years ago
- Amsi Bypass payload that works on Windwos 11☆377Jul 30, 2023Updated 2 years ago
- The Havoc Framework☆8,158Dec 18, 2025Updated last month
- Local privilege escalation via PetitPotam (Abusing impersonate privileges).☆453Mar 30, 2023Updated 2 years ago
- kill anti-malware protected processes ( BYOVD )☆970Jul 21, 2023Updated 2 years ago
- CVE-2023-0386在ubuntu22.04上的提权☆412Jun 13, 2023Updated 2 years ago
- Real fucking shellcode encryptor & obfuscator tool☆1,010Jan 7, 2026Updated last month
- New generation of wmiexec.py☆1,255Jan 5, 2026Updated last month
- Loading Remote AES Encrypted PE in memory , Decrypted it and run it☆1,021Aug 29, 2023Updated 2 years ago
- A PoC that packages payloads into output containers to evade Mark-of-the-Web flag & demonstrate risks associated with container file form…☆1,083Jun 10, 2024Updated last year
- A C# Command & Control framework☆1,026Mar 28, 2024Updated last year
- MultiDump is a post-exploitation tool for dumping and extracting LSASS memory discreetly.☆537Nov 14, 2025Updated 3 months ago
- Ask a TGS on behalf of another user without password☆482Mar 30, 2025Updated 10 months ago
- ☆168Oct 29, 2023Updated 2 years ago
- Converts a EXE into DLL☆1,356Sep 15, 2025Updated 5 months ago
- Moriarty is designed to enumerate missing KBs, detect various vulnerabilities, and suggest potential exploits for Privilege Escalation in…☆513Aug 7, 2024Updated last year
- Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.☆288May 27, 2024Updated last year
- WPS Office RCE On 2023-08-10☆257Aug 11, 2023Updated 2 years ago
- Protected Process Dumper Tool☆576Aug 30, 2023Updated 2 years ago