easis / CVE-2018-20250-WinRAR-ACEView external linksLinks
Proof of concept code in C# to exploit the WinRAR ACE file extraction path (CVE-2018-20250).
☆21Mar 1, 2019Updated 6 years ago
Alternatives and similar repositories for CVE-2018-20250-WinRAR-ACE
Users that are interested in CVE-2018-20250-WinRAR-ACE are comparing it to the libraries listed below
Sorting:
- Two C# RunPE's capable of x86 and x64 injections☆11Dec 2, 2018Updated 7 years ago
- A tool to show the method info at runtime☆13Aug 12, 2019Updated 6 years ago
- Win32 PE Anti-RE and Anti-debugging Framework☆13May 14, 2019Updated 6 years ago
- PInvoke at runtime for .NET☆17Sep 13, 2018Updated 7 years ago
- ☆15Feb 21, 2014Updated 11 years ago
- Trojan downloader simple virus☆16Sep 30, 2018Updated 7 years ago
- Attempt at recreating a windows-based DKOM rootkit using c#☆12Sep 11, 2016Updated 9 years ago
- Create a C++ PE which loads an XTEA-crypted .NET PE shellcode in memory.☆17Sep 29, 2018Updated 7 years ago
- Reflective DLL that hooks the creation of the UAC prompt popped by explorer.exe for privilege escalation.☆22Feb 20, 2021Updated 4 years ago
- C# Exe that can remotely retrieve C# assemblies for in-memory execution☆19Feb 22, 2019Updated 6 years ago
- WORK IN PROGRESS. RAT written in C++ using Win32 API☆19Sep 12, 2019Updated 6 years ago
- Handy script to automate the attack☆22Dec 19, 2019Updated 6 years ago
- Remote Process Control Library☆26Dec 12, 2022Updated 3 years ago
- [Not Another DLL Injector] - a simple, all purpose DLL injector for x64 and x86☆12Jul 4, 2019Updated 6 years ago
- Monitor Files and Folders for Changes in Real Time .☆11Jan 10, 2019Updated 7 years ago
- ☆11Jan 16, 2018Updated 8 years ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- The evolution of NxRansomware☆11Jun 14, 2019Updated 6 years ago
- Proof of Concept of the steganographic algorithms implemented by APT 29 (Hammertos)☆10Nov 26, 2018Updated 7 years ago
- A Simple CLI App to mark all EXCEL sheets visible (i.e. sets "Very Hidden" and "Hidden" to "Visible")☆11Apr 16, 2020Updated 5 years ago
- A C# DLL Wrapper Generator☆11Feb 23, 2022Updated 3 years ago
- Injection of MSIL using Cecil☆12Jul 28, 2015Updated 10 years ago
- Exploit the vulnerability to execute the calculator☆68Jan 11, 2018Updated 8 years ago
- A tool that reads a PE file from a byte array buffer and injects it into memory.☆28Aug 5, 2019Updated 6 years ago
- load mixed assemblies (.NET) C# source code☆14Sep 3, 2017Updated 8 years ago
- Application features: Sets visibility of its own executeable file to hidden --> Adds itself to the registry of run-on-startup application…☆11Jan 30, 2019Updated 7 years ago
- CVE-2019-1064 Local Privilege Escalation Vulnerability☆11Jun 12, 2019Updated 6 years ago
- MSBuild ConfuserEx Target☆11Jul 21, 2025Updated 6 months ago
- Example Loader to be used as a learning resource for people interested in how commercially available malware is made on a very basic leve…☆70May 9, 2019Updated 6 years ago
- DarkRats Standalone HVNC☆25May 20, 2022Updated 3 years ago
- DarkCrypter encrypts your files and generates undetectable payloads to evade all anti-virus vendors.☆22Sep 1, 2022Updated 3 years ago
- Modify data structures in the Windows kernel, hiding processes by PID☆16Oct 29, 2017Updated 8 years ago
- RunPE using Hell's Gate technique.☆32Dec 4, 2020Updated 5 years ago
- Load PE via XML Attribute☆32Feb 1, 2020Updated 6 years ago
- .net based packer/obfuscator with apc based pe injection☆15Mar 23, 2016Updated 9 years ago
- ☣️ Necro Stealer + Web Panel☆10May 2, 2020Updated 5 years ago
- C++ Host .NET CLR & Run a assembly directly from ressource (RT_RCDATA) without extraction disk.☆15Mar 18, 2023Updated 2 years ago
- ☆16Dec 31, 2016Updated 9 years ago
- Control Panel and Builder (Working)☆10Apr 15, 2017Updated 8 years ago