A sophisticated GUI tool for creating malicious RAR archives that exploit the WinRAR path traversal vulnerability (CVE-2025-8088) using ADS and RAR5 header manipulation.
☆23Sep 4, 2025Updated 6 months ago
Alternatives and similar repositories for CVE-2025-8088-Winrar-Tool
Users that are interested in CVE-2025-8088-Winrar-Tool are comparing it to the libraries listed below
Sorting:
- Good CLR Host with Native patchless AMSI Bypass☆23May 14, 2025Updated 9 months ago
- A Bot that works by scanning all token on BSC Networks, and doing automated trade.☆15Feb 26, 2025Updated last year
- OsintifyX: Powerful Open-source OSINT tool for extracting valuable information from Instagram profiles. OSINT: Instagram Forensics Tool☆11Feb 19, 2024Updated 2 years ago
- Windows Sovereignty Tool & Recall Mitigation Agent.☆27Dec 19, 2025Updated 2 months ago
- Disable Windows:Defender,Firewall,SmartScreen with python file☆39Feb 18, 2021Updated 5 years ago
- Python: MC Mod downloader☆11Sep 10, 2025Updated 5 months ago
- Discover Non-Discoverable Bluetooth Classic devices☆13Oct 10, 2024Updated last year
- A Chrome extension to remove all liked videos on TikTok☆18Feb 11, 2026Updated 3 weeks ago
- Source code of the Chaos Ransomware, also known as Ryuk and Yashma.☆18Dec 21, 2024Updated last year
- All-in-One Safety Evaluation Framwork☆42Updated this week
- ☆12May 13, 2024Updated last year
- Android Dynamic Class Dumper — dump all DEX files from running Android apps using Frida☆37Feb 16, 2026Updated 2 weeks ago
- Extract LPD/LPR print job(s) from wireshark capture file☆12May 2, 2023Updated 2 years ago
- CLIs in the browser & terminal.☆60Mar 2, 2026Updated last week
- LLM supported Toolkit for Blue Team/ SOC Operations☆47Jan 10, 2026Updated last month
- Fyyx Wallet Finder is a Python app that searches for cryptocurrency wallets with balances in BTC and ETH. It logs results/errors and save…☆12Jun 11, 2024Updated last year
- LyraX kde is a light clean theme for KDE Plasma desktop.☆12Jun 6, 2022Updated 3 years ago
- A tool that automates fileless SSH backdoor injection—bypassing CA checks, erasing logs, creating long‑lived (up to 9999 days) passwordle…☆28Jan 30, 2026Updated last month
- XTempmail is a place where you can create or check unlimited temporary emails and they will automatically check the inbox.☆14Dec 9, 2025Updated 3 months ago
- Asynchronous scanning library☆21Nov 13, 2014Updated 11 years ago
- Herramienta de extracción de exploits desde Shodan Exploits para facilitar la búsqueda de vulnerabilidades conocidas. 👁☆23Sep 20, 2025Updated 5 months ago
- Use this bot to monitor new CVEs containing defined keywords and send alerts to Slack, Telegram, Discord, PushOver and/or MS Teams.☆19Dec 12, 2024Updated last year
- Divulge Stealer a highly advanced info-stealer that outperforms its predecessor, Umbral-Stealer by Blank-c. This new iteration is a compl…☆16Jan 7, 2025Updated last year
- Android Remote Administration Tool☆11Oct 5, 2023Updated 2 years ago
- Telegram Message Spammer☆13Jun 24, 2022Updated 3 years ago
- Pyxuss Crypto Wallet Finder v1 🚀 | Owner: Pyxuss 🇳🇵 | Purpose: Find lost ETH/BTC wallets using seed phrases or addresses 🔑. Features:…☆16Jan 11, 2025Updated last year
- USRLINKS v1.0 - The Ultimate Username Reconnaissance Tool☆24Oct 6, 2025Updated 5 months ago
- ADVANCE MAIL BOMBING WITH SPOOFING☆15Feb 1, 2022Updated 4 years ago
- ChatGPT Jailbreak promts☆16Mar 22, 2023Updated 2 years ago
- A Multilayered AV/EDR Evasion Framework and AV Testing Tool.☆18Jun 28, 2025Updated 8 months ago
- ☆46Updated this week
- A version of the popular 1.8.9 PvP client called Lunar Client that does not require a premium minecraft account to run.☆24Feb 12, 2024Updated 2 years ago
- End-to-End Encrypted Messaging via GitHub Gists☆28Apr 14, 2025Updated 10 months ago
- Open source code for Xbomber website community edition.☆40Apr 29, 2024Updated last year
- FileFetcher is a Python tool that extracts and filters URLs from archived Wayback Machine data based on file types like .pdf, .zip, .sql,…☆19Jan 16, 2025Updated last year
- ☆14Jul 1, 2022Updated 3 years ago
- A set of tools and resources for analysis of Havoc C2☆26Feb 27, 2024Updated 2 years ago
- Convert any executable (RAT, keylogger, botnet, meterpreter, anything) into raw shellcode and run it stealthily from memory using a custo…☆38May 11, 2025Updated 9 months ago
- ☆14Mar 17, 2022Updated 3 years ago