A sophisticated GUI tool for creating malicious RAR archives that exploit the WinRAR path traversal vulnerability (CVE-2025-8088) using ADS and RAR5 header manipulation.
☆28Sep 4, 2025Updated 7 months ago
Alternatives and similar repositories for CVE-2025-8088-Winrar-Tool
Users that are interested in CVE-2025-8088-Winrar-Tool are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Good CLR Host with Native patchless AMSI Bypass☆23May 14, 2025Updated 11 months ago
- LyraX kde is a light clean theme for KDE Plasma desktop.☆12Jun 6, 2022Updated 3 years ago
- XTempmail is a place where you can create or check unlimited temporary emails and they will automatically check the inbox.☆14Dec 9, 2025Updated 4 months ago
- Source code of the Chaos Ransomware, also known as Ryuk and Yashma.☆17Dec 21, 2024Updated last year
- JARVIS is an advanced virtual assistant .☆18Mar 29, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A Bot that works by scanning all token on BSC Networks, and doing automated trade.☆15Feb 26, 2025Updated last year
- Disable Windows:Defender,Firewall,SmartScreen with python file☆39Feb 18, 2021Updated 5 years ago
- Hackcom is a place where hackers can communicate safely without being tracked by the authorities.☆21Oct 16, 2025Updated 6 months ago
- Windows Sovereignty Tool & Recall Mitigation Agent.☆27Dec 19, 2025Updated 4 months ago
- ☆12May 13, 2024Updated last year
- ☆13Jul 1, 2022Updated 3 years ago
- Use this bot to monitor new CVEs containing defined keywords and send alerts to Slack, Telegram, Discord, PushOver and/or MS Teams.☆19Dec 12, 2024Updated last year
- Extract LPD/LPR print job(s) from wireshark capture file☆12May 2, 2023Updated 2 years ago
- Python: MC Mod downloader☆11Sep 10, 2025Updated 7 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A Chrome extension to remove all liked videos on TikTok☆19Feb 11, 2026Updated 2 months ago
- Exploit app for CVE-2022-20494, a high severity permanent denial-of-service vulnerability that leverages Android's DND (Do not disturb) f…☆27Mar 3, 2023Updated 3 years ago
- CLIs in the browser & terminal.☆78Mar 2, 2026Updated last month
- Herramienta de extracción de exploits desde Shodan Exploits para facilitar la búsqueda de vulnerabilidades conocidas. 👁☆40Sep 20, 2025Updated 6 months ago
- A fully public exploit of the CVE-2020-0022 BlueFrag Android RCE Vulnerability (tested on Pixel 3 XL)☆21Nov 21, 2023Updated 2 years ago
- ☆58Updated this week
- A version of the popular 1.8.9 PvP client called Lunar Client that does not require a premium minecraft account to run.☆23Feb 12, 2024Updated 2 years ago
- Divulge Stealer a highly advanced info-stealer that outperforms its predecessor, Umbral-Stealer by Blank-c. This new iteration is a compl…☆18Jan 7, 2025Updated last year
- Android Remote Administration Tool☆12Oct 5, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Python Google Play Music Uploader (gmusicapi)☆16Feb 21, 2015Updated 11 years ago
- OsintifyX: Powerful Open-source OSINT tool for extracting valuable information from Instagram profiles. OSINT: Instagram Forensics Tool☆11Feb 19, 2024Updated 2 years ago
- "ACCESS LIST" Bypass collections used during pentesting, gathered in one place. The list types include tools, usernames, passwords, comb…☆39Feb 19, 2026Updated 2 months ago
- Cyber-Jarvis is a versatile AI assistant for automation and cybersecurity. It handles tasks like playing videos, detecting objects, perfo…☆16Aug 20, 2025Updated 7 months ago
- End-to-End Encrypted Messaging via GitHub Gists☆30Apr 14, 2025Updated last year
- Course materials for the NITDA Blockchain Scholarship☆40Jan 13, 2023Updated 3 years ago
- Obfuscated Pegasus Spyware.☆39Apr 23, 2024Updated last year
- ☆14Mar 17, 2022Updated 4 years ago
- Asynchronous scanning library☆21Nov 13, 2014Updated 11 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Discover Non-Discoverable Bluetooth Classic devices☆13Oct 10, 2024Updated last year
- Fyyx Wallet Finder is a Python app that searches for cryptocurrency wallets with balances in BTC and ETH. It logs results/errors and save…☆12Jun 11, 2024Updated last year
- Simple Cryptor on C ++ without using .NET and other nonsense.☆12Sep 4, 2025Updated 7 months ago
- Convert any executable (RAT, keylogger, botnet, meterpreter, anything) into raw shellcode and run it stealthily from memory using a custo…☆43May 11, 2025Updated 11 months ago
- ChatGPT Jailbreak promts☆16Mar 22, 2023Updated 3 years ago
- Web Scrapping Examples using Beautiful Soup in Python.☆36Nov 1, 2025Updated 5 months ago
- Keystroke injection tool collection for 2.4 GHz wireless input devices☆24Oct 20, 2023Updated 2 years ago