A sophisticated GUI tool for creating malicious RAR archives that exploit the WinRAR path traversal vulnerability (CVE-2025-8088) using ADS and RAR5 header manipulation.
☆27Sep 4, 2025Updated 6 months ago
Alternatives and similar repositories for CVE-2025-8088-Winrar-Tool
Users that are interested in CVE-2025-8088-Winrar-Tool are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Good CLR Host with Native patchless AMSI Bypass☆23May 14, 2025Updated 10 months ago
- LyraX kde is a light clean theme for KDE Plasma desktop.☆12Jun 6, 2022Updated 3 years ago
- XTempmail is a place where you can create or check unlimited temporary emails and they will automatically check the inbox.☆14Dec 9, 2025Updated 3 months ago
- Source code of the Chaos Ransomware, also known as Ryuk and Yashma.☆18Dec 21, 2024Updated last year
- JARVIS is an advanced virtual assistant .☆18Mar 29, 2024Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A Bot that works by scanning all token on BSC Networks, and doing automated trade.☆15Feb 26, 2025Updated last year
- Disable Windows:Defender,Firewall,SmartScreen with python file☆39Feb 18, 2021Updated 5 years ago
- Hackcom is a place where hackers can communicate safely without being tracked by the authorities.☆21Oct 16, 2025Updated 5 months ago
- Windows Sovereignty Tool & Recall Mitigation Agent.☆27Dec 19, 2025Updated 3 months ago
- High-performance Bad Apple!! player for Ulanzi D200 stream controller☆26Oct 20, 2025Updated 5 months ago
- ☆12May 13, 2024Updated last year
- ☆14Jul 1, 2022Updated 3 years ago
- Use this bot to monitor new CVEs containing defined keywords and send alerts to Slack, Telegram, Discord, PushOver and/or MS Teams.☆19Dec 12, 2024Updated last year
- Extract LPD/LPR print job(s) from wireshark capture file☆12May 2, 2023Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Exploit app for CVE-2022-20494, a high severity permanent denial-of-service vulnerability that leverages Android's DND (Do not disturb) f…☆27Mar 3, 2023Updated 3 years ago
- Python: MC Mod downloader☆11Sep 10, 2025Updated 6 months ago
- A Chrome extension to remove all liked videos on TikTok☆18Feb 11, 2026Updated last month
- Herramienta de extracción de exploits desde Shodan Exploits para facilitar la búsqueda de vulnerabilidades conocidas. 👁☆39Sep 20, 2025Updated 6 months ago
- CLIs in the browser & terminal.☆74Mar 2, 2026Updated 3 weeks ago
- A fully public exploit of the CVE-2020-0022 BlueFrag Android RCE Vulnerability (tested on Pixel 3 XL)☆21Nov 21, 2023Updated 2 years ago
- ☆53Updated this week
- A version of the popular 1.8.9 PvP client called Lunar Client that does not require a premium minecraft account to run.☆24Feb 12, 2024Updated 2 years ago
- Divulge Stealer a highly advanced info-stealer that outperforms its predecessor, Umbral-Stealer by Blank-c. This new iteration is a compl…☆17Jan 7, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Android Remote Administration Tool☆11Oct 5, 2023Updated 2 years ago
- Python Google Play Music Uploader (gmusicapi)☆16Feb 21, 2015Updated 11 years ago
- OsintifyX: Powerful Open-source OSINT tool for extracting valuable information from Instagram profiles. OSINT: Instagram Forensics Tool☆11Feb 19, 2024Updated 2 years ago
- "ACCESS LIST" Bypass collections used during pentesting, gathered in one place. The list types include tools, usernames, passwords, comb…☆39Feb 19, 2026Updated last month
- Fyyx Wallet Finder is a Python app that searches for cryptocurrency wallets with balances in BTC and ETH. It logs results/errors and save…☆12Jun 11, 2024Updated last year
- Cyber-Jarvis is a versatile AI assistant for automation and cybersecurity. It handles tasks like playing videos, detecting objects, perfo…☆16Aug 20, 2025Updated 7 months ago
- End-to-End Encrypted Messaging via GitHub Gists☆29Apr 14, 2025Updated 11 months ago
- Course materials for the NITDA Blockchain Scholarship☆40Jan 13, 2023Updated 3 years ago
- Obfuscated Pegasus Spyware.☆38Apr 23, 2024Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆14Mar 17, 2022Updated 4 years ago
- Asynchronous scanning library☆21Nov 13, 2014Updated 11 years ago
- Discover Non-Discoverable Bluetooth Classic devices☆13Oct 10, 2024Updated last year
- Pyxuss Crypto Wallet Finder v1 🚀 | Owner: Pyxuss 🇳🇵 | Purpose: Find lost ETH/BTC wallets using seed phrases or addresses 🔑. Features:…☆18Jan 11, 2025Updated last year
- Simple Cryptor on C ++ without using .NET and other nonsense.☆12Sep 4, 2025Updated 6 months ago
- ADVANCE MAIL BOMBING WITH SPOOFING☆15Feb 1, 2022Updated 4 years ago
- Convert any executable (RAT, keylogger, botnet, meterpreter, anything) into raw shellcode and run it stealthily from memory using a custo…☆40May 11, 2025Updated 10 months ago