ignis-sec / CVE-2023-38831-RaRCE
An easy to install and easy to run tool for generating exploit payloads for CVE-2023-38831, WinRAR RCE before versions 6.23
β115Updated last year
Alternatives and similar repositories for CVE-2023-38831-RaRCE:
Users that are interested in CVE-2023-38831-RaRCE are comparing it to the libraries listed below
- CompMgmtLauncher & Sharepoint DLL Search Order hijacking UAC/persist via OneDriveβ106Updated last year
- π Double Venom (DVenom) is a tool that provides an encryption wrapper and loader for your shellcode.β159Updated last year
- β162Updated last year
- β128Updated last year
- β139Updated last year
- Bypass Malware Sandbox Evasion Ram checkβ137Updated 2 years ago
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerabilityβ136Updated 2 weeks ago
- Run Your Payload Without Running Your Payloadβ179Updated 2 years ago
- Create Anti-Copy DRM Malwareβ51Updated 5 months ago
- random code snippets, useful for getting startedβ115Updated 2 months ago
- Stealthily inject shellcode into an executableβ139Updated this week
- OpenSSH 9.1 vulnerability mass scan and exploitβ104Updated last year
- β164Updated last year
- A modification to fortra's CVE-2023-28252 exploit, compiled to exeβ54Updated last year
- DHCP Server Remote Code Execution impact: 2008 R2 SP1 Π΄ΠΎ Server 2019β70Updated last year
- β149Updated 6 months ago
- β214Updated 10 months ago
- TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.β135Updated last month
- Abusing Windows fork API and OneDrive.exe process to inject the malicious shellcode without allocating new RWX memory region.β266Updated 8 months ago
- This repository contains a proof-of-concept exploit written in C++ that demonstrates the exploitation of a vulnerability affecting the Wiβ¦β77Updated 10 months ago
- Execute shellcode files with rundll32β191Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printingβ143Updated 8 months ago
- NoArgs is a tool designed to dynamically spoof and conceal process arguments while staying undetected. It achieves this by hooking into Wβ¦β149Updated 8 months ago
- Automated .NET AppDomain hijack payload generationβ119Updated last month
- This repository implements Threadless Injection in Cβ157Updated last year
- γπγProof of concept on BYOVD attackβ154Updated last month
- Utilizing TLS callbacks to execute a payload without spawning any threads in a remote processβ244Updated last year
- yet another AV killer tool using BYOVDβ264Updated last year
- Documents Exfiltration project for fun and educational purposesβ145Updated last year
- NativePayload_PE1/PE2 , Injecting Meterpreter Payload bytes into local Process via Delegation Technique + in-memory with delay Changing Rβ¦β57Updated last year