kagancapar / 7-zip-malicious-code-vulnerability
Hello everyone, I am posting the malware injection poc video that I detected on 7-zip, just like in WinRAR. It's your choice to believe or not :) I won't apply for a poc code or CVE about it.
☆9Updated 2 years ago
Alternatives and similar repositories for 7-zip-malicious-code-vulnerability:
Users that are interested in 7-zip-malicious-code-vulnerability are comparing it to the libraries listed below
- POC for scanning ProxyShell(CVE-2021-34523,CVE-2021-34473,CVE-2021-31207)☆17Updated 3 years ago
- ☆12Updated 4 years ago
- Collection of IDA helpers☆15Updated 2 years ago
- Analyzers for Portable Executable anomalies and other malware behavior.☆32Updated 7 months ago
- A collection of Vulnerable Windows Drivers☆15Updated 3 years ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆12Updated last year
- Simple POC of Voice C2 using Speech Recognition☆13Updated 2 years ago
- This module exploits a vulnerability in WinRAR (CVE-2023-38831). When a user opens a crafted RAR file and its embedded document, a script…☆11Updated last year
- Local Privilege Escalation Miner☆23Updated 2 years ago
- 🐍 Python Exploit for CVE-2022-23935☆13Updated last year
- An End to End Encrypted SMS and SMS Tunneling app☆40Updated last year
- URLScan Go API client☆7Updated 4 years ago
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 2 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated 9 months ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆16Updated 4 years ago
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 6 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago
- Bind shell that uses Named Pipes as transport and execute PowerShell code through Runspaces.☆16Updated 5 years ago
- ☆16Updated 2 years ago
- Browser-based QRLJacking tool written in pure JavaScript. For educational use only.☆18Updated 4 months ago
- x86_64 LKM linux rootkit☆15Updated last year
- pwncat windows c2 components☆18Updated 3 years ago
- Staged Payloads from Kali Linux - Part 1,2 of 3☆19Updated 2 years ago
- Windows NTLM Authentication Backdoor☆14Updated 3 years ago
- Help deobfuscate VBScript☆15Updated 2 years ago
- Site fast fuzzing with chorme extension.☆25Updated 2 years ago
- Wordpress - Joomla - OpenCart - Drupal CMS Bruter☆12Updated 2 years ago
- 📡 Ease file sharing during pentest/CTF 🎸☆12Updated 2 years ago
- Handy script to automate the attack☆19Updated 5 years ago