kagancapar / 7-zip-malicious-code-vulnerabilityLinks
Hello everyone, I am posting the malware injection poc video that I detected on 7-zip, just like in WinRAR. It's your choice to believe or not :) I won't apply for a poc code or CVE about it.
☆9Updated 3 years ago
Alternatives and similar repositories for 7-zip-malicious-code-vulnerability
Users that are interested in 7-zip-malicious-code-vulnerability are comparing it to the libraries listed below
Sorting:
- An Assembly x86 code that shows Windows MessageBox kept as simple as possible.☆11Updated 2 years ago
- ShellC0de Generator☆11Updated 4 years ago
- POC for scanning ProxyShell(CVE-2021-34523,CVE-2021-34473,CVE-2021-31207)☆17Updated 3 years ago
- Staged Payloads from Kali Linux - Part 1,2 of 3☆20Updated 2 years ago
- RDPloit - A Simple Security Vulnerabilities Checker For Remote Desktop Protocol☆31Updated 4 years ago
- Process injection via KernelCallbackTable☆14Updated 3 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Updated 5 years ago
- Local Privilege Escalation Miner☆27Updated 3 years ago
- Analyzers for Portable Executable anomalies and other malware behavior.☆32Updated last year
- Browser-based QRLJacking tool written in pure JavaScript. For educational use only.☆18Updated 9 months ago
- Hanoman is an GUI antivirus engine sigature based detection 🐒☆48Updated 3 years ago
- Sp00fer blog post -☆26Updated 2 years ago
- A LKM (Loadable Kernel Module) to execute a command as root; I include a example of using netcat and a compiled(with source and steps on…☆16Updated 8 months ago
- Inject Metasploit Shell Code in Legitimate Process☆11Updated 4 years ago
- PoC Ransomware with Coinbase Commerce integration built on C# .NET Framework (console) and PHP☆25Updated 3 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- Malware development: persistence - part 1: startup folder registry keys. C++ implementation☆12Updated 3 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 3 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 3 years ago
- A collection of Vulnerable Windows Drivers☆15Updated 3 years ago
- Collection of various WINAPI tricks / features used or abused by Malware☆13Updated 3 years ago
- ☆14Updated last year
- PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆47Updated 2 years ago
- 🐍 Python Exploit for CVE-2022-23935☆13Updated 2 years ago
- Collection of IDA helpers☆16Updated 2 years ago
- This module exploits a vulnerability in WinRAR (CVE-2023-38831). When a user opens a crafted RAR file and its embedded document, a script…☆12Updated last year
- Static Decryptor for IcedID Malware☆18Updated 2 years ago
- Bind shell that uses Named Pipes as transport and execute PowerShell code through Runspaces.☆16Updated 5 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 4 years ago
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆21Updated last year