kagancapar / 7-zip-malicious-code-vulnerability
Hello everyone, I am posting the malware injection poc video that I detected on 7-zip, just like in WinRAR. It's your choice to believe or not :) I won't apply for a poc code or CVE about it.
☆9Updated 3 years ago
Alternatives and similar repositories for 7-zip-malicious-code-vulnerability
Users that are interested in 7-zip-malicious-code-vulnerability are comparing it to the libraries listed below
Sorting:
- POC for scanning ProxyShell(CVE-2021-34523,CVE-2021-34473,CVE-2021-31207)☆17Updated 3 years ago
- ShellC0de Generator☆11Updated 4 years ago
- Browser-based QRLJacking tool written in pure JavaScript. For educational use only.☆18Updated 8 months ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Updated 5 years ago
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆21Updated last year
- 🐍 Python Exploit for CVE-2022-23935☆13Updated 2 years ago
- Staged Payloads from Kali Linux - Part 1,2 of 3☆20Updated 2 years ago
- This module exploits a vulnerability in WinRAR (CVE-2023-38831). When a user opens a crafted RAR file and its embedded document, a script…☆12Updated last year
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆12Updated 2 years ago
- A collection of Vulnerable Windows Drivers☆15Updated 3 years ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆24Updated 2 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 3 years ago
- Collection of IDA helpers☆16Updated 2 years ago
- ☆16Updated 6 years ago
- Analyze Windows Systems for common and unique vulnerabilities☆9Updated 2 years ago
- A windows hardening script that makes it difficult to compromise a Windows device. Only for use during Blue-Team Competitions.☆28Updated 9 months ago
- An Assembly x86 code that shows Windows MessageBox kept as simple as possible.☆11Updated 2 years ago
- ☆7Updated last year
- An End to End Encrypted SMS and SMS Tunneling app☆40Updated 2 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- Blocking smartscreen, security center, forensic processes and 3rd party security applications on Windows Operating Systems☆15Updated 2 years ago
- Adobe Reader DC Information Leak Exploit☆21Updated 2 years ago
- Recon-ng modules for basic OSINT.☆11Updated 3 years ago
- Sr. Penetration Tester. Creator of Sn1per. Top 20 worldwide on @BugCrowd in 2016. OSCE/OSCP/CISSP/Security+☆26Updated last year
- ☆11Updated 4 years ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 3 years ago
- ☆12Updated 4 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 3 years ago
- Inject Metasploit Shell Code in Legitimate Process☆11Updated 4 years ago