knight0x07 / WinRAR-Code-Execution-Vulnerability-CVE-2023-38831View external linksLinks
Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)
☆40Aug 28, 2023Updated 2 years ago
Alternatives and similar repositories for WinRAR-Code-Execution-Vulnerability-CVE-2023-38831
Users that are interested in WinRAR-Code-Execution-Vulnerability-CVE-2023-38831 are comparing it to the libraries listed below
Sorting:
- ☆36Oct 26, 2023Updated 2 years ago
- This project is an EDRSandblast fork, adding some features and custom pieces of code.☆25Sep 29, 2023Updated 2 years ago
- Classic Process Injection with Memory Evasion Techniques implemantation☆72Oct 28, 2023Updated 2 years ago
- HTML Smuggling with Web Assembly☆66Feb 20, 2024Updated last year
- Launch a Windows EXE file with this EXE file (application filter evasion)☆15Mar 10, 2017Updated 8 years ago
- Python3 tool to perform password spraying using RDP☆16Aug 14, 2023Updated 2 years ago
- A lightweight HTTP/HTTPS reverse proxy for efficient, policy-based traffic filtering and redirection.☆45Jun 27, 2023Updated 2 years ago
- A Python script that embeds Target VBS into LNK and when executed runs the VBS script from within.☆33Dec 5, 2022Updated 3 years ago
- ☆131Dec 4, 2023Updated 2 years ago
- CVE-2024-3400 Palo Alto OS Command Injection☆161Apr 16, 2024Updated last year
- Python module for running BOFs☆79Nov 28, 2025Updated 2 months ago
- Another approach of Threadless injection discovered by @_EthicalChaos_ in c that loads a module into the target process and stomps it, an…☆185Aug 2, 2023Updated 2 years ago
- ☆26Mar 6, 2025Updated 11 months ago
- ☆151Oct 2, 2023Updated 2 years ago
- XOR decrypting shellcode using the GPU with OpenCL.☆120May 22, 2025Updated 8 months ago
- Just some random Red Team Scripts that can be useful☆154Jun 28, 2024Updated last year
- TypeLib persistence technique☆139Oct 22, 2024Updated last year
- ☆149May 22, 2023Updated 2 years ago
- Yet, Another Packer/Loader☆25Feb 26, 2023Updated 2 years ago
- CVE-2024-29895 PoC - Exploiting remote command execution in Cacti servers using the 1.3.X DEV branch builds☆23May 15, 2024Updated last year
- Collection of random RedTeam scripts.☆211Mar 8, 2024Updated last year
- ☆61Dec 15, 2023Updated 2 years ago
- ☆75Feb 4, 2024Updated 2 years ago
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆26Feb 29, 2024Updated last year
- ☆21Feb 22, 2025Updated 11 months ago
- Crystal Palace library for proxying Nt API calls via the Threadpool☆97Oct 18, 2025Updated 3 months ago
- a demo module for the kaine agent to execute and inject assembly modules☆41Aug 28, 2024Updated last year
- Items related to the RedELK workshop given at security conferences☆29Sep 28, 2023Updated 2 years ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆16Nov 1, 2023Updated 2 years ago
- Simple POC of Voice C2 using Speech Recognition☆13Apr 27, 2022Updated 3 years ago
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Dec 12, 2019Updated 6 years ago
- CLI version of NetworkMiner (https://www.netresec.com/?page=NetworkMiner)☆13Dec 1, 2025Updated 2 months ago
- Simple reverse ICMP shell☆14Apr 30, 2024Updated last year
- A PoC for CVE-2022-2588 that triggers a WARNING☆10Sep 28, 2022Updated 3 years ago
- A shellcode function to encrypt a running process image when sleeping.☆340Sep 11, 2021Updated 4 years ago
- Use hardware breakpoints to spoof the call stack for both syscalls and API calls☆201Jun 6, 2024Updated last year
- Library of BOFs to interact with SQL servers☆222Dec 3, 2025Updated 2 months ago
- Get-PDInvokeImports is tool (PowerShell module) which is able to perform automatic detection of P/Invoke, Dynamic P/Invoke and D/Invoke u…☆54Apr 10, 2022Updated 3 years ago
- A PoC of the ContainYourself research presented in DEFCON 31, which abuses the Windows containers framework to bypass EDRs.☆319Aug 31, 2023Updated 2 years ago