knight0x07 / WinRAR-Code-Execution-Vulnerability-CVE-2023-38831Links
Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)
☆41Updated last year
Alternatives and similar repositories for WinRAR-Code-Execution-Vulnerability-CVE-2023-38831
Users that are interested in WinRAR-Code-Execution-Vulnerability-CVE-2023-38831 are comparing it to the libraries listed below
Sorting:
- in-process powershell runner for BRC4☆45Updated last year
- ☆55Updated 8 months ago
- ☆34Updated 2 months ago
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆63Updated 5 months ago
- ☆48Updated 2 years ago
- Creation and removal of Defender path exclusions and exceptions in C#.☆31Updated last year
- A repository with my code snippets for research/education purposes.☆50Updated last year
- A method to execute shellcode using RegisterWaitForInputIdle API.☆54Updated 2 years ago
- "D3MPSEC" is a memory dumping tool designed to extract memory dump from Lsass process using various techniques, including direct system c…☆24Updated 9 months ago
- Beacon Object Files (BOF) for Cobalt Strike.☆31Updated 10 months ago
- A LAPS dumper written using the impacket library.☆31Updated 2 years ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆42Updated 10 months ago
- SAM Dumping in C#☆48Updated 5 months ago
- Some of the presentations, workshops, and labs I gave at public conferences.☆33Updated last month
- Unfixed Windows PowerShell Filename Code Execution POC☆41Updated last year
- Tool to aid in dumping LSASS process remotely☆40Updated 10 months ago
- malleable profile generator GUI for Havoc☆55Updated 2 years ago
- These are the slide decks and source code for Brute Ratel Seminar conducted on 24th August 2023. The youtube video for the seminar can be…☆19Updated last year
- A Cobalt Strike payload generator and lateral movement aggressor script which places Beacon shellcode into a custom shellcode loader☆40Updated 8 months ago
- A small Aggressor script to help Red Teams identify foreign processes on a host machine☆85Updated 2 years ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated last year
- ☆48Updated 2 years ago
- Create Anti-Copy DRM Malware☆58Updated 10 months ago
- ☆29Updated last year
- a short C code POC to gain persistence and evade sysmon event code registry (creation, update and deletion) REG_NOTIFY_CLASS Registry Cal…☆51Updated last year
- Duplicate not owned Token from Running Process☆72Updated last year
- Demonstration of Early Bird APC Injection - MITRE ID T1055.004☆32Updated last year
- ☆38Updated 2 weeks ago
- An Aggressor Script that utilizes NtCreateUserProcess to run binaries☆30Updated 4 months ago
- Items related to the RedELK workshop given at security conferences☆29Updated last year