Advanced WinRAR Path Traversal Exploit Tool for CVE-2025-8088
☆55Aug 18, 2025Updated 6 months ago
Alternatives and similar repositories for CVE-2025-8088-Winrar-Tool
Users that are interested in CVE-2025-8088-Winrar-Tool are comparing it to the libraries listed below
Sorting:
- Whenever PowerShell is launched, Notepad will also open. You can customize the script for educational purposes, but I emphasize that I do…☆12Apr 21, 2025Updated 10 months ago
- Loads NTDLL, parses the PE file, extracts "Zw" functions, retrieves their System Service Numbers (SSNs), and prints each function’s name,…☆15Apr 21, 2025Updated 10 months ago
- forgive me :3☆34Jan 1, 2026Updated 2 months ago
- Prevent in-process process termination by patching exit APIs☆63Nov 9, 2025Updated 4 months ago
- ☆21Jan 8, 2026Updated 2 months ago
- PhantomDelay is a precise delay function that uses the Windows high resolution performance counter to pause your program for a specified …☆19May 8, 2025Updated 10 months ago
- Mass Hunting & Exploitation PoC for CVE-2025-55182 & CVE-2025-66478☆38Dec 7, 2025Updated 3 months ago
- Hook system calls on Windows by using Kaspersky's hypervisor☆17Dec 25, 2024Updated last year
- Pattern-based AMSI bypass that patches AMSI.dll in memory by modifying comparison values, conditional jumps, and function prologues to ne…☆28May 13, 2025Updated 9 months ago
- golang decryption poc of the new app bound encryption introduced in chrome version 127.☆22Nov 4, 2024Updated last year
- Evilbytecode-Gate resolves Windows System Service Numbers (SSNs) using two methods: analyzing the Guard CF Table in ntdll.dll and parsing…☆26Apr 21, 2025Updated 10 months ago
- New 0 day vulnerability allowing to leak NTLM hashes from browsers with one click☆208Nov 18, 2025Updated 3 months ago
- Yet another shellcode loader - but a sneaky one☆25Apr 16, 2025Updated 10 months ago
- Metasploit module for CVE-2025-24071 - Windows NTLM Hash Leak via .library-ms☆26Mar 18, 2025Updated 11 months ago
- kASLR bypass technique on Intel CPUs.☆32May 18, 2025Updated 9 months ago
- Obfuscating function calls using Vectored Exception Handlers by redirecting execution through exception-based control flow. Uses byte swa…☆116Oct 30, 2025Updated 4 months ago
- The best powershell obfuscator ever made☆125Aug 1, 2025Updated 7 months ago
- A C++ wrapper for icedx86 decoder☆48Jul 28, 2025Updated 7 months ago
- Ransomware written in go, encrypt - decrypt.☆30Apr 27, 2025Updated 10 months ago
- extract chromium-based browser's cookies using chrome's remote debugging without admin rights☆22Nov 3, 2024Updated last year
- ☆29Oct 19, 2024Updated last year
- Implementing Ghostly-Hollowing using tampered syscalls for remote PE injection☆71Dec 26, 2025Updated 2 months ago
- Plantronics Desktop Hub LPE☆37May 15, 2024Updated last year
- Leaking kernel addresses from ETW consumers. Requires Administrator privileges.☆91Nov 6, 2025Updated 4 months ago
- A portable C# utility for enumerating local and remote windows sessions☆56Jan 1, 2026Updated 2 months ago
- sideloading PoC using onedrive.exe & version.dll☆92Oct 30, 2025Updated 4 months ago
- Remote service-staging tool built on Impacket, designed for BOF-style lateral movement workflows that lets you upload custom service load…☆119Dec 7, 2025Updated 3 months ago
- Modern security products (CrowdStrike, Bitdefender, SentinelOne, etc.) hook the nLoadImage function inside clr.dll to intercept and scan …☆206Dec 8, 2025Updated 3 months ago
- Dirty PoC on how to abuse S1's VEH for Vectored Syscalls and Local Execution☆44Oct 11, 2025Updated 4 months ago
- ATL.dll and WmiMgmt.msc UAC Bypass☆12Apr 26, 2025Updated 10 months ago
- ☆13Jan 17, 2025Updated last year
- Original hVNC has been recoded to work with all version of windows above XP. Thanks to the original author for this wonderful tool.☆10Oct 13, 2021Updated 4 years ago
- ☆21Jul 25, 2017Updated 8 years ago
- Stealthy x64 thread manipulation library for calling functions inside target processes without creating remote threads or installing hook…☆59Oct 10, 2025Updated 5 months ago
- AliGuard PHP WAF☆12Feb 16, 2024Updated 2 years ago
- Bypasses AMSI protection through remote memory patching and parsing technique.☆54May 12, 2025Updated 9 months ago
- the first BlankOBFv2 deobfuscator made in python☆10Jun 19, 2024Updated last year
- Two simple plugins for wireshark that can help in Network Forensics CTFs☆12Apr 21, 2025Updated 10 months ago
- ☆20Sep 6, 2025Updated 6 months ago