onlytoxi / CVE-2025-8088-Winrar-ToolLinks
Advanced WinRAR Path Traversal Exploit Tool for CVE-2025-8088
☆43Updated 3 months ago
Alternatives and similar repositories for CVE-2025-8088-Winrar-Tool
Users that are interested in CVE-2025-8088-Winrar-Tool are comparing it to the libraries listed below
Sorting:
- Shellcode Loader Library.☆13Updated 2 months ago
- A unique introduction to native runtime obfuscation.☆74Updated 8 months ago
- C2 Agent fully PIC for Mythic with advanced evasion capabilities, dotnet/powershell/shellcode/bof memory executions, lateral moviments, p…☆169Updated 2 weeks ago
- Injecting DLL into LSASS at boot☆145Updated 7 months ago
- Generate an Alphabetical Polymorphic Shellcode☆130Updated 3 months ago
- Process hollowing C# shellcode runner that is FUD against Microsoft Defender as of October 7, 2023.☆24Updated 2 years ago
- kernel callback removal (Bypassing EDR Detections)☆201Updated 2 weeks ago
- ( 0day ) Local Privilege Escalation in IObit Malware Fighter☆161Updated 7 months ago
- Malleable shellcode loader written in C and Assembly utilizing direct or indirect syscalls for evading EDR hooks☆132Updated 11 months ago
- Code execution/injection technique using DLL PEB module structure manipulation☆213Updated 5 months ago
- Reflective DLL Injection Made Bella☆244Updated 10 months ago
- Generating legitimate call stack frame along with indirect syscalls by abusing Vectored Exception Handling (VEH) to bypass User-Land EDR …☆287Updated last year
- UAC Bypass using UIAccess program QuickAssist☆138Updated last week
- Proof of Concept for manipulating the Kernel Callback Table in the Process Environment Block (PEB) to perform process injection and hijac…☆260Updated last year
- ☆378Updated 5 months ago
- Sleep obfuscation☆250Updated 11 months ago
- BOF with Synthetic Stackframe☆188Updated 3 weeks ago
- Playing around with Thread Context Hijacking. Building more evasive primitives to use as alternative for existing process injection techn…☆192Updated 5 months ago
- Dynamic shellcode loader with sophisticated evasion capabilities☆257Updated last month
- A Free Open sourced crypter that builds a output .NET .exe Stub (Updated whenever I feel like it)☆19Updated last month
- Waiting Thread Hijacking - injection by overwriting the return address of a waiting thread☆249Updated 2 months ago
- Pattern-based AMSI bypass that patches AMSI.dll in memory by modifying comparison values, conditional jumps, and function prologues to ne…☆25Updated 6 months ago
- Proof of Concepts code for Bring Your Own Vulnerable Driver techniques☆195Updated 3 months ago
- This GitHub repository contains benign specimens; however, the techniques demonstrated herein could potentially be exploited for maliciou…☆17Updated last year
- The following two code samples can be used to understand the difference between direct syscalls and indirect syscalls☆217Updated last year
- This is the loader that supports running a program with Protected Process Light (PPL) protection functionality.☆274Updated 3 weeks ago
- A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.☆200Updated last year
- Reflective shellcode loaderwith advanced call stack spoofing and .NET support.☆220Updated 2 months ago
- A WIP shellcode loader tool which bypasses AV/EDR, coded in C++, and equipped with a minimal builder.☆78Updated 2 months ago
- Yandex browser passwords and credit-cards decryption algorithm☆21Updated 7 months ago