Proof of Concept for CVE-2025-6218, demonstrating the exploitation of a vulnerability in WinRAR versions 7.11 and under, involving improper handling of archive extraction paths.
☆30Jul 1, 2025Updated 8 months ago
Alternatives and similar repositories for CVE-2025-6218-POC
Users that are interested in CVE-2025-6218-POC are comparing it to the libraries listed below
Sorting:
- ☆32Updated this week
- ☆15Feb 5, 2025Updated last year
- Check Your IP Address☆10Mar 12, 2022Updated 3 years ago
- SPAMer work☆10Oct 18, 2019Updated 6 years ago
- 🔐 EntroPy Password Generator A powerful Python-based password generator with 20+ modes, producing high-entropy passwords (15–128 chars, …☆20Nov 23, 2025Updated 3 months ago
- A curated list of awesome AI tools for generating and manipulating 3D models using text, images, or AI-enhanced modeling engines.☆14Apr 19, 2025Updated 10 months ago
- A tiny runtime hot patch tool for JAVA☆14Dec 22, 2024Updated last year
- A decentralized autonomous organization (DAO) starter kit. This DApp allows users to propose governance actions and vote on them using a …☆22Jan 23, 2026Updated last month
- A semantic analysis tool for debugging python code☆24Jan 12, 2026Updated last month
- ☆21May 19, 2024Updated last year
- 🐙 Yusher Web Browsers☆12Nov 2, 2021Updated 4 years ago
- Un poco sobre mi perfil!☆10Updated this week
- An advanced NFT launchpad starter kit using ERC721A for low-gas batch minting and Merkle Proofs for gas-efficient whitelist verification.☆21Jan 23, 2026Updated last month
- Malware dev tricks. Syscalls part 1. Simple C example☆10Jun 8, 2023Updated 2 years ago
- A portfolio of web apps for the CodeCademy Mastering Generative AI & Agents for Developers Bootcamp (Aug-Sep 2025)☆19Jan 28, 2026Updated last month
- ☆16Feb 19, 2026Updated 2 weeks ago
- Reversed WintaPix Malware Source code | That targets countries in the Middle East and abuse KeServiceDescriptorTable(SSDT), persistence a…☆22Jul 6, 2024Updated last year
- ☆15Oct 13, 2024Updated last year
- ☆20Sep 5, 2025Updated 6 months ago
- Implementation of Google Brain's 2017 research paper. Attention is all you need! Trained and validated on Opus Books dataset☆20Jul 23, 2025Updated 7 months ago
- ⚠️ A powerful Python-based WiFi network scanner and Brute-Force password attacking tool for educational and authorized testing purposes. …☆24Nov 4, 2025Updated 4 months ago
- ☆10Apr 13, 2021Updated 4 years ago
- 🎮 Tetris with AI vs AI mode, 8-bit sound, theme shop, replay sharing & more — zero dependencies PWA☆24Feb 15, 2026Updated 3 weeks ago
- A professional exploration of reflective analytics, dashboards that evolve through user interaction. This project reimagines BI systems a…☆23Nov 5, 2025Updated 4 months ago
- ☆10Oct 1, 2024Updated last year
- A full stack blog application built with Next.js 15, MongoDB, and Tailwind CSS featuring frontend, backend, and admin panel. 📚☆13Aug 25, 2025Updated 6 months ago
- Modern Ansible Management Interface☆17Sep 8, 2025Updated 6 months ago
- Animapi adalah library scrapper anime streaming dengan sangat cepat dan mudah digunakan.☆20Oct 6, 2025Updated 5 months ago
- Every click in Telegram matters! Turn your footprints into rewards with PAWS! 🐾☆10Nov 6, 2024Updated last year
- PhantomDelay is a precise delay function that uses the Windows high resolution performance counter to pause your program for a specified …☆19May 8, 2025Updated 10 months ago
- CVE-2025-59501 POC code☆25Nov 20, 2025Updated 3 months ago
- A full-stack Instagram clone built with React.js for the frontend, Spring Boot for the backend, and MySQL as the database. Includes user …☆22Jan 2, 2026Updated 2 months ago
- ChronoPulse is a modular, terminal-based pulse tracking engine built entirely in Go. It collects timestamped events in real time, analyze…☆29Nov 13, 2025Updated 3 months ago
- A robust, TypeScript-powered RESTful API for managing books and borrowing records in a library system. Built with Express.js, MongoDB, an…☆18Sep 21, 2025Updated 5 months ago
- Hello everyone! Here I used TS and his modules. This game might be interesting for you.☆26Sep 29, 2025Updated 5 months ago
- A critical RCE vulnerability in Windows TCP/IP stack (CVE-2025-26686) leaves sensitive memory unlocked, allowing remote attackers to hija…☆32Sep 16, 2025Updated 5 months ago
- A comprehensive, professional guide explaining the differences, strengths, and best practices of Retrieval-Augmented Generation (RAG) and…☆26Oct 31, 2025Updated 4 months ago
- ☆23Nov 16, 2025Updated 3 months ago
- ☆12Apr 5, 2025Updated 11 months ago