sxyrxyy / CVE-2025-8088-WinRAR-Proof-of-Concept-PoC-Exploit-Links
CVE-2025-8088 WinRAR Proof of Concept (PoC-Exploit)
☆63Updated 4 months ago
Alternatives and similar repositories for CVE-2025-8088-WinRAR-Proof-of-Concept-PoC-Exploit-
Users that are interested in CVE-2025-8088-WinRAR-Proof-of-Concept-PoC-Exploit- are comparing it to the libraries listed below
Sorting:
- Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.☆87Updated last year
- ☆259Updated 6 months ago
- A keygen for Specter Insight C2☆41Updated 10 months ago
- A robust Windows Process Executable Packer and Launcher implementation written in Rust for Windows x64 systems.☆41Updated last year
- An easy to install and easy to run tool for generating exploit payloads for CVE-2023-38831, WinRAR RCE before versions 6.23☆116Updated 2 years ago
- Exploit for CVE-2025-11001 or CVE-2025-11002☆148Updated 2 months ago
- Privilege escalation using the XAML diagnostics API (CVE-2023-36003)☆93Updated 2 years ago
- PoC - Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (Scanner and Exploit)☆94Updated last year
- Collection of script templates to create infinite UAC prompts forcing a user to run as admin ⚠☆116Updated this week
- Execute shellcode files with rundll32☆214Updated last year
- This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.☆153Updated 10 months ago
- This repository is a tool to create a .suo that when run by visual studio's will achieve code execution☆111Updated 2 years ago
- ( 0day ) Local Privilege Escalation in IObit Malware Fighter☆162Updated 9 months ago
- Seamless remote browser session control☆224Updated 6 months ago
- A malware-analysis tool that identify the exact position and details of malicious content in binary files using external Anti-Virus scann…☆37Updated 2 years ago
- Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)☆94Updated 9 months ago
- Chrome browser extension-based Command & Control☆226Updated 6 months ago
- ☆238Updated 2 years ago
- Reflective DLL Injection Made Bella☆248Updated last year
- ☆168Updated 2 years ago
- Reproducing Spyboy technique, which involves terminating all EDR/XDR/AVs processes by abusing the zam64.sys driver☆293Updated 8 months ago
- We found a way to DLL sideload with cleanmgr.exe☆95Updated 10 months ago
- A Python-based VBScript Code Obfuscator☆45Updated last month
- 「🛡️」AVs/EDRs Evasion tool☆103Updated last year
- ☆136Updated last year
- CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability☆146Updated 11 months ago
- Collection of one-liners to bypass User Account Control (UAC) in Windows. These techniques exploit certain behavior in Windows applicatio…☆150Updated last year
- CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overfl…☆51Updated 11 months ago
- Small project looking into how we can build malware with zero-imports by dynamically resolving windows APIs using GetProcAddress and GetM…☆40Updated 2 years ago
- Inject DLLs into the explorer process using icons☆397Updated 7 months ago