xaitax / WinRAR-CVE-2023-38831Links
This module exploits a vulnerability in WinRAR (CVE-2023-38831). When a user opens a crafted RAR file and its embedded document, a script is executed, leading to code execution.
☆12Updated last year
Alternatives and similar repositories for WinRAR-CVE-2023-38831
Users that are interested in WinRAR-CVE-2023-38831 are comparing it to the libraries listed below
Sorting:
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆15Updated 6 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- ☆17Updated 2 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆19Updated 5 years ago
- Recon-ng modules for basic OSINT.☆11Updated 3 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 3 years ago
- ☆16Updated 2 years ago
- Collection of scripts that I created to make my life easier.☆11Updated 4 years ago
- Extension functionality for the NightHawk operator client☆27Updated last year
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 5 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 3 years ago
- ☆27Updated 2 years ago
- A python script to check if URLs are allowed or disallowed by a robots.txt file.☆22Updated 5 months ago
- Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831)☆41Updated last year
- Execute embedded Mimikatz☆13Updated 3 years ago
- Materials for CVE-2024-30052.☆13Updated 9 months ago
- Exfiltrate files using the HTTP protocol version ("HTTP/1.0" is a 0 and "HTTP/1.1" is a 1)☆23Updated 3 years ago
- ☆19Updated last year
- A collection of Vulnerable Windows Drivers☆15Updated 3 years ago
- wsnet☆26Updated last month
- WIP Post-exploitation framework tailored for hypervisors.☆50Updated last year
- ☆18Updated 6 months ago
- AES-256 Microsoft Cryptography API Example Use.☆31Updated last year
- TCP Data Transfer Tool By ClumsyLulz☆12Updated 2 years ago
- Yet, Another Packer/Loader☆25Updated 2 years ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆24Updated 2 years ago
- Stealthy Loader-cum-dropper/stage-1/stager targeting Windows10☆37Updated 2 years ago
- Powershell implementation of a novel technique. Invoke-GPTObfuscation is a PowerShell Obfuscator that utilizes OpenAI (and other APIs) to…☆49Updated last year
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- ☆12Updated 3 years ago