2023-08-24 20:50:33 +02:00
[
{
"id" : 682645268 ,
"name" : "winrar_CVE-2023-38831_lazy_poc" ,
"full_name" : "BoredHackerBlog\/winrar_CVE-2023-38831_lazy_poc" ,
"owner" : {
"login" : "BoredHackerBlog" ,
"id" : 38662926 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/38662926?v=4" ,
"html_url" : "https:\/\/github.com\/BoredHackerBlog"
} ,
"html_url" : "https:\/\/github.com\/BoredHackerBlog\/winrar_CVE-2023-38831_lazy_poc" ,
"description" : "lazy way to create CVE-2023-38831 winrar file for testing" ,
"fork" : false ,
"created_at" : "2023-08-24T16:03:07Z" ,
2023-09-03 08:29:35 +02:00
"updated_at" : "2023-09-03T04:04:23Z" ,
2023-08-24 20:50:33 +02:00
"pushed_at" : "2023-08-24T16:13:02Z" ,
2023-09-03 08:29:35 +02:00
"stargazers_count" : 89 ,
"watchers_count" : 89 ,
2023-08-24 20:50:33 +02:00
"has_discussions" : false ,
2023-09-05 08:43:24 +02:00
"forks_count" : 19 ,
2023-08-24 20:50:33 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2023-09-05 08:43:24 +02:00
"forks" : 19 ,
2023-09-03 08:29:35 +02:00
"watchers" : 89 ,
2023-08-24 20:50:33 +02:00
"score" : 0 ,
2023-09-06 08:58:28 +02:00
"subscribers_count" : 3
2023-08-25 16:01:36 +02:00
} ,
{
"id" : 682972740 ,
"name" : "CVE-2023-38831-winrar-exploit" ,
"full_name" : "b1tg\/CVE-2023-38831-winrar-exploit" ,
"owner" : {
"login" : "b1tg" ,
"id" : 33436708 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/33436708?v=4" ,
"html_url" : "https:\/\/github.com\/b1tg"
} ,
"html_url" : "https:\/\/github.com\/b1tg\/CVE-2023-38831-winrar-exploit" ,
2023-08-26 15:44:00 +02:00
"description" : "CVE-2023-38831 winrar exploit generator" ,
2023-08-25 16:01:36 +02:00
"fork" : false ,
"created_at" : "2023-08-25T09:44:08Z" ,
2023-09-19 20:36:28 +02:00
"updated_at" : "2023-09-19T14:24:34Z" ,
2023-09-17 08:26:43 +02:00
"pushed_at" : "2023-09-17T02:17:52Z" ,
2023-09-19 20:36:28 +02:00
"stargazers_count" : 633 ,
"watchers_count" : 633 ,
2023-08-25 16:01:36 +02:00
"has_discussions" : false ,
2023-09-19 08:28:34 +02:00
"forks_count" : 111 ,
2023-08-25 16:01:36 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"0day" ,
2023-08-26 15:44:00 +02:00
"cve" ,
2023-08-25 16:01:36 +02:00
"exploit"
] ,
"visibility" : "public" ,
2023-09-19 08:28:34 +02:00
"forks" : 111 ,
2023-09-19 20:36:28 +02:00
"watchers" : 633 ,
2023-08-25 16:01:36 +02:00
"score" : 0 ,
2023-09-14 08:29:19 +02:00
"subscribers_count" : 8
2023-08-27 15:45:49 +02:00
} ,
{
"id" : 683645489 ,
"name" : "CVE-2023-38831-HUNT" ,
"full_name" : "IR-HuntGuardians\/CVE-2023-38831-HUNT" ,
"owner" : {
"login" : "IR-HuntGuardians" ,
"id" : 98984117 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/98984117?v=4" ,
"html_url" : "https:\/\/github.com\/IR-HuntGuardians"
} ,
"html_url" : "https:\/\/github.com\/IR-HuntGuardians\/CVE-2023-38831-HUNT" ,
"description" : null ,
"fork" : false ,
"created_at" : "2023-08-27T08:42:24Z" ,
2023-08-28 15:55:55 +02:00
"updated_at" : "2023-08-28T08:06:21Z" ,
2023-08-27 15:45:49 +02:00
"pushed_at" : "2023-08-27T08:52:19Z" ,
2023-08-28 15:55:55 +02:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2023-08-27 15:45:49 +02:00
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2023-08-28 15:55:55 +02:00
"watchers" : 1 ,
2023-08-27 15:45:49 +02:00
"score" : 0 ,
2023-08-28 08:40:28 +02:00
"subscribers_count" : 1
2023-08-27 20:28:45 +02:00
} ,
{
"id" : 683726401 ,
"name" : "cve-2023-38831" ,
"full_name" : "Garck3h\/cve-2023-38831" ,
"owner" : {
"login" : "Garck3h" ,
"id" : 104743791 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/104743791?v=4" ,
"html_url" : "https:\/\/github.com\/Garck3h"
} ,
"html_url" : "https:\/\/github.com\/Garck3h\/cve-2023-38831" ,
"description" : "一款用于生成winrar程序RCE( 即cve-2023-38831) 的POC的工具。" ,
"fork" : false ,
"created_at" : "2023-08-27T14:08:36Z" ,
2023-09-19 14:31:36 +02:00
"updated_at" : "2023-09-19T08:50:48Z" ,
2023-08-27 20:28:45 +02:00
"pushed_at" : "2023-08-27T14:35:00Z" ,
2023-09-19 14:31:36 +02:00
"stargazers_count" : 91 ,
"watchers_count" : 91 ,
2023-08-27 20:28:45 +02:00
"has_discussions" : false ,
2023-09-07 08:35:32 +02:00
"forks_count" : 17 ,
2023-08-27 20:28:45 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2023-09-07 08:35:32 +02:00
"forks" : 17 ,
2023-09-19 14:31:36 +02:00
"watchers" : 91 ,
2023-08-27 20:28:45 +02:00
"score" : 0 ,
2023-08-28 08:40:28 +02:00
"subscribers_count" : 1
2023-08-28 02:28:45 +02:00
} ,
{
"id" : 683843491 ,
"name" : "CVE-2023-38831-RaRCE" ,
"full_name" : "ignis-sec\/CVE-2023-38831-RaRCE" ,
"owner" : {
"login" : "ignis-sec" ,
"id" : 16636092 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/16636092?v=4" ,
"html_url" : "https:\/\/github.com\/ignis-sec"
} ,
"html_url" : "https:\/\/github.com\/ignis-sec\/CVE-2023-38831-RaRCE" ,
"description" : "An easy to install and easy to run tool for generating exploit payloads for CVE-2023-38831, WinRAR RCE before versions 6.23" ,
"fork" : false ,
"created_at" : "2023-08-27T21:49:37Z" ,
2023-09-19 02:26:28 +02:00
"updated_at" : "2023-09-18T19:52:47Z" ,
2023-08-28 02:28:45 +02:00
"pushed_at" : "2023-08-27T22:17:56Z" ,
2023-09-19 02:26:28 +02:00
"stargazers_count" : 105 ,
"watchers_count" : 105 ,
2023-08-28 02:28:45 +02:00
"has_discussions" : false ,
2023-09-16 02:26:59 +02:00
"forks_count" : 18 ,
2023-08-28 02:28:45 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"archive" ,
"exploit" ,
"exploit-development" ,
"rce" ,
"security" ,
"winrar"
] ,
"visibility" : "public" ,
2023-09-16 02:26:59 +02:00
"forks" : 18 ,
2023-09-19 02:26:28 +02:00
"watchers" : 105 ,
2023-08-28 08:40:28 +02:00
"score" : 0 ,
2023-09-06 08:58:28 +02:00
"subscribers_count" : 2
2023-08-28 08:40:28 +02:00
} ,
{
"id" : 683930555 ,
"name" : "CVE-2023-38831" ,
"full_name" : "HDCE-inc\/CVE-2023-38831" ,
"owner" : {
"login" : "HDCE-inc" ,
"id" : 141088081 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/141088081?v=4" ,
"html_url" : "https:\/\/github.com\/HDCE-inc"
} ,
"html_url" : "https:\/\/github.com\/HDCE-inc\/CVE-2023-38831" ,
"description" : "CVE-2023-38831 PoC (Proof Of Concept)" ,
"fork" : false ,
"created_at" : "2023-08-28T04:56:10Z" ,
2023-09-18 08:36:19 +02:00
"updated_at" : "2023-09-18T02:06:26Z" ,
2023-08-29 02:27:54 +02:00
"pushed_at" : "2023-08-28T20:41:57Z" ,
2023-09-18 08:36:19 +02:00
"stargazers_count" : 18 ,
"watchers_count" : 18 ,
2023-08-28 08:40:28 +02:00
"has_discussions" : false ,
2023-09-08 08:53:41 +02:00
"forks_count" : 3 ,
2023-08-28 08:40:28 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2023-09-08 08:53:41 +02:00
"forks" : 3 ,
2023-09-18 08:36:19 +02:00
"watchers" : 18 ,
2023-08-28 02:28:45 +02:00
"score" : 0 ,
"subscribers_count" : 0
2023-08-28 15:55:55 +02:00
} ,
{
"id" : 684007687 ,
"name" : "CVE-2023-38831_ReverseShell_Winrar-RCE" ,
"full_name" : "Maalfer\/CVE-2023-38831_ReverseShell_Winrar-RCE" ,
"owner" : {
"login" : "Maalfer" ,
"id" : 96432001 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/96432001?v=4" ,
"html_url" : "https:\/\/github.com\/Maalfer"
} ,
"html_url" : "https:\/\/github.com\/Maalfer\/CVE-2023-38831_ReverseShell_Winrar-RCE" ,
"description" : "Pasos necesarios para obtener una reverse shell explotando la vulnerabilidad de winrar CVE-2023-38831 en versiones anteriores a 6.23." ,
"fork" : false ,
"created_at" : "2023-08-28T08:56:16Z" ,
2023-09-18 20:43:36 +02:00
"updated_at" : "2023-09-18T16:06:28Z" ,
2023-08-31 15:50:43 +02:00
"pushed_at" : "2023-08-31T07:40:12Z" ,
2023-09-18 20:43:36 +02:00
"stargazers_count" : 10 ,
"watchers_count" : 10 ,
2023-08-28 20:34:10 +02:00
"has_discussions" : false ,
2023-08-29 20:50:52 +02:00
"forks_count" : 1 ,
2023-08-28 20:34:10 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2023-08-29 20:50:52 +02:00
"forks" : 1 ,
2023-09-18 20:43:36 +02:00
"watchers" : 10 ,
2023-08-28 20:34:10 +02:00
"score" : 0 ,
2023-08-29 08:48:53 +02:00
"subscribers_count" : 1
2023-08-28 20:34:10 +02:00
} ,
{
"id" : 684145331 ,
"name" : "WinRAR-Code-Execution-Vulnerability-CVE-2023-38831" ,
"full_name" : "knight0x07\/WinRAR-Code-Execution-Vulnerability-CVE-2023-38831" ,
"owner" : {
"login" : "knight0x07" ,
"id" : 60843949 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/60843949?v=4" ,
"html_url" : "https:\/\/github.com\/knight0x07"
} ,
"html_url" : "https:\/\/github.com\/knight0x07\/WinRAR-Code-Execution-Vulnerability-CVE-2023-38831" ,
"description" : "Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831) " ,
"fork" : false ,
"created_at" : "2023-08-28T14:48:22Z" ,
2023-09-17 02:30:45 +02:00
"updated_at" : "2023-09-16T21:59:43Z" ,
2023-08-28 20:34:10 +02:00
"pushed_at" : "2023-08-28T15:33:27Z" ,
2023-09-17 02:30:45 +02:00
"stargazers_count" : 35 ,
"watchers_count" : 35 ,
2023-08-28 20:34:10 +02:00
"has_discussions" : false ,
2023-09-16 02:26:59 +02:00
"forks_count" : 9 ,
2023-08-28 20:34:10 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2023-09-16 02:26:59 +02:00
"forks" : 9 ,
2023-09-17 02:30:45 +02:00
"watchers" : 35 ,
2023-08-28 20:34:10 +02:00
"score" : 0 ,
2023-09-06 08:58:28 +02:00
"subscribers_count" : 5
2023-08-28 20:34:10 +02:00
} ,
{
"id" : 684145428 ,
"name" : "cve-2023-38831" ,
"full_name" : "akhomlyuk\/cve-2023-38831" ,
"owner" : {
"login" : "akhomlyuk" ,
"id" : 26635022 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/26635022?v=4" ,
"html_url" : "https:\/\/github.com\/akhomlyuk"
} ,
"html_url" : "https:\/\/github.com\/akhomlyuk\/cve-2023-38831" ,
"description" : "CVE-2023-38831 WinRAR" ,
"fork" : false ,
"created_at" : "2023-08-28T14:48:35Z" ,
"updated_at" : "2023-08-28T15:26:48Z" ,
"pushed_at" : "2023-08-28T15:35:43Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0 ,
2023-08-29 08:48:53 +02:00
"subscribers_count" : 1
2023-08-28 20:34:10 +02:00
} ,
{
"id" : 684162692 ,
"name" : "CVE-2023-38831-KQL" ,
"full_name" : "PascalAsch\/CVE-2023-38831-KQL" ,
"owner" : {
"login" : "PascalAsch" ,
"id" : 20398716 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/20398716?v=4" ,
"html_url" : "https:\/\/github.com\/PascalAsch"
} ,
"html_url" : "https:\/\/github.com\/PascalAsch\/CVE-2023-38831-KQL" ,
2023-08-29 02:27:54 +02:00
"description" : "KQL Hunting for WinRAR CVE-2023-38831" ,
2023-08-28 20:34:10 +02:00
"fork" : false ,
"created_at" : "2023-08-28T15:26:14Z" ,
2023-09-01 20:29:02 +02:00
"updated_at" : "2023-09-01T16:06:40Z" ,
2023-08-28 20:34:10 +02:00
"pushed_at" : "2023-08-28T16:06:17Z" ,
2023-09-01 20:29:02 +02:00
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
2023-08-28 15:55:55 +02:00
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2023-09-01 20:29:02 +02:00
"watchers" : 3 ,
2023-08-28 15:55:55 +02:00
"score" : 0 ,
2023-08-29 08:48:53 +02:00
"subscribers_count" : 1
2023-08-29 02:27:54 +02:00
} ,
{
"id" : 684311499 ,
"name" : "CVE-2023-38831-winrar-expoit-simple-Poc" ,
"full_name" : "my-elliot\/CVE-2023-38831-winrar-expoit-simple-Poc" ,
"owner" : {
"login" : "my-elliot" ,
"id" : 64432235 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/64432235?v=4" ,
"html_url" : "https:\/\/github.com\/my-elliot"
} ,
"html_url" : "https:\/\/github.com\/my-elliot\/CVE-2023-38831-winrar-expoit-simple-Poc" ,
"description" : "CVE-2023-38831 winrar exploit generator and get reverse shell" ,
"fork" : false ,
"created_at" : "2023-08-28T22:08:31Z" ,
2023-09-10 02:33:46 +02:00
"updated_at" : "2023-09-09T22:57:23Z" ,
2023-08-29 02:27:54 +02:00
"pushed_at" : "2023-08-28T23:51:31Z" ,
2023-09-10 02:33:46 +02:00
"stargazers_count" : 10 ,
"watchers_count" : 10 ,
2023-08-29 02:27:54 +02:00
"has_discussions" : false ,
2023-08-30 08:27:15 +02:00
"forks_count" : 1 ,
2023-08-29 02:27:54 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2023-08-30 08:27:15 +02:00
"forks" : 1 ,
2023-09-10 02:33:46 +02:00
"watchers" : 10 ,
2023-08-29 02:27:54 +02:00
"score" : 0 ,
2023-08-29 08:48:53 +02:00
"subscribers_count" : 1
} ,
{
"id" : 684442018 ,
"name" : "CVE-2023-38831" ,
"full_name" : "thegr1ffyn\/CVE-2023-38831" ,
"owner" : {
"login" : "thegr1ffyn" ,
"id" : 95119705 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/95119705?v=4" ,
"html_url" : "https:\/\/github.com\/thegr1ffyn"
} ,
"html_url" : "https:\/\/github.com\/thegr1ffyn\/CVE-2023-38831" ,
"description" : "Proof of Concept (POC) for CVE-2023-38831 WinRAR" ,
"fork" : false ,
"created_at" : "2023-08-29T06:11:42Z" ,
2023-09-10 02:33:46 +02:00
"updated_at" : "2023-09-10T00:28:15Z" ,
2023-08-29 08:48:53 +02:00
"pushed_at" : "2023-08-29T06:36:44Z" ,
2023-09-10 02:33:46 +02:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2023-08-29 08:48:53 +02:00
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2023-09-10 02:33:46 +02:00
"watchers" : 1 ,
2023-08-29 08:48:53 +02:00
"score" : 0 ,
2023-08-30 08:27:15 +02:00
"subscribers_count" : 1
2023-08-29 20:50:52 +02:00
} ,
{
"id" : 684673194 ,
"name" : "CVE-2023-38831-Exploit-and-Detection" ,
"full_name" : "MortySecurity\/CVE-2023-38831-Exploit-and-Detection" ,
"owner" : {
"login" : "MortySecurity" ,
"id" : 6032062 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/6032062?v=4" ,
"html_url" : "https:\/\/github.com\/MortySecurity"
} ,
"html_url" : "https:\/\/github.com\/MortySecurity\/CVE-2023-38831-Exploit-and-Detection" ,
"description" : "This repository has both an attack detection tool and a Proof-of-Concept (PoC) Python script for the WinRAR CVE-2023-38831 vulnerability. " ,
"fork" : false ,
"created_at" : "2023-08-29T16:12:20Z" ,
"updated_at" : "2023-08-29T16:16:01Z" ,
"pushed_at" : "2023-08-29T16:15:56Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
2023-08-30 08:27:15 +02:00
"subscribers_count" : 1
2023-08-30 15:59:27 +02:00
} ,
{
"id" : 685008470 ,
"name" : "CVE-2023-38831" ,
"full_name" : "nhman-python\/CVE-2023-38831" ,
"owner" : {
"login" : "nhman-python" ,
"id" : 104791322 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/104791322?v=4" ,
"html_url" : "https:\/\/github.com\/nhman-python"
} ,
"html_url" : "https:\/\/github.com\/nhman-python\/CVE-2023-38831" ,
"description" : "winrar exploit 6.22 <=" ,
"fork" : false ,
"created_at" : "2023-08-30T10:11:16Z" ,
"updated_at" : "2023-08-30T10:15:43Z" ,
2023-08-31 15:50:43 +02:00
"pushed_at" : "2023-08-31T07:03:02Z" ,
2023-08-30 15:59:27 +02:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 0 ,
"score" : 0 ,
2023-08-31 08:39:21 +02:00
"subscribers_count" : 1
2023-08-30 15:59:27 +02:00
} ,
2023-08-30 20:44:25 +02:00
{
"id" : 685043786 ,
"name" : "CVE-2023-38831-PoC" ,
"full_name" : "z3r0sw0rd\/CVE-2023-38831-PoC" ,
"owner" : {
"login" : "z3r0sw0rd" ,
"id" : 18899200 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/18899200?v=4" ,
"html_url" : "https:\/\/github.com\/z3r0sw0rd"
} ,
"html_url" : "https:\/\/github.com\/z3r0sw0rd\/CVE-2023-38831-PoC" ,
"description" : "Proof-of-Concept for CVE-2023-38831 Zero-Day vulnerability in WinRAR" ,
"fork" : false ,
"created_at" : "2023-08-30T11:52:23Z" ,
2023-08-31 08:39:21 +02:00
"updated_at" : "2023-08-31T02:12:56Z" ,
2023-09-01 15:52:15 +02:00
"pushed_at" : "2023-09-01T07:37:20Z" ,
2023-08-31 08:39:21 +02:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2023-08-30 20:44:25 +02:00
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"archive" ,
"cve-2023-38831" ,
"exploit" ,
"remote-code-execution" ,
"winrar"
] ,
"visibility" : "public" ,
"forks" : 0 ,
2023-08-31 08:39:21 +02:00
"watchers" : 1 ,
2023-08-30 20:44:25 +02:00
"score" : 0 ,
2023-08-31 08:39:21 +02:00
"subscribers_count" : 1
2023-08-31 02:31:21 +02:00
} ,
{
"id" : 685141303 ,
"name" : "CVE-2023-38831_ReverseShell_Winrar" ,
"full_name" : "BeniBeastt\/CVE-2023-38831_ReverseShell_Winrar" ,
"owner" : {
"login" : "BeniBeastt" ,
"id" : 139050304 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/139050304?v=4" ,
"html_url" : "https:\/\/github.com\/BeniBeastt"
} ,
"html_url" : "https:\/\/github.com\/BeniBeastt\/CVE-2023-38831_ReverseShell_Winrar" ,
"description" : null ,
"fork" : false ,
"created_at" : "2023-08-30T15:49:01Z" ,
"updated_at" : "2023-08-30T20:05:54Z" ,
"pushed_at" : "2023-08-30T18:11:13Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
2023-08-31 08:39:21 +02:00
"subscribers_count" : 1
2023-08-31 02:31:21 +02:00
} ,
{
"id" : 685237935 ,
"name" : "CVE-2023-38831-Winrar-Exploit-Generator-POC" ,
"full_name" : "MorDavid\/CVE-2023-38831-Winrar-Exploit-Generator-POC" ,
"owner" : {
"login" : "MorDavid" ,
"id" : 24622066 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/24622066?v=4" ,
"html_url" : "https:\/\/github.com\/MorDavid"
} ,
"html_url" : "https:\/\/github.com\/MorDavid\/CVE-2023-38831-Winrar-Exploit-Generator-POC" ,
2023-09-02 08:27:22 +02:00
"description" : "This is a POC for the CVE-2023-3883 exploit targeting WinRAR up to 6.22. Modified some existing internet-sourced POCs by introducing greater dynamism and incorporated additional try-except blocks within the code." ,
2023-08-31 02:31:21 +02:00
"fork" : false ,
"created_at" : "2023-08-30T19:55:11Z" ,
2023-09-02 08:27:22 +02:00
"updated_at" : "2023-09-02T02:22:57Z" ,
2023-08-31 21:03:03 +02:00
"pushed_at" : "2023-08-31T15:07:51Z" ,
2023-09-02 08:27:22 +02:00
"stargazers_count" : 4 ,
"watchers_count" : 4 ,
2023-08-31 02:31:21 +02:00
"has_discussions" : false ,
2023-09-17 02:30:45 +02:00
"forks_count" : 2 ,
2023-08-31 02:31:21 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"archive" ,
"cve-2023-38831" ,
"exploit" ,
"rce" ,
"rce-exploit" ,
"remote-code-execution" ,
"winrar"
] ,
"visibility" : "public" ,
2023-09-17 02:30:45 +02:00
"forks" : 2 ,
2023-09-02 08:27:22 +02:00
"watchers" : 4 ,
2023-08-31 02:31:21 +02:00
"score" : 0 ,
2023-08-31 08:39:21 +02:00
"subscribers_count" : 1
2023-09-01 20:29:02 +02:00
} ,
{
"id" : 686063338 ,
"name" : "CVE-2023-38831-winrar" ,
"full_name" : "Mich-ele\/CVE-2023-38831-winrar" ,
"owner" : {
"login" : "Mich-ele" ,
"id" : 30556763 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/30556763?v=4" ,
"html_url" : "https:\/\/github.com\/Mich-ele"
} ,
"html_url" : "https:\/\/github.com\/Mich-ele\/CVE-2023-38831-winrar" ,
"description" : "CVE-2023-38831 winrar exploit builder" ,
"fork" : false ,
"created_at" : "2023-09-01T16:45:42Z" ,
"updated_at" : "2023-09-01T17:44:03Z" ,
"pushed_at" : "2023-09-01T17:43:16Z" ,
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2023-38831" ,
"exploit" ,
"winrar"
] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 3 ,
"score" : 0 ,
2023-09-02 08:27:22 +02:00
"subscribers_count" : 1
2023-09-03 15:41:16 +02:00
} ,
{
"id" : 686580975 ,
"name" : "CVE-2023-38831" ,
"full_name" : "asepsaepdin\/CVE-2023-38831" ,
"owner" : {
"login" : "asepsaepdin" ,
"id" : 122620685 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/122620685?v=4" ,
"html_url" : "https:\/\/github.com\/asepsaepdin"
} ,
"html_url" : "https:\/\/github.com\/asepsaepdin\/CVE-2023-38831" ,
"description" : null ,
"fork" : false ,
"created_at" : "2023-09-03T09:18:56Z" ,
"updated_at" : "2023-09-03T10:42:39Z" ,
2023-09-03 20:28:41 +02:00
"pushed_at" : "2023-09-03T14:08:09Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
2023-09-04 08:38:46 +02:00
"subscribers_count" : 1
2023-09-03 20:28:41 +02:00
} ,
{
"id" : 686652092 ,
"name" : "WinrarExploit" ,
"full_name" : "K3rnel-Dev\/WinrarExploit" ,
"owner" : {
"login" : "K3rnel-Dev" ,
"id" : 132711888 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/132711888?v=4" ,
"html_url" : "https:\/\/github.com\/K3rnel-Dev"
} ,
"html_url" : "https:\/\/github.com\/K3rnel-Dev\/WinrarExploit" ,
"description" : "CVE-2023-38831-WINRAR-EXPLOIT GENERATOR" ,
"fork" : false ,
"created_at" : "2023-09-03T14:03:45Z" ,
2023-09-11 02:37:18 +02:00
"updated_at" : "2023-09-10T18:43:04Z" ,
2023-09-03 20:28:41 +02:00
"pushed_at" : "2023-09-03T14:14:30Z" ,
2023-09-11 02:37:18 +02:00
"stargazers_count" : 4 ,
"watchers_count" : 4 ,
2023-09-03 20:28:41 +02:00
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"0day" ,
"exploit" ,
"winrar"
] ,
"visibility" : "public" ,
"forks" : 0 ,
2023-09-11 02:37:18 +02:00
"watchers" : 4 ,
2023-09-03 20:28:41 +02:00
"score" : 0 ,
2023-09-04 08:38:46 +02:00
"subscribers_count" : 1
2023-09-03 20:28:41 +02:00
} ,
{
"id" : 686665715 ,
"name" : "CVE-2023-38831-winrar-exploit" ,
"full_name" : "Fa1c0n35\/CVE-2023-38831-winrar-exploit" ,
"owner" : {
"login" : "Fa1c0n35" ,
"id" : 33335488 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/33335488?v=4" ,
"html_url" : "https:\/\/github.com\/Fa1c0n35"
} ,
"html_url" : "https:\/\/github.com\/Fa1c0n35\/CVE-2023-38831-winrar-exploit" ,
"description" : null ,
"fork" : false ,
"created_at" : "2023-09-03T14:53:42Z" ,
"updated_at" : "2023-09-03T14:53:55Z" ,
"pushed_at" : "2023-09-03T14:53:52Z" ,
2023-09-03 15:41:16 +02:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
2023-09-04 08:38:46 +02:00
"subscribers_count" : 1
2023-09-04 02:29:17 +02:00
} ,
{
"id" : 686761346 ,
"name" : "WinRAR-CVE-2023-38831" ,
"full_name" : "xaitax\/WinRAR-CVE-2023-38831" ,
"owner" : {
"login" : "xaitax" ,
"id" : 5014849 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/5014849?v=4" ,
"html_url" : "https:\/\/github.com\/xaitax"
} ,
"html_url" : "https:\/\/github.com\/xaitax\/WinRAR-CVE-2023-38831" ,
"description" : "This module exploits a vulnerability in WinRAR (CVE-2023-38831). When a user opens a crafted RAR file and its embedded document, a script is executed, leading to code execution." ,
"fork" : false ,
"created_at" : "2023-09-03T21:14:05Z" ,
2023-09-16 14:27:54 +02:00
"updated_at" : "2023-09-16T06:41:55Z" ,
2023-09-08 08:53:41 +02:00
"pushed_at" : "2023-09-08T06:15:42Z" ,
2023-09-16 14:27:54 +02:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2023-09-04 02:29:17 +02:00
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2023-09-16 14:27:54 +02:00
"watchers" : 1 ,
2023-09-04 02:29:17 +02:00
"score" : 0 ,
2023-09-04 08:38:46 +02:00
"subscribers_count" : 1
2023-09-04 02:29:17 +02:00
} ,
2023-09-07 16:41:22 +02:00
{
"id" : 688341659 ,
"name" : "CVE-2023-38831-winrar" ,
"full_name" : "GOTonyGO\/CVE-2023-38831-winrar" ,
"owner" : {
"login" : "GOTonyGO" ,
"id" : 107836621 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/107836621?v=4" ,
"html_url" : "https:\/\/github.com\/GOTonyGO"
} ,
"html_url" : "https:\/\/github.com\/GOTonyGO\/CVE-2023-38831-winrar" ,
"description" : "Quick exploit builder for CVE-2023-38831, a vulnerability that affects WinRAR versions before 6.23." ,
"fork" : false ,
"created_at" : "2023-09-07T06:42:36Z" ,
"updated_at" : "2023-09-07T06:44:20Z" ,
"pushed_at" : "2023-09-07T06:45:37Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
2023-09-08 08:53:41 +02:00
"subscribers_count" : 1
2023-09-12 20:51:52 +02:00
} ,
{
"id" : 690603491 ,
"name" : "CVE-2023-38831" ,
"full_name" : "Malwareman007\/CVE-2023-38831" ,
"owner" : {
"login" : "Malwareman007" ,
"id" : 86009160 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/86009160?v=4" ,
"html_url" : "https:\/\/github.com\/Malwareman007"
} ,
"html_url" : "https:\/\/github.com\/Malwareman007\/CVE-2023-38831" ,
"description" : "CVE-2023-38831 WinRaR Exploit Generator" ,
"fork" : false ,
"created_at" : "2023-09-12T14:07:00Z" ,
2023-09-18 20:43:36 +02:00
"updated_at" : "2023-09-18T14:21:34Z" ,
2023-09-12 20:51:52 +02:00
"pushed_at" : "2023-09-12T16:39:44Z" ,
2023-09-18 20:43:36 +02:00
"stargazers_count" : 5 ,
"watchers_count" : 5 ,
2023-09-12 20:51:52 +02:00
"has_discussions" : false ,
2023-09-16 14:27:54 +02:00
"forks_count" : 3 ,
2023-09-12 20:51:52 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"0day-exploit" ,
"cve-2023-38831" ,
"exploit" ,
"vulnerability" ,
"winrar"
] ,
"visibility" : "public" ,
2023-09-16 14:27:54 +02:00
"forks" : 3 ,
2023-09-18 20:43:36 +02:00
"watchers" : 5 ,
2023-09-12 20:51:52 +02:00
"score" : 0 ,
2023-09-13 09:02:23 +02:00
"subscribers_count" : 1
2023-09-12 20:51:52 +02:00
} ,
{
"id" : 690658119 ,
"name" : "CVE-2023-38831-WinRAR-Exploit" ,
"full_name" : "ameerpornillos\/CVE-2023-38831-WinRAR-Exploit" ,
"owner" : {
"login" : "ameerpornillos" ,
"id" : 44928938 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/44928938?v=4" ,
"html_url" : "https:\/\/github.com\/ameerpornillos"
} ,
"html_url" : "https:\/\/github.com\/ameerpornillos\/CVE-2023-38831-WinRAR-Exploit" ,
"description" : "Proof of concept (PoC) exploit for WinRAR vulnerability (CVE-2023-38831) vulnerability" ,
"fork" : false ,
"created_at" : "2023-09-12T16:01:17Z" ,
"updated_at" : "2023-09-12T16:07:54Z" ,
"pushed_at" : "2023-09-12T16:26:22Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
2023-09-13 09:02:23 +02:00
"subscribers_count" : 1
2023-09-15 20:34:51 +02:00
} ,
{
"id" : 692049575 ,
"name" : "CVE-2023-38831" ,
"full_name" : "IMHarman\/CVE-2023-38831" ,
"owner" : {
"login" : "IMHarman" ,
"id" : 84379579 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/84379579?v=4" ,
"html_url" : "https:\/\/github.com\/IMHarman"
} ,
"html_url" : "https:\/\/github.com\/IMHarman\/CVE-2023-38831" ,
"description" : null ,
"fork" : false ,
"created_at" : "2023-09-15T12:58:55Z" ,
"updated_at" : "2023-09-15T13:00:37Z" ,
"pushed_at" : "2023-09-15T13:01:07Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
2023-09-16 08:31:35 +02:00
"subscribers_count" : 1
2023-09-17 08:26:43 +02:00
} ,
{
"id" : 692636502 ,
"name" : "CVE-2023-38831" ,
"full_name" : "an040702\/CVE-2023-38831" ,
"owner" : {
"login" : "an040702" ,
"id" : 41360497 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/41360497?v=4" ,
"html_url" : "https:\/\/github.com\/an040702"
} ,
"html_url" : "https:\/\/github.com\/an040702\/CVE-2023-38831" ,
"description" : null ,
"fork" : false ,
"created_at" : "2023-09-17T05:21:30Z" ,
"updated_at" : "2023-09-17T05:23:56Z" ,
"pushed_at" : "2023-09-17T05:26:44Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
2023-09-18 08:36:19 +02:00
"subscribers_count" : 1
2023-09-19 20:36:28 +02:00
} ,
{
"id" : 693647970 ,
"name" : "cve-2023-38831" ,
"full_name" : "elefantesagradodeluzinfinita\/cve-2023-38831" ,
"owner" : {
"login" : "elefantesagradodeluzinfinita" ,
"id" : 69746530 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/69746530?v=4" ,
"html_url" : "https:\/\/github.com\/elefantesagradodeluzinfinita"
} ,
"html_url" : "https:\/\/github.com\/elefantesagradodeluzinfinita\/cve-2023-38831" ,
"description" : "DR. GANDALF: Aplicacion DESKTOP para WINDOWS, Inyector de archivos ZIP, generador de exploits para vulnerabilidad de WinRAR 6.22 y anteriores." ,
"fork" : false ,
"created_at" : "2023-09-19T12:47:12Z" ,
"updated_at" : "2023-09-19T12:47:12Z" ,
"pushed_at" : "2023-09-19T12:51:30Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 0
2023-08-24 20:50:33 +02:00
}
]