PoC-in-GitHub/2023/CVE-2023-38831.json

403 lines
14 KiB
JSON
Raw Normal View History

2023-08-24 20:50:33 +02:00
[
{
"id": 682645268,
"name": "winrar_CVE-2023-38831_lazy_poc",
"full_name": "BoredHackerBlog\/winrar_CVE-2023-38831_lazy_poc",
"owner": {
"login": "BoredHackerBlog",
"id": 38662926,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38662926?v=4",
"html_url": "https:\/\/github.com\/BoredHackerBlog"
},
"html_url": "https:\/\/github.com\/BoredHackerBlog\/winrar_CVE-2023-38831_lazy_poc",
"description": "lazy way to create CVE-2023-38831 winrar file for testing",
"fork": false,
"created_at": "2023-08-24T16:03:07Z",
2023-08-29 16:04:40 +02:00
"updated_at": "2023-08-29T10:50:52Z",
2023-08-24 20:50:33 +02:00
"pushed_at": "2023-08-24T16:13:02Z",
2023-08-29 16:04:40 +02:00
"stargazers_count": 89,
"watchers_count": 89,
2023-08-24 20:50:33 +02:00
"has_discussions": false,
2023-08-29 16:04:40 +02:00
"forks_count": 17,
2023-08-24 20:50:33 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2023-08-29 16:04:40 +02:00
"forks": 17,
"watchers": 89,
2023-08-24 20:50:33 +02:00
"score": 0,
2023-08-28 08:40:28 +02:00
"subscribers_count": 2
2023-08-25 16:01:36 +02:00
},
{
"id": 682972740,
"name": "CVE-2023-38831-winrar-exploit",
"full_name": "b1tg\/CVE-2023-38831-winrar-exploit",
"owner": {
"login": "b1tg",
"id": 33436708,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33436708?v=4",
"html_url": "https:\/\/github.com\/b1tg"
},
"html_url": "https:\/\/github.com\/b1tg\/CVE-2023-38831-winrar-exploit",
2023-08-26 15:44:00 +02:00
"description": "CVE-2023-38831 winrar exploit generator",
2023-08-25 16:01:36 +02:00
"fork": false,
"created_at": "2023-08-25T09:44:08Z",
2023-08-30 02:25:48 +02:00
"updated_at": "2023-08-30T00:16:29Z",
2023-08-27 08:25:52 +02:00
"pushed_at": "2023-08-27T03:22:22Z",
2023-08-30 02:25:48 +02:00
"stargazers_count": 368,
"watchers_count": 368,
2023-08-25 16:01:36 +02:00
"has_discussions": false,
2023-08-30 02:25:48 +02:00
"forks_count": 51,
2023-08-25 16:01:36 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"0day",
2023-08-26 15:44:00 +02:00
"cve",
2023-08-25 16:01:36 +02:00
"exploit"
],
"visibility": "public",
2023-08-30 02:25:48 +02:00
"forks": 51,
"watchers": 368,
2023-08-25 16:01:36 +02:00
"score": 0,
2023-08-28 08:40:28 +02:00
"subscribers_count": 4
2023-08-27 15:45:49 +02:00
},
{
"id": 683645489,
"name": "CVE-2023-38831-HUNT",
"full_name": "IR-HuntGuardians\/CVE-2023-38831-HUNT",
"owner": {
"login": "IR-HuntGuardians",
"id": 98984117,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98984117?v=4",
"html_url": "https:\/\/github.com\/IR-HuntGuardians"
},
"html_url": "https:\/\/github.com\/IR-HuntGuardians\/CVE-2023-38831-HUNT",
"description": null,
"fork": false,
"created_at": "2023-08-27T08:42:24Z",
2023-08-28 15:55:55 +02:00
"updated_at": "2023-08-28T08:06:21Z",
2023-08-27 15:45:49 +02:00
"pushed_at": "2023-08-27T08:52:19Z",
2023-08-28 15:55:55 +02:00
"stargazers_count": 1,
"watchers_count": 1,
2023-08-27 15:45:49 +02:00
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
2023-08-28 15:55:55 +02:00
"watchers": 1,
2023-08-27 15:45:49 +02:00
"score": 0,
2023-08-28 08:40:28 +02:00
"subscribers_count": 1
2023-08-27 20:28:45 +02:00
},
{
"id": 683726401,
"name": "cve-2023-38831",
"full_name": "Garck3h\/cve-2023-38831",
"owner": {
"login": "Garck3h",
"id": 104743791,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104743791?v=4",
"html_url": "https:\/\/github.com\/Garck3h"
},
"html_url": "https:\/\/github.com\/Garck3h\/cve-2023-38831",
"description": "一款用于生成winrar程序RCE即cve-2023-38831的POC的工具。",
"fork": false,
"created_at": "2023-08-27T14:08:36Z",
2023-08-29 16:04:40 +02:00
"updated_at": "2023-08-29T12:51:40Z",
2023-08-27 20:28:45 +02:00
"pushed_at": "2023-08-27T14:35:00Z",
2023-08-29 16:04:40 +02:00
"stargazers_count": 11,
"watchers_count": 11,
2023-08-27 20:28:45 +02:00
"has_discussions": false,
2023-08-29 20:50:52 +02:00
"forks_count": 4,
2023-08-27 20:28:45 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2023-08-29 20:50:52 +02:00
"forks": 4,
2023-08-29 16:04:40 +02:00
"watchers": 11,
2023-08-27 20:28:45 +02:00
"score": 0,
2023-08-28 08:40:28 +02:00
"subscribers_count": 1
2023-08-28 02:28:45 +02:00
},
{
"id": 683843491,
"name": "CVE-2023-38831-RaRCE",
"full_name": "ignis-sec\/CVE-2023-38831-RaRCE",
"owner": {
"login": "ignis-sec",
"id": 16636092,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16636092?v=4",
"html_url": "https:\/\/github.com\/ignis-sec"
},
"html_url": "https:\/\/github.com\/ignis-sec\/CVE-2023-38831-RaRCE",
"description": "An easy to install and easy to run tool for generating exploit payloads for CVE-2023-38831, WinRAR RCE before versions 6.23",
"fork": false,
"created_at": "2023-08-27T21:49:37Z",
2023-08-30 02:25:48 +02:00
"updated_at": "2023-08-29T21:56:52Z",
2023-08-28 02:28:45 +02:00
"pushed_at": "2023-08-27T22:17:56Z",
2023-08-30 02:25:48 +02:00
"stargazers_count": 58,
"watchers_count": 58,
2023-08-28 02:28:45 +02:00
"has_discussions": false,
2023-08-29 20:50:52 +02:00
"forks_count": 12,
2023-08-28 02:28:45 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"archive",
"exploit",
"exploit-development",
"rce",
"security",
"winrar"
],
"visibility": "public",
2023-08-29 20:50:52 +02:00
"forks": 12,
2023-08-30 02:25:48 +02:00
"watchers": 58,
2023-08-28 08:40:28 +02:00
"score": 0,
"subscribers_count": 1
},
{
"id": 683930555,
"name": "CVE-2023-38831",
"full_name": "HDCE-inc\/CVE-2023-38831",
"owner": {
"login": "HDCE-inc",
"id": 141088081,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/141088081?v=4",
"html_url": "https:\/\/github.com\/HDCE-inc"
},
"html_url": "https:\/\/github.com\/HDCE-inc\/CVE-2023-38831",
"description": "CVE-2023-38831 PoC (Proof Of Concept)",
"fork": false,
"created_at": "2023-08-28T04:56:10Z",
2023-08-29 16:04:40 +02:00
"updated_at": "2023-08-29T13:56:05Z",
2023-08-29 02:27:54 +02:00
"pushed_at": "2023-08-28T20:41:57Z",
2023-08-29 16:04:40 +02:00
"stargazers_count": 2,
"watchers_count": 2,
2023-08-28 08:40:28 +02:00
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
2023-08-29 16:04:40 +02:00
"watchers": 2,
2023-08-28 02:28:45 +02:00
"score": 0,
"subscribers_count": 0
2023-08-28 15:55:55 +02:00
},
{
"id": 684007687,
"name": "CVE-2023-38831_ReverseShell_Winrar-RCE",
"full_name": "Maalfer\/CVE-2023-38831_ReverseShell_Winrar-RCE",
"owner": {
"login": "Maalfer",
"id": 96432001,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96432001?v=4",
"html_url": "https:\/\/github.com\/Maalfer"
},
"html_url": "https:\/\/github.com\/Maalfer\/CVE-2023-38831_ReverseShell_Winrar-RCE",
"description": "Pasos necesarios para obtener una reverse shell explotando la vulnerabilidad de winrar CVE-2023-38831 en versiones anteriores a 6.23.",
"fork": false,
"created_at": "2023-08-28T08:56:16Z",
2023-08-29 20:50:52 +02:00
"updated_at": "2023-08-29T14:18:42Z",
2023-08-28 15:55:55 +02:00
"pushed_at": "2023-08-28T09:32:04Z",
2023-08-29 20:50:52 +02:00
"stargazers_count": 5,
"watchers_count": 5,
2023-08-28 20:34:10 +02:00
"has_discussions": false,
2023-08-29 20:50:52 +02:00
"forks_count": 1,
2023-08-28 20:34:10 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2023-08-29 20:50:52 +02:00
"forks": 1,
"watchers": 5,
2023-08-28 20:34:10 +02:00
"score": 0,
2023-08-29 08:48:53 +02:00
"subscribers_count": 1
2023-08-28 20:34:10 +02:00
},
{
"id": 684145331,
"name": "WinRAR-Code-Execution-Vulnerability-CVE-2023-38831",
"full_name": "knight0x07\/WinRAR-Code-Execution-Vulnerability-CVE-2023-38831",
"owner": {
"login": "knight0x07",
"id": 60843949,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60843949?v=4",
"html_url": "https:\/\/github.com\/knight0x07"
},
"html_url": "https:\/\/github.com\/knight0x07\/WinRAR-Code-Execution-Vulnerability-CVE-2023-38831",
"description": "Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831) ",
"fork": false,
"created_at": "2023-08-28T14:48:22Z",
2023-08-30 02:25:48 +02:00
"updated_at": "2023-08-29T23:35:04Z",
2023-08-28 20:34:10 +02:00
"pushed_at": "2023-08-28T15:33:27Z",
2023-08-30 02:25:48 +02:00
"stargazers_count": 20,
"watchers_count": 20,
2023-08-28 20:34:10 +02:00
"has_discussions": false,
2023-08-30 02:25:48 +02:00
"forks_count": 5,
2023-08-28 20:34:10 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2023-08-30 02:25:48 +02:00
"forks": 5,
"watchers": 20,
2023-08-28 20:34:10 +02:00
"score": 0,
2023-08-29 08:48:53 +02:00
"subscribers_count": 2
2023-08-28 20:34:10 +02:00
},
{
"id": 684145428,
"name": "cve-2023-38831",
"full_name": "akhomlyuk\/cve-2023-38831",
"owner": {
"login": "akhomlyuk",
"id": 26635022,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26635022?v=4",
"html_url": "https:\/\/github.com\/akhomlyuk"
},
"html_url": "https:\/\/github.com\/akhomlyuk\/cve-2023-38831",
"description": "CVE-2023-38831 WinRAR",
"fork": false,
"created_at": "2023-08-28T14:48:35Z",
"updated_at": "2023-08-28T15:26:48Z",
"pushed_at": "2023-08-28T15:35:43Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
2023-08-29 08:48:53 +02:00
"subscribers_count": 1
2023-08-28 20:34:10 +02:00
},
{
"id": 684162692,
"name": "CVE-2023-38831-KQL",
"full_name": "PascalAsch\/CVE-2023-38831-KQL",
"owner": {
"login": "PascalAsch",
"id": 20398716,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20398716?v=4",
"html_url": "https:\/\/github.com\/PascalAsch"
},
"html_url": "https:\/\/github.com\/PascalAsch\/CVE-2023-38831-KQL",
2023-08-29 02:27:54 +02:00
"description": "KQL Hunting for WinRAR CVE-2023-38831",
2023-08-28 20:34:10 +02:00
"fork": false,
"created_at": "2023-08-28T15:26:14Z",
2023-08-29 16:04:40 +02:00
"updated_at": "2023-08-29T13:56:11Z",
2023-08-28 20:34:10 +02:00
"pushed_at": "2023-08-28T16:06:17Z",
2023-08-29 16:04:40 +02:00
"stargazers_count": 2,
"watchers_count": 2,
2023-08-28 15:55:55 +02:00
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
2023-08-29 16:04:40 +02:00
"watchers": 2,
2023-08-28 15:55:55 +02:00
"score": 0,
2023-08-29 08:48:53 +02:00
"subscribers_count": 1
2023-08-29 02:27:54 +02:00
},
{
"id": 684311499,
"name": "CVE-2023-38831-winrar-expoit-simple-Poc",
"full_name": "my-elliot\/CVE-2023-38831-winrar-expoit-simple-Poc",
"owner": {
"login": "my-elliot",
"id": 64432235,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64432235?v=4",
"html_url": "https:\/\/github.com\/my-elliot"
},
"html_url": "https:\/\/github.com\/my-elliot\/CVE-2023-38831-winrar-expoit-simple-Poc",
"description": "CVE-2023-38831 winrar exploit generator and get reverse shell",
"fork": false,
"created_at": "2023-08-28T22:08:31Z",
2023-08-30 02:25:48 +02:00
"updated_at": "2023-08-30T00:03:38Z",
2023-08-29 02:27:54 +02:00
"pushed_at": "2023-08-28T23:51:31Z",
2023-08-30 02:25:48 +02:00
"stargazers_count": 6,
"watchers_count": 6,
2023-08-29 02:27:54 +02:00
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
2023-08-30 02:25:48 +02:00
"watchers": 6,
2023-08-29 02:27:54 +02:00
"score": 0,
2023-08-29 08:48:53 +02:00
"subscribers_count": 1
},
{
"id": 684442018,
"name": "CVE-2023-38831",
"full_name": "thegr1ffyn\/CVE-2023-38831",
"owner": {
"login": "thegr1ffyn",
"id": 95119705,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95119705?v=4",
"html_url": "https:\/\/github.com\/thegr1ffyn"
},
"html_url": "https:\/\/github.com\/thegr1ffyn\/CVE-2023-38831",
"description": "Proof of Concept (POC) for CVE-2023-38831 WinRAR",
"fork": false,
"created_at": "2023-08-29T06:11:42Z",
"updated_at": "2023-08-29T06:12:57Z",
"pushed_at": "2023-08-29T06:36:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
2023-08-29 02:27:54 +02:00
"subscribers_count": 0
2023-08-29 20:50:52 +02:00
},
{
"id": 684673194,
"name": "CVE-2023-38831-Exploit-and-Detection",
"full_name": "MortySecurity\/CVE-2023-38831-Exploit-and-Detection",
"owner": {
"login": "MortySecurity",
"id": 6032062,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6032062?v=4",
"html_url": "https:\/\/github.com\/MortySecurity"
},
"html_url": "https:\/\/github.com\/MortySecurity\/CVE-2023-38831-Exploit-and-Detection",
"description": "This repository has both an attack detection tool and a Proof-of-Concept (PoC) Python script for the WinRAR CVE-2023-38831 vulnerability. ",
"fork": false,
"created_at": "2023-08-29T16:12:20Z",
"updated_at": "2023-08-29T16:16:01Z",
"pushed_at": "2023-08-29T16:15:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
2023-08-24 20:50:33 +02:00
}
]