[ { "id": 682645268, "name": "winrar_CVE-2023-38831_lazy_poc", "full_name": "BoredHackerBlog\/winrar_CVE-2023-38831_lazy_poc", "owner": { "login": "BoredHackerBlog", "id": 38662926, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38662926?v=4", "html_url": "https:\/\/github.com\/BoredHackerBlog", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/BoredHackerBlog\/winrar_CVE-2023-38831_lazy_poc", "description": "lazy way to create CVE-2023-38831 winrar file for testing", "fork": false, "created_at": "2023-08-24T16:03:07Z", "updated_at": "2024-12-09T01:45:14Z", "pushed_at": "2023-08-24T16:13:02Z", "stargazers_count": 92, "watchers_count": 92, "has_discussions": false, "forks_count": 17, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 17, "watchers": 92, "score": 0, "subscribers_count": 4 }, { "id": 682972740, "name": "CVE-2023-38831-winrar-exploit", "full_name": "b1tg\/CVE-2023-38831-winrar-exploit", "owner": { "login": "b1tg", "id": 33436708, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33436708?v=4", "html_url": "https:\/\/github.com\/b1tg", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/b1tg\/CVE-2023-38831-winrar-exploit", "description": "CVE-2023-38831 winrar exploit generator", "fork": false, "created_at": "2023-08-25T09:44:08Z", "updated_at": "2024-12-09T18:18:45Z", "pushed_at": "2023-11-26T06:46:44Z", "stargazers_count": 783, "watchers_count": 783, "has_discussions": false, "forks_count": 139, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "0day", "cve", "exploit" ], "visibility": "public", "forks": 139, "watchers": 783, "score": 0, "subscribers_count": 9 }, { "id": 683645489, "name": "CVE-2023-38831-HUNT", "full_name": "IR-HuntGuardians\/CVE-2023-38831-HUNT", "owner": { "login": "IR-HuntGuardians", "id": 98984117, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98984117?v=4", "html_url": "https:\/\/github.com\/IR-HuntGuardians", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/IR-HuntGuardians\/CVE-2023-38831-HUNT", "description": null, "fork": false, "created_at": "2023-08-27T08:42:24Z", "updated_at": "2024-05-15T19:18:09Z", "pushed_at": "2023-08-27T08:52:19Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 683726401, "name": "cve-2023-38831", "full_name": "Garck3h\/cve-2023-38831", "owner": { "login": "Garck3h", "id": 104743791, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104743791?v=4", "html_url": "https:\/\/github.com\/Garck3h", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Garck3h\/cve-2023-38831", "description": "一款用于生成winrar程序RCE(即cve-2023-38831)的POC的工具。", "fork": false, "created_at": "2023-08-27T14:08:36Z", "updated_at": "2024-11-28T16:04:54Z", "pushed_at": "2023-08-27T14:35:00Z", "stargazers_count": 129, "watchers_count": 129, "has_discussions": false, "forks_count": 22, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 22, "watchers": 129, "score": 0, "subscribers_count": 1 }, { "id": 683843491, "name": "CVE-2023-38831-RaRCE", "full_name": "ignis-sec\/CVE-2023-38831-RaRCE", "owner": { "login": "ignis-sec", "id": 16636092, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16636092?v=4", "html_url": "https:\/\/github.com\/ignis-sec", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ignis-sec\/CVE-2023-38831-RaRCE", "description": "An easy to install and easy to run tool for generating exploit payloads for CVE-2023-38831, WinRAR RCE before versions 6.23", "fork": false, "created_at": "2023-08-27T21:49:37Z", "updated_at": "2024-10-21T10:38:58Z", "pushed_at": "2023-08-27T22:17:56Z", "stargazers_count": 115, "watchers_count": 115, "has_discussions": false, "forks_count": 18, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "archive", "exploit", "exploit-development", "rce", "security", "winrar" ], "visibility": "public", "forks": 18, "watchers": 115, "score": 0, "subscribers_count": 2 }, { "id": 683930555, "name": "CVE-2023-38831", "full_name": "HDCE-inc\/CVE-2023-38831", "owner": { "login": "HDCE-inc", "id": 141088081, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/141088081?v=4", "html_url": "https:\/\/github.com\/HDCE-inc", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/HDCE-inc\/CVE-2023-38831", "description": "CVE-2023-38831 PoC (Proof Of Concept)", "fork": false, "created_at": "2023-08-28T04:56:10Z", "updated_at": "2024-11-01T10:38:43Z", "pushed_at": "2024-08-04T01:00:35Z", "stargazers_count": 67, "watchers_count": 67, "has_discussions": false, "forks_count": 10, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 10, "watchers": 67, "score": 0, "subscribers_count": 0 }, { "id": 684007687, "name": "CVE-2023-38831_ReverseShell_Winrar-RCE", "full_name": "Maalfer\/CVE-2023-38831_ReverseShell_Winrar-RCE", "owner": { "login": "Maalfer", "id": 96432001, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96432001?v=4", "html_url": "https:\/\/github.com\/Maalfer", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Maalfer\/CVE-2023-38831_ReverseShell_Winrar-RCE", "description": "Pasos necesarios para obtener una reverse shell explotando la vulnerabilidad de winrar CVE-2023-38831 en versiones anteriores a 6.23.", "fork": false, "created_at": "2023-08-28T08:56:16Z", "updated_at": "2024-11-11T04:58:57Z", "pushed_at": "2023-08-31T07:40:12Z", "stargazers_count": 22, "watchers_count": 22, "has_discussions": false, "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 6, "watchers": 22, "score": 0, "subscribers_count": 2 }, { "id": 684145331, "name": "WinRAR-Code-Execution-Vulnerability-CVE-2023-38831", "full_name": "knight0x07\/WinRAR-Code-Execution-Vulnerability-CVE-2023-38831", "owner": { "login": "knight0x07", "id": 60843949, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60843949?v=4", "html_url": "https:\/\/github.com\/knight0x07", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/knight0x07\/WinRAR-Code-Execution-Vulnerability-CVE-2023-38831", "description": "Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831) ", "fork": false, "created_at": "2023-08-28T14:48:22Z", "updated_at": "2024-10-03T05:17:38Z", "pushed_at": "2023-08-28T15:33:27Z", "stargazers_count": 40, "watchers_count": 40, "has_discussions": false, "forks_count": 12, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 12, "watchers": 40, "score": 0, "subscribers_count": 5 }, { "id": 684145428, "name": "cve-2023-38831", "full_name": "akhomlyuk\/cve-2023-38831", "owner": { "login": "akhomlyuk", "id": 26635022, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26635022?v=4", "html_url": "https:\/\/github.com\/akhomlyuk", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/akhomlyuk\/cve-2023-38831", "description": "CVE-2023-38831 WinRAR", "fork": false, "created_at": "2023-08-28T14:48:35Z", "updated_at": "2024-04-18T19:39:48Z", "pushed_at": "2023-08-28T15:35:43Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 3, "score": 0, "subscribers_count": 2 }, { "id": 684162692, "name": "CVE-2023-38831-KQL", "full_name": "PascalAsch\/CVE-2023-38831-KQL", "owner": { "login": "PascalAsch", "id": 20398716, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20398716?v=4", "html_url": "https:\/\/github.com\/PascalAsch", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/PascalAsch\/CVE-2023-38831-KQL", "description": "KQL Hunting for WinRAR CVE-2023-38831", "fork": false, "created_at": "2023-08-28T15:26:14Z", "updated_at": "2023-10-25T20:12:35Z", "pushed_at": "2023-08-28T16:06:17Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 4, "score": 0, "subscribers_count": 1 }, { "id": 684311499, "name": "CVE-2023-38831-winrar-expoit-simple-Poc", "full_name": "ahmed-fa7im\/CVE-2023-38831-winrar-expoit-simple-Poc", "owner": { "login": "ahmed-fa7im", "id": 64432235, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64432235?v=4", "html_url": "https:\/\/github.com\/ahmed-fa7im", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ahmed-fa7im\/CVE-2023-38831-winrar-expoit-simple-Poc", "description": "CVE-2023-38831 winrar exploit generator and get reverse shell", "fork": false, "created_at": "2023-08-28T22:08:31Z", "updated_at": "2024-04-27T21:27:52Z", "pushed_at": "2023-08-28T23:51:31Z", "stargazers_count": 11, "watchers_count": 11, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 11, "score": 0, "subscribers_count": 1 }, { "id": 684442018, "name": "CVE-2023-38831", "full_name": "thegr1ffyn\/CVE-2023-38831", "owner": { "login": "thegr1ffyn", "id": 95119705, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95119705?v=4", "html_url": "https:\/\/github.com\/thegr1ffyn", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/thegr1ffyn\/CVE-2023-38831", "description": "Proof of Concept (POC) for CVE-2023-38831 WinRAR", "fork": false, "created_at": "2023-08-29T06:11:42Z", "updated_at": "2024-11-19T14:46:51Z", "pushed_at": "2023-08-29T06:36:44Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 684673194, "name": "CVE-2023-38831-Exploit-and-Detection", "full_name": "MortySecurity\/CVE-2023-38831-Exploit-and-Detection", "owner": { "login": "MortySecurity", "id": 6032062, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6032062?v=4", "html_url": "https:\/\/github.com\/MortySecurity", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/MortySecurity\/CVE-2023-38831-Exploit-and-Detection", "description": "This repository has both an attack detection tool and a Proof-of-Concept (PoC) Python script for the WinRAR CVE-2023-38831 vulnerability. ", "fork": false, "created_at": "2023-08-29T16:12:20Z", "updated_at": "2023-08-29T16:16:01Z", "pushed_at": "2023-08-29T16:15:56Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 685043786, "name": "CVE-2023-38831-PoC", "full_name": "z3r0sw0rd\/CVE-2023-38831-PoC", "owner": { "login": "z3r0sw0rd", "id": 18899200, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18899200?v=4", "html_url": "https:\/\/github.com\/z3r0sw0rd", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/z3r0sw0rd\/CVE-2023-38831-PoC", "description": "Proof-of-Concept for CVE-2023-38831 Zero-Day vulnerability in WinRAR", "fork": false, "created_at": "2023-08-30T11:52:23Z", "updated_at": "2024-09-03T14:48:35Z", "pushed_at": "2023-09-01T07:37:20Z", "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "archive", "cve-2023-38831", "exploit", "remote-code-execution", "winrar" ], "visibility": "public", "forks": 0, "watchers": 5, "score": 0, "subscribers_count": 1 }, { "id": 685047347, "name": "CVE-2023-38831", "full_name": "sh770\/CVE-2023-38831", "owner": { "login": "sh770", "id": 111239198, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/111239198?v=4", "html_url": "https:\/\/github.com\/sh770", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/sh770\/CVE-2023-38831", "description": "winrar exploit 6.22 <=", "fork": false, "created_at": "2023-08-30T12:02:36Z", "updated_at": "2023-08-30T12:02:36Z", "pushed_at": "2023-08-30T10:23:24Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 0 }, { "id": 685141303, "name": "CVE-2023-38831_ReverseShell_Winrar", "full_name": "BeniB3astt\/CVE-2023-38831_ReverseShell_Winrar", "owner": { "login": "BeniB3astt", "id": 139050304, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/139050304?v=4", "html_url": "https:\/\/github.com\/BeniB3astt", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/BeniB3astt\/CVE-2023-38831_ReverseShell_Winrar", "description": null, "fork": false, "created_at": "2023-08-30T15:49:01Z", "updated_at": "2023-11-14T03:11:41Z", "pushed_at": "2023-08-30T18:11:13Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 685237935, "name": "CVE-2023-38831-Winrar-Exploit-Generator-POC", "full_name": "MorDavid\/CVE-2023-38831-Winrar-Exploit-Generator-POC", "owner": { "login": "MorDavid", "id": 24622066, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24622066?v=4", "html_url": "https:\/\/github.com\/MorDavid", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/MorDavid\/CVE-2023-38831-Winrar-Exploit-Generator-POC", "description": "This is a POC for the CVE-2023-3883 exploit targeting WinRAR up to 6.22. Modified some existing internet-sourced POCs by introducing greater dynamism and incorporated additional try-except blocks within the code.", "fork": false, "created_at": "2023-08-30T19:55:11Z", "updated_at": "2024-05-19T16:45:22Z", "pushed_at": "2023-08-31T15:07:51Z", "stargazers_count": 8, "watchers_count": 8, "has_discussions": false, "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "archive", "cve-2023-38831", "exploit", "rce", "rce-exploit", "remote-code-execution", "winrar" ], "visibility": "public", "forks": 4, "watchers": 8, "score": 0, "subscribers_count": 1 }, { "id": 686063338, "name": "CVE-2023-38831-winrar", "full_name": "Mich-ele\/CVE-2023-38831-winrar", "owner": { "login": "Mich-ele", "id": 30556763, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30556763?v=4", "html_url": "https:\/\/github.com\/Mich-ele", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Mich-ele\/CVE-2023-38831-winrar", "description": "CVE-2023-38831 winrar exploit builder", "fork": false, "created_at": "2023-09-01T16:45:42Z", "updated_at": "2024-11-08T21:48:16Z", "pushed_at": "2023-09-01T17:43:16Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2023-38831", "exploit", "winrar" ], "visibility": "public", "forks": 0, "watchers": 3, "score": 0, "subscribers_count": 1 }, { "id": 686580975, "name": "CVE-2023-38831", "full_name": "asepsaepdin\/CVE-2023-38831", "owner": { "login": "asepsaepdin", "id": 122620685, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/122620685?v=4", "html_url": "https:\/\/github.com\/asepsaepdin", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/asepsaepdin\/CVE-2023-38831", "description": null, "fork": false, "created_at": "2023-09-03T09:18:56Z", "updated_at": "2023-09-03T10:42:39Z", "pushed_at": "2023-09-03T14:08:09Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 686665715, "name": "CVE-2023-38831-winrar-exploit", "full_name": "Fa1c0n35\/CVE-2023-38831-winrar-exploit", "owner": { "login": "Fa1c0n35", "id": 33335488, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33335488?v=4", "html_url": "https:\/\/github.com\/Fa1c0n35", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Fa1c0n35\/CVE-2023-38831-winrar-exploit", "description": null, "fork": false, "created_at": "2023-09-03T14:53:42Z", "updated_at": "2023-09-03T14:53:55Z", "pushed_at": "2023-09-03T14:53:52Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 686761346, "name": "WinRAR-CVE-2023-38831", "full_name": "xaitax\/WinRAR-CVE-2023-38831", "owner": { "login": "xaitax", "id": 5014849, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5014849?v=4", "html_url": "https:\/\/github.com\/xaitax", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/xaitax\/WinRAR-CVE-2023-38831", "description": "This module exploits a vulnerability in WinRAR (CVE-2023-38831). When a user opens a crafted RAR file and its embedded document, a script is executed, leading to code execution.", "fork": false, "created_at": "2023-09-03T21:14:05Z", "updated_at": "2024-12-12T17:05:26Z", "pushed_at": "2023-09-08T06:15:42Z", "stargazers_count": 11, "watchers_count": 11, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 11, "score": 0, "subscribers_count": 2 }, { "id": 688341659, "name": "CVE-2023-38831-winrar", "full_name": "GOTonyGO\/CVE-2023-38831-winrar", "owner": { "login": "GOTonyGO", "id": 107836621, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107836621?v=4", "html_url": "https:\/\/github.com\/GOTonyGO", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/GOTonyGO\/CVE-2023-38831-winrar", "description": "Quick exploit builder for CVE-2023-38831, a vulnerability that affects WinRAR versions before 6.23.", "fork": false, "created_at": "2023-09-07T06:42:36Z", "updated_at": "2023-09-07T06:44:20Z", "pushed_at": "2023-09-07T06:45:37Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 690603491, "name": "CVE-2023-38831", "full_name": "Malwareman007\/CVE-2023-38831", "owner": { "login": "Malwareman007", "id": 86009160, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86009160?v=4", "html_url": "https:\/\/github.com\/Malwareman007", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Malwareman007\/CVE-2023-38831", "description": "CVE-2023-38831 WinRaR Exploit Generator", "fork": false, "created_at": "2023-09-12T14:07:00Z", "updated_at": "2024-08-10T17:51:53Z", "pushed_at": "2023-09-12T16:39:44Z", "stargazers_count": 9, "watchers_count": 9, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "0day-exploit", "cve-2023-38831", "exploit", "vulnerability", "winrar" ], "visibility": "public", "forks": 3, "watchers": 9, "score": 0, "subscribers_count": 1 }, { "id": 690658119, "name": "CVE-2023-38831-WinRAR-Exploit", "full_name": "ameerpornillos\/CVE-2023-38831-WinRAR-Exploit", "owner": { "login": "ameerpornillos", "id": 44928938, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44928938?v=4", "html_url": "https:\/\/github.com\/ameerpornillos", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ameerpornillos\/CVE-2023-38831-WinRAR-Exploit", "description": "Proof of concept (PoC) exploit for WinRAR vulnerability (CVE-2023-38831) vulnerability", "fork": false, "created_at": "2023-09-12T16:01:17Z", "updated_at": "2024-04-09T12:36:15Z", "pushed_at": "2023-09-12T16:26:22Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 3, "score": 0, "subscribers_count": 1 }, { "id": 692636502, "name": "CVE-2023-38831", "full_name": "an040702\/CVE-2023-38831", "owner": { "login": "an040702", "id": 41360497, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41360497?v=4", "html_url": "https:\/\/github.com\/an040702", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/an040702\/CVE-2023-38831", "description": null, "fork": false, "created_at": "2023-09-17T05:21:30Z", "updated_at": "2023-10-26T08:45:23Z", "pushed_at": "2023-09-17T05:26:44Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 693647970, "name": "cve-2023-38831", "full_name": "elefantesagradodeluzinfinita\/cve-2023-38831", "owner": { "login": "elefantesagradodeluzinfinita", "id": 69746530, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69746530?v=4", "html_url": "https:\/\/github.com\/elefantesagradodeluzinfinita", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/elefantesagradodeluzinfinita\/cve-2023-38831", "description": "DR. GANDALF: Aplicacion DESKTOP para WINDOWS, Inyector de archivos ZIP, generador de exploits para vulnerabilidad de WinRAR 6.22 y anteriores.", "fork": false, "created_at": "2023-09-19T12:47:12Z", "updated_at": "2023-10-19T15:34:22Z", "pushed_at": "2023-09-24T05:30:38Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 694502812, "name": "CVE-2023-38831", "full_name": "malvika-thakur\/CVE-2023-38831", "owner": { "login": "malvika-thakur", "id": 60217652, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60217652?v=4", "html_url": "https:\/\/github.com\/malvika-thakur", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/malvika-thakur\/CVE-2023-38831", "description": "Proof-of-Concept (POC) of CVE-2023-38831 Zero-Day vulnerability in WinRAR", "fork": false, "created_at": "2023-09-21T06:08:30Z", "updated_at": "2024-01-10T11:50:56Z", "pushed_at": "2023-09-21T09:30:59Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 3, "score": 0, "subscribers_count": 1 }, { "id": 704052455, "name": "CVE-2023-38831", "full_name": "ruycr4ft\/CVE-2023-38831", "owner": { "login": "ruycr4ft", "id": 103446004, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103446004?v=4", "html_url": "https:\/\/github.com\/ruycr4ft", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ruycr4ft\/CVE-2023-38831", "description": null, "fork": false, "created_at": "2023-10-12T12:46:35Z", "updated_at": "2023-10-12T16:13:22Z", "pushed_at": "2023-10-12T13:23:29Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 708148022, "name": "CVE-2023-38831", "full_name": "Nielk74\/CVE-2023-38831", "owner": { "login": "Nielk74", "id": 67603819, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67603819?v=4", "html_url": "https:\/\/github.com\/Nielk74", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Nielk74\/CVE-2023-38831", "description": null, "fork": false, "created_at": "2023-10-21T17:03:48Z", "updated_at": "2023-10-21T17:07:51Z", "pushed_at": "2023-10-21T17:16:33Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 709081442, "name": "CVE-2023-38831", "full_name": "kehrijksen\/CVE-2023-38831", "owner": { "login": "kehrijksen", "id": 9675317, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9675317?v=4", "html_url": "https:\/\/github.com\/kehrijksen", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/kehrijksen\/CVE-2023-38831", "description": "CVE-2023-38831 is an RCE in WinRAR (<6.23)", "fork": false, "created_at": "2023-10-24T01:14:03Z", "updated_at": "2023-10-24T01:19:35Z", "pushed_at": "2023-10-24T01:26:50Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 712814993, "name": "SideCopy-Exploits-CVE-2023-38831", "full_name": "h3xecute\/SideCopy-Exploits-CVE-2023-38831", "owner": { "login": "h3xecute", "id": 76843512, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76843512?v=4", "html_url": "https:\/\/github.com\/h3xecute", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/h3xecute\/SideCopy-Exploits-CVE-2023-38831", "description": "SideCopy APT Group exploits CVE-2023-38831", "fork": false, "created_at": "2023-11-01T08:57:15Z", "updated_at": "2023-11-01T08:57:16Z", "pushed_at": "2023-11-01T09:06:27Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 715402481, "name": "winrar-cve-2023-38831-poc-gen", "full_name": "s4m98\/winrar-cve-2023-38831-poc-gen", "owner": { "login": "s4m98", "id": 114874332, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114874332?v=4", "html_url": "https:\/\/github.com\/s4m98", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/s4m98\/winrar-cve-2023-38831-poc-gen", "description": "WinRAR cve-2023-38831-poc-generator", "fork": false, "created_at": "2023-11-07T04:14:04Z", "updated_at": "2024-12-14T11:06:26Z", "pushed_at": "2023-11-07T05:24:44Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 718970099, "name": "WinRAR-Vulnerability-recurrence-tutorial", "full_name": "xk-mt\/WinRAR-Vulnerability-recurrence-tutorial", "owner": { "login": "xk-mt", "id": 77874955, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77874955?v=4", "html_url": "https:\/\/github.com\/xk-mt", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/xk-mt\/WinRAR-Vulnerability-recurrence-tutorial", "description": "WinRAR-6.22、CVE-2023-38831、CNNVD-202308-1943、DM-202307-003730、QVD-2023-19572漏洞复现", "fork": false, "created_at": "2023-11-15T07:01:05Z", "updated_at": "2024-09-23T11:17:20Z", "pushed_at": "2024-01-15T08:32:01Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 4, "score": 0, "subscribers_count": 1 }, { "id": 727188390, "name": "CVE-2023-38831-POC", "full_name": "MyStuffYT\/CVE-2023-38831-POC", "owner": { "login": "MyStuffYT", "id": 73236689, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73236689?v=4", "html_url": "https:\/\/github.com\/MyStuffYT", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/MyStuffYT\/CVE-2023-38831-POC", "description": "Proof-of-concept of CVE-2023-38831", "fork": false, "created_at": "2023-12-04T11:13:43Z", "updated_at": "2023-12-04T11:16:10Z", "pushed_at": "2024-03-01T20:54:54Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 730732165, "name": "CVE-2023-38831", "full_name": "SpamixOfficial\/CVE-2023-38831", "owner": { "login": "SpamixOfficial", "id": 99183771, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99183771?v=4", "html_url": "https:\/\/github.com\/SpamixOfficial", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/SpamixOfficial\/CVE-2023-38831", "description": "CVE-2023-38831 Proof-of-concept code", "fork": false, "created_at": "2023-12-12T14:54:30Z", "updated_at": "2023-12-13T20:06:39Z", "pushed_at": "2023-12-20T11:24:29Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve", "cve-2023-38831", "poc", "proof-of-concept", "rust" ], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 735737669, "name": "winDED", "full_name": "r1yaz\/winDED", "owner": { "login": "r1yaz", "id": 36794004, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36794004?v=4", "html_url": "https:\/\/github.com\/r1yaz", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/r1yaz\/winDED", "description": "Exploit Development using python for CVE-2023-38831 (POC)", "fork": false, "created_at": "2023-12-26T01:36:32Z", "updated_at": "2023-12-29T06:00:17Z", "pushed_at": "2023-12-28T18:48:21Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve", "cve-2023-38831", "exploit", "python", "winrar" ], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 777256530, "name": "evil-winrar", "full_name": "youmulijiang\/evil-winrar", "owner": { "login": "youmulijiang", "id": 111237463, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/111237463?v=4", "html_url": "https:\/\/github.com\/youmulijiang", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/youmulijiang\/evil-winrar", "description": "evil-winrar,CVE-2023-38831漏洞利用和社会工程学攻击框架 (evil-winrar, CVE-2023-38831 Vulnerability Exploitation and Social Engineering Attack Framework)", "fork": false, "created_at": "2024-03-25T14:05:24Z", "updated_at": "2024-05-20T16:55:05Z", "pushed_at": "2024-03-25T14:38:29Z", "stargazers_count": 9, "watchers_count": 9, "has_discussions": false, "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 9, "score": 0, "subscribers_count": 2 }, { "id": 780499356, "name": "VolleyballSquid-----CVE-2023-38831-and-Bypass-UAC", "full_name": "solomon12354\/VolleyballSquid-----CVE-2023-38831-and-Bypass-UAC", "owner": { "login": "solomon12354", "id": 84257391, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84257391?v=4", "html_url": "https:\/\/github.com\/solomon12354", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/solomon12354\/VolleyballSquid-----CVE-2023-38831-and-Bypass-UAC", "description": "This is my malware", "fork": false, "created_at": "2024-04-01T15:59:34Z", "updated_at": "2024-07-13T01:50:03Z", "pushed_at": "2024-06-18T01:15:21Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 783001135, "name": "CVE-2023-38831", "full_name": "RomainBayle08\/CVE-2023-38831", "owner": { "login": "RomainBayle08", "id": 90604846, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90604846?v=4", "html_url": "https:\/\/github.com\/RomainBayle08", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/RomainBayle08\/CVE-2023-38831", "description": null, "fork": false, "created_at": "2024-04-06T16:55:29Z", "updated_at": "2024-04-06T16:55:43Z", "pushed_at": "2024-04-06T17:00:28Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 816174543, "name": "imbyter-WinRAR_CVE-2023-38831", "full_name": "imbyter\/imbyter-WinRAR_CVE-2023-38831", "owner": { "login": "imbyter", "id": 53294133, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53294133?v=4", "html_url": "https:\/\/github.com\/imbyter", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/imbyter\/imbyter-WinRAR_CVE-2023-38831", "description": "WinRAR漏洞测试复现。详参:https:\/\/flowus.cn\/share\/a3b35db0-ab5e-4abc-b8d3-5ff284e82e7b", "fork": false, "created_at": "2024-06-17T07:30:47Z", "updated_at": "2024-06-17T07:34:37Z", "pushed_at": "2024-06-17T07:34:33Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 817529952, "name": "PDFernetRemotelo", "full_name": "UnHackerEnCapital\/PDFernetRemotelo", "owner": { "login": "UnHackerEnCapital", "id": 173314584, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/173314584?v=4", "html_url": "https:\/\/github.com\/UnHackerEnCapital", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/UnHackerEnCapital\/PDFernetRemotelo", "description": "PoC - Prueba de Concepto de CVE-2024-4367 en conjunto al CVE-2023-38831 en un solo Script", "fork": false, "created_at": "2024-06-19T23:23:07Z", "updated_at": "2024-11-20T16:30:50Z", "pushed_at": "2024-06-20T00:02:49Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 3, "score": 0, "subscribers_count": 1 }, { "id": 819687370, "name": "CVE-2021-34527-CVE-2023-38831-and-CVE-2023-32784", "full_name": "Hirusha-N\/CVE-2021-34527-CVE-2023-38831-and-CVE-2023-32784", "owner": { "login": "Hirusha-N", "id": 76760906, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76760906?v=4", "html_url": "https:\/\/github.com\/Hirusha-N", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Hirusha-N\/CVE-2021-34527-CVE-2023-38831-and-CVE-2023-32784", "description": null, "fork": false, "created_at": "2024-06-25T02:30:31Z", "updated_at": "2024-06-25T02:32:40Z", "pushed_at": "2024-06-25T02:32:37Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 829474031, "name": "cve-2023-38831-poc", "full_name": "khanhtranngoccva\/cve-2023-38831-poc", "owner": { "login": "khanhtranngoccva", "id": 61155608, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61155608?v=4", "html_url": "https:\/\/github.com\/khanhtranngoccva", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/khanhtranngoccva\/cve-2023-38831-poc", "description": null, "fork": false, "created_at": "2024-07-16T13:54:09Z", "updated_at": "2024-07-16T13:54:55Z", "pushed_at": "2024-07-16T13:54:51Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 832765370, "name": "Windows-X64-RAT", "full_name": "MaorBuskila\/Windows-X64-RAT", "owner": { "login": "MaorBuskila", "id": 68689543, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68689543?v=4", "html_url": "https:\/\/github.com\/MaorBuskila", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/MaorBuskila\/Windows-X64-RAT", "description": "Remote Access Trojan (RAT) for Windows x64 using a combination of vulnerability CVE-2023-38831 (WinRAR < 6.23 vulnerability) and Shellcode exploitation technique.", "fork": false, "created_at": "2024-07-23T17:20:06Z", "updated_at": "2024-10-07T21:32:27Z", "pushed_at": "2024-07-23T17:30:46Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 838852231, "name": "cve_2023_38831_scanner", "full_name": "yezzfusl\/cve_2023_38831_scanner", "owner": { "login": "yezzfusl", "id": 18398621, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18398621?v=4", "html_url": "https:\/\/github.com\/yezzfusl", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/yezzfusl\/cve_2023_38831_scanner", "description": "This Python application scans for the CVE-2023-38831 vulnerability in WinRAR.", "fork": false, "created_at": "2024-08-06T13:21:27Z", "updated_at": "2024-08-06T14:44:37Z", "pushed_at": "2024-12-02T04:08:41Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2023-38831", "cybersecurity", "memory-scanning", "network-analysis", "sandbox-security", "security-scanner", "vulnerability-detection", "winrar-vulnerability" ], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 849935552, "name": "CVE-2023-38831", "full_name": "FirFirdaus\/CVE-2023-38831", "owner": { "login": "FirFirdaus", "id": 89730202, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89730202?v=4", "html_url": "https:\/\/github.com\/FirFirdaus", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/FirFirdaus\/CVE-2023-38831", "description": "A POC demo on CVE-2023-38831", "fork": false, "created_at": "2024-08-30T14:48:26Z", "updated_at": "2024-08-31T08:33:11Z", "pushed_at": "2024-08-31T08:33:08Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 863722602, "name": "LAB-DFIR-cve-2023-38831", "full_name": "ra3edAJ\/LAB-DFIR-cve-2023-38831", "owner": { "login": "ra3edAJ", "id": 122083416, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/122083416?v=4", "html_url": "https:\/\/github.com\/ra3edAJ", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ra3edAJ\/LAB-DFIR-cve-2023-38831", "description": "d", "fork": false, "created_at": "2024-09-26T19:44:08Z", "updated_at": "2024-09-26T19:49:33Z", "pushed_at": "2024-09-26T19:49:30Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 864227138, "name": "CVE-2023-38831-Exploit", "full_name": "technicalcorp0\/CVE-2023-38831-Exploit", "owner": { "login": "technicalcorp0", "id": 170502012, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/170502012?v=4", "html_url": "https:\/\/github.com\/technicalcorp0", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/technicalcorp0\/CVE-2023-38831-Exploit", "description": "This project contains a Python script that exploits **CVE-2023-38831**, a vulnerability in **WinRAR** versions prior to 6.23. The exploit generates a **malicious RAR archive** that triggers the execution of arbitrary code when the victim opens a benign-looking file within the archive (such as a PDF). ", "fork": false, "created_at": "2024-09-27T18:23:30Z", "updated_at": "2024-09-27T18:28:09Z", "pushed_at": "2024-09-27T18:28:05Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 872824548, "name": "CVE-2023-38831", "full_name": "idkwastaken\/CVE-2023-38831", "owner": { "login": "idkwastaken", "id": 180330197, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/180330197?v=4", "html_url": "https:\/\/github.com\/idkwastaken", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/idkwastaken\/CVE-2023-38831", "description": null, "fork": false, "created_at": "2024-10-15T06:23:13Z", "updated_at": "2024-10-15T06:30:45Z", "pushed_at": "2024-10-15T06:30:41Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 886745063, "name": "CVE-2023-38831-POC", "full_name": "RonF98\/CVE-2023-38831-POC", "owner": { "login": "RonF98", "id": 181740430, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/181740430?v=4", "html_url": "https:\/\/github.com\/RonF98", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/RonF98\/CVE-2023-38831-POC", "description": "CVE-2023-38831 is a Zero-day WinRAR vulnerability that lets attackers disguise malicious files in archives, tricking users into executing harmful content.", "fork": false, "created_at": "2024-11-11T14:25:41Z", "updated_at": "2024-11-25T09:54:03Z", "pushed_at": "2024-11-19T14:07:27Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 897859058, "name": "CVE-2023-38831_Exploit", "full_name": "VictoriousKnight\/CVE-2023-38831_Exploit", "owner": { "login": "VictoriousKnight", "id": 97209296, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97209296?v=4", "html_url": "https:\/\/github.com\/VictoriousKnight", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/VictoriousKnight\/CVE-2023-38831_Exploit", "description": null, "fork": false, "created_at": "2024-12-03T11:13:37Z", "updated_at": "2024-12-03T11:17:23Z", "pushed_at": "2024-12-03T11:17:20Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 } ]