PoC-in-GitHub/2023/CVE-2023-38831.json
2025-01-16 03:32:55 +09:00

1670 lines
No EOL
58 KiB
JSON
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 682645268,
"name": "winrar_CVE-2023-38831_lazy_poc",
"full_name": "BoredHackerBlog\/winrar_CVE-2023-38831_lazy_poc",
"owner": {
"login": "BoredHackerBlog",
"id": 38662926,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38662926?v=4",
"html_url": "https:\/\/github.com\/BoredHackerBlog",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/BoredHackerBlog\/winrar_CVE-2023-38831_lazy_poc",
"description": "lazy way to create CVE-2023-38831 winrar file for testing",
"fork": false,
"created_at": "2023-08-24T16:03:07Z",
"updated_at": "2024-12-09T01:45:14Z",
"pushed_at": "2023-08-24T16:13:02Z",
"stargazers_count": 92,
"watchers_count": 92,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 92,
"score": 0,
"subscribers_count": 4
},
{
"id": 682972740,
"name": "CVE-2023-38831-winrar-exploit",
"full_name": "b1tg\/CVE-2023-38831-winrar-exploit",
"owner": {
"login": "b1tg",
"id": 33436708,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33436708?v=4",
"html_url": "https:\/\/github.com\/b1tg",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/b1tg\/CVE-2023-38831-winrar-exploit",
"description": "CVE-2023-38831 winrar exploit generator",
"fork": false,
"created_at": "2023-08-25T09:44:08Z",
"updated_at": "2025-01-14T03:51:05Z",
"pushed_at": "2023-11-26T06:46:44Z",
"stargazers_count": 783,
"watchers_count": 783,
"has_discussions": false,
"forks_count": 140,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"0day",
"cve",
"exploit"
],
"visibility": "public",
"forks": 140,
"watchers": 783,
"score": 0,
"subscribers_count": 9
},
{
"id": 683645489,
"name": "CVE-2023-38831-HUNT",
"full_name": "IR-HuntGuardians\/CVE-2023-38831-HUNT",
"owner": {
"login": "IR-HuntGuardians",
"id": 98984117,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98984117?v=4",
"html_url": "https:\/\/github.com\/IR-HuntGuardians",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/IR-HuntGuardians\/CVE-2023-38831-HUNT",
"description": null,
"fork": false,
"created_at": "2023-08-27T08:42:24Z",
"updated_at": "2024-05-15T19:18:09Z",
"pushed_at": "2023-08-27T08:52:19Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 683726401,
"name": "cve-2023-38831",
"full_name": "Garck3h\/cve-2023-38831",
"owner": {
"login": "Garck3h",
"id": 104743791,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104743791?v=4",
"html_url": "https:\/\/github.com\/Garck3h",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Garck3h\/cve-2023-38831",
"description": "一款用于生成winrar程序RCE即cve-2023-38831的POC的工具。",
"fork": false,
"created_at": "2023-08-27T14:08:36Z",
"updated_at": "2024-11-28T16:04:54Z",
"pushed_at": "2023-08-27T14:35:00Z",
"stargazers_count": 129,
"watchers_count": 129,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 129,
"score": 0,
"subscribers_count": 1
},
{
"id": 683843491,
"name": "CVE-2023-38831-RaRCE",
"full_name": "ignis-sec\/CVE-2023-38831-RaRCE",
"owner": {
"login": "ignis-sec",
"id": 16636092,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16636092?v=4",
"html_url": "https:\/\/github.com\/ignis-sec",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ignis-sec\/CVE-2023-38831-RaRCE",
"description": "An easy to install and easy to run tool for generating exploit payloads for CVE-2023-38831, WinRAR RCE before versions 6.23",
"fork": false,
"created_at": "2023-08-27T21:49:37Z",
"updated_at": "2024-10-21T10:38:58Z",
"pushed_at": "2023-08-27T22:17:56Z",
"stargazers_count": 115,
"watchers_count": 115,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"archive",
"exploit",
"exploit-development",
"rce",
"security",
"winrar"
],
"visibility": "public",
"forks": 18,
"watchers": 115,
"score": 0,
"subscribers_count": 2
},
{
"id": 683930555,
"name": "CVE-2023-38831",
"full_name": "HDCE-inc\/CVE-2023-38831",
"owner": {
"login": "HDCE-inc",
"id": 141088081,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/141088081?v=4",
"html_url": "https:\/\/github.com\/HDCE-inc",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/HDCE-inc\/CVE-2023-38831",
"description": "CVE-2023-38831 PoC (Proof Of Concept)",
"fork": false,
"created_at": "2023-08-28T04:56:10Z",
"updated_at": "2024-12-22T22:15:31Z",
"pushed_at": "2024-08-04T01:00:35Z",
"stargazers_count": 66,
"watchers_count": 66,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 66,
"score": 0,
"subscribers_count": 0
},
{
"id": 684007687,
"name": "CVE-2023-38831_ReverseShell_Winrar-RCE",
"full_name": "Maalfer\/CVE-2023-38831_ReverseShell_Winrar-RCE",
"owner": {
"login": "Maalfer",
"id": 96432001,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96432001?v=4",
"html_url": "https:\/\/github.com\/Maalfer",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Maalfer\/CVE-2023-38831_ReverseShell_Winrar-RCE",
"description": "Pasos necesarios para obtener una reverse shell explotando la vulnerabilidad de winrar CVE-2023-38831 en versiones anteriores a 6.23.",
"fork": false,
"created_at": "2023-08-28T08:56:16Z",
"updated_at": "2024-11-11T04:58:57Z",
"pushed_at": "2023-08-31T07:40:12Z",
"stargazers_count": 22,
"watchers_count": 22,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 22,
"score": 0,
"subscribers_count": 2
},
{
"id": 684145331,
"name": "WinRAR-Code-Execution-Vulnerability-CVE-2023-38831",
"full_name": "knight0x07\/WinRAR-Code-Execution-Vulnerability-CVE-2023-38831",
"owner": {
"login": "knight0x07",
"id": 60843949,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60843949?v=4",
"html_url": "https:\/\/github.com\/knight0x07",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/knight0x07\/WinRAR-Code-Execution-Vulnerability-CVE-2023-38831",
"description": "Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831) ",
"fork": false,
"created_at": "2023-08-28T14:48:22Z",
"updated_at": "2025-01-04T13:34:34Z",
"pushed_at": "2023-08-28T15:33:27Z",
"stargazers_count": 41,
"watchers_count": 41,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 41,
"score": 0,
"subscribers_count": 5
},
{
"id": 684145428,
"name": "cve-2023-38831",
"full_name": "akhomlyuk\/cve-2023-38831",
"owner": {
"login": "akhomlyuk",
"id": 26635022,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26635022?v=4",
"html_url": "https:\/\/github.com\/akhomlyuk",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/akhomlyuk\/cve-2023-38831",
"description": "CVE-2023-38831 WinRAR",
"fork": false,
"created_at": "2023-08-28T14:48:35Z",
"updated_at": "2024-04-18T19:39:48Z",
"pushed_at": "2023-08-28T15:35:43Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 2
},
{
"id": 684162692,
"name": "CVE-2023-38831-KQL",
"full_name": "PascalAsch\/CVE-2023-38831-KQL",
"owner": {
"login": "PascalAsch",
"id": 20398716,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20398716?v=4",
"html_url": "https:\/\/github.com\/PascalAsch",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/PascalAsch\/CVE-2023-38831-KQL",
"description": "KQL Hunting for WinRAR CVE-2023-38831",
"fork": false,
"created_at": "2023-08-28T15:26:14Z",
"updated_at": "2023-10-25T20:12:35Z",
"pushed_at": "2023-08-28T16:06:17Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 684311499,
"name": "CVE-2023-38831-winrar-expoit-simple-Poc",
"full_name": "ahmed-fa7im\/CVE-2023-38831-winrar-expoit-simple-Poc",
"owner": {
"login": "ahmed-fa7im",
"id": 64432235,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64432235?v=4",
"html_url": "https:\/\/github.com\/ahmed-fa7im",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ahmed-fa7im\/CVE-2023-38831-winrar-expoit-simple-Poc",
"description": "CVE-2023-38831 winrar exploit generator and get reverse shell",
"fork": false,
"created_at": "2023-08-28T22:08:31Z",
"updated_at": "2024-04-27T21:27:52Z",
"pushed_at": "2023-08-28T23:51:31Z",
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 11,
"score": 0,
"subscribers_count": 1
},
{
"id": 684442018,
"name": "CVE-2023-38831",
"full_name": "thegr1ffyn\/CVE-2023-38831",
"owner": {
"login": "thegr1ffyn",
"id": 95119705,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95119705?v=4",
"html_url": "https:\/\/github.com\/thegr1ffyn",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/thegr1ffyn\/CVE-2023-38831",
"description": "Proof of Concept (POC) for CVE-2023-38831 WinRAR",
"fork": false,
"created_at": "2023-08-29T06:11:42Z",
"updated_at": "2024-11-19T14:46:51Z",
"pushed_at": "2023-08-29T06:36:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 684673194,
"name": "CVE-2023-38831-Exploit-and-Detection",
"full_name": "MortySecurity\/CVE-2023-38831-Exploit-and-Detection",
"owner": {
"login": "MortySecurity",
"id": 6032062,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6032062?v=4",
"html_url": "https:\/\/github.com\/MortySecurity",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/MortySecurity\/CVE-2023-38831-Exploit-and-Detection",
"description": "This repository has both an attack detection tool and a Proof-of-Concept (PoC) Python script for the WinRAR CVE-2023-38831 vulnerability. ",
"fork": false,
"created_at": "2023-08-29T16:12:20Z",
"updated_at": "2023-08-29T16:16:01Z",
"pushed_at": "2023-08-29T16:15:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 685043786,
"name": "CVE-2023-38831-PoC",
"full_name": "z3r0sw0rd\/CVE-2023-38831-PoC",
"owner": {
"login": "z3r0sw0rd",
"id": 18899200,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18899200?v=4",
"html_url": "https:\/\/github.com\/z3r0sw0rd",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/z3r0sw0rd\/CVE-2023-38831-PoC",
"description": "Proof-of-Concept for CVE-2023-38831 Zero-Day vulnerability in WinRAR",
"fork": false,
"created_at": "2023-08-30T11:52:23Z",
"updated_at": "2024-09-03T14:48:35Z",
"pushed_at": "2023-09-01T07:37:20Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"archive",
"cve-2023-38831",
"exploit",
"remote-code-execution",
"winrar"
],
"visibility": "public",
"forks": 0,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},
{
"id": 685047347,
"name": "CVE-2023-38831",
"full_name": "sh770\/CVE-2023-38831",
"owner": {
"login": "sh770",
"id": 111239198,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/111239198?v=4",
"html_url": "https:\/\/github.com\/sh770",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/sh770\/CVE-2023-38831",
"description": "winrar exploit 6.22 <=",
"fork": false,
"created_at": "2023-08-30T12:02:36Z",
"updated_at": "2023-08-30T12:02:36Z",
"pushed_at": "2023-08-30T10:23:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 685141303,
"name": "CVE-2023-38831_ReverseShell_Winrar",
"full_name": "BeniB3astt\/CVE-2023-38831_ReverseShell_Winrar",
"owner": {
"login": "BeniB3astt",
"id": 139050304,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/139050304?v=4",
"html_url": "https:\/\/github.com\/BeniB3astt",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/BeniB3astt\/CVE-2023-38831_ReverseShell_Winrar",
"description": null,
"fork": false,
"created_at": "2023-08-30T15:49:01Z",
"updated_at": "2023-11-14T03:11:41Z",
"pushed_at": "2023-08-30T18:11:13Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 685237935,
"name": "CVE-2023-38831-Winrar-Exploit-Generator-POC",
"full_name": "MorDavid\/CVE-2023-38831-Winrar-Exploit-Generator-POC",
"owner": {
"login": "MorDavid",
"id": 24622066,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24622066?v=4",
"html_url": "https:\/\/github.com\/MorDavid",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/MorDavid\/CVE-2023-38831-Winrar-Exploit-Generator-POC",
"description": "This is a POC for the CVE-2023-3883 exploit targeting WinRAR up to 6.22. Modified some existing internet-sourced POCs by introducing greater dynamism and incorporated additional try-except blocks within the code.",
"fork": false,
"created_at": "2023-08-30T19:55:11Z",
"updated_at": "2024-05-19T16:45:22Z",
"pushed_at": "2023-08-31T15:07:51Z",
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"archive",
"cve-2023-38831",
"exploit",
"rce",
"rce-exploit",
"remote-code-execution",
"winrar"
],
"visibility": "public",
"forks": 4,
"watchers": 8,
"score": 0,
"subscribers_count": 1
},
{
"id": 686063338,
"name": "CVE-2023-38831-winrar",
"full_name": "Mich-ele\/CVE-2023-38831-winrar",
"owner": {
"login": "Mich-ele",
"id": 30556763,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30556763?v=4",
"html_url": "https:\/\/github.com\/Mich-ele",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Mich-ele\/CVE-2023-38831-winrar",
"description": "CVE-2023-38831 winrar exploit builder",
"fork": false,
"created_at": "2023-09-01T16:45:42Z",
"updated_at": "2024-11-08T21:48:16Z",
"pushed_at": "2023-09-01T17:43:16Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2023-38831",
"exploit",
"winrar"
],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 686580975,
"name": "CVE-2023-38831",
"full_name": "asepsaepdin\/CVE-2023-38831",
"owner": {
"login": "asepsaepdin",
"id": 122620685,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/122620685?v=4",
"html_url": "https:\/\/github.com\/asepsaepdin",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/asepsaepdin\/CVE-2023-38831",
"description": null,
"fork": false,
"created_at": "2023-09-03T09:18:56Z",
"updated_at": "2023-09-03T10:42:39Z",
"pushed_at": "2023-09-03T14:08:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 686665715,
"name": "CVE-2023-38831-winrar-exploit",
"full_name": "Fa1c0n35\/CVE-2023-38831-winrar-exploit",
"owner": {
"login": "Fa1c0n35",
"id": 33335488,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33335488?v=4",
"html_url": "https:\/\/github.com\/Fa1c0n35",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Fa1c0n35\/CVE-2023-38831-winrar-exploit",
"description": null,
"fork": false,
"created_at": "2023-09-03T14:53:42Z",
"updated_at": "2023-09-03T14:53:55Z",
"pushed_at": "2023-09-03T14:53:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 686761346,
"name": "WinRAR-CVE-2023-38831",
"full_name": "xaitax\/WinRAR-CVE-2023-38831",
"owner": {
"login": "xaitax",
"id": 5014849,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5014849?v=4",
"html_url": "https:\/\/github.com\/xaitax",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/xaitax\/WinRAR-CVE-2023-38831",
"description": "This module exploits a vulnerability in WinRAR (CVE-2023-38831). When a user opens a crafted RAR file and its embedded document, a script is executed, leading to code execution.",
"fork": false,
"created_at": "2023-09-03T21:14:05Z",
"updated_at": "2024-12-12T17:05:26Z",
"pushed_at": "2023-09-08T06:15:42Z",
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 11,
"score": 0,
"subscribers_count": 2
},
{
"id": 688341659,
"name": "CVE-2023-38831-winrar",
"full_name": "GOTonyGO\/CVE-2023-38831-winrar",
"owner": {
"login": "GOTonyGO",
"id": 107836621,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107836621?v=4",
"html_url": "https:\/\/github.com\/GOTonyGO",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/GOTonyGO\/CVE-2023-38831-winrar",
"description": "Quick exploit builder for CVE-2023-38831, a vulnerability that affects WinRAR versions before 6.23.",
"fork": false,
"created_at": "2023-09-07T06:42:36Z",
"updated_at": "2023-09-07T06:44:20Z",
"pushed_at": "2023-09-07T06:45:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 690603491,
"name": "CVE-2023-38831",
"full_name": "Malwareman007\/CVE-2023-38831",
"owner": {
"login": "Malwareman007",
"id": 86009160,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86009160?v=4",
"html_url": "https:\/\/github.com\/Malwareman007",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Malwareman007\/CVE-2023-38831",
"description": "CVE-2023-38831 WinRaR Exploit Generator",
"fork": false,
"created_at": "2023-09-12T14:07:00Z",
"updated_at": "2024-08-10T17:51:53Z",
"pushed_at": "2023-09-12T16:39:44Z",
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"0day-exploit",
"cve-2023-38831",
"exploit",
"vulnerability",
"winrar"
],
"visibility": "public",
"forks": 3,
"watchers": 9,
"score": 0,
"subscribers_count": 1
},
{
"id": 690658119,
"name": "CVE-2023-38831-WinRAR-Exploit",
"full_name": "ameerpornillos\/CVE-2023-38831-WinRAR-Exploit",
"owner": {
"login": "ameerpornillos",
"id": 44928938,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44928938?v=4",
"html_url": "https:\/\/github.com\/ameerpornillos",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ameerpornillos\/CVE-2023-38831-WinRAR-Exploit",
"description": "Proof of concept (PoC) exploit for WinRAR vulnerability (CVE-2023-38831) vulnerability",
"fork": false,
"created_at": "2023-09-12T16:01:17Z",
"updated_at": "2024-04-09T12:36:15Z",
"pushed_at": "2023-09-12T16:26:22Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 692636502,
"name": "CVE-2023-38831",
"full_name": "an040702\/CVE-2023-38831",
"owner": {
"login": "an040702",
"id": 41360497,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41360497?v=4",
"html_url": "https:\/\/github.com\/an040702",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/an040702\/CVE-2023-38831",
"description": null,
"fork": false,
"created_at": "2023-09-17T05:21:30Z",
"updated_at": "2023-10-26T08:45:23Z",
"pushed_at": "2023-09-17T05:26:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 693647970,
"name": "cve-2023-38831",
"full_name": "elefantesagradodeluzinfinita\/cve-2023-38831",
"owner": {
"login": "elefantesagradodeluzinfinita",
"id": 69746530,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69746530?v=4",
"html_url": "https:\/\/github.com\/elefantesagradodeluzinfinita",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/elefantesagradodeluzinfinita\/cve-2023-38831",
"description": "DR. GANDALF: Aplicacion DESKTOP para WINDOWS, Inyector de archivos ZIP, generador de exploits para vulnerabilidad de WinRAR 6.22 y anteriores.",
"fork": false,
"created_at": "2023-09-19T12:47:12Z",
"updated_at": "2023-10-19T15:34:22Z",
"pushed_at": "2023-09-24T05:30:38Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 694502812,
"name": "CVE-2023-38831",
"full_name": "malvika-thakur\/CVE-2023-38831",
"owner": {
"login": "malvika-thakur",
"id": 60217652,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60217652?v=4",
"html_url": "https:\/\/github.com\/malvika-thakur",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/malvika-thakur\/CVE-2023-38831",
"description": "Proof-of-Concept (POC) of CVE-2023-38831 Zero-Day vulnerability in WinRAR",
"fork": false,
"created_at": "2023-09-21T06:08:30Z",
"updated_at": "2024-01-10T11:50:56Z",
"pushed_at": "2023-09-21T09:30:59Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 704052455,
"name": "CVE-2023-38831",
"full_name": "ruycr4ft\/CVE-2023-38831",
"owner": {
"login": "ruycr4ft",
"id": 103446004,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103446004?v=4",
"html_url": "https:\/\/github.com\/ruycr4ft",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ruycr4ft\/CVE-2023-38831",
"description": null,
"fork": false,
"created_at": "2023-10-12T12:46:35Z",
"updated_at": "2023-10-12T16:13:22Z",
"pushed_at": "2023-10-12T13:23:29Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 708148022,
"name": "CVE-2023-38831",
"full_name": "Nielk74\/CVE-2023-38831",
"owner": {
"login": "Nielk74",
"id": 67603819,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67603819?v=4",
"html_url": "https:\/\/github.com\/Nielk74",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Nielk74\/CVE-2023-38831",
"description": null,
"fork": false,
"created_at": "2023-10-21T17:03:48Z",
"updated_at": "2023-10-21T17:07:51Z",
"pushed_at": "2023-10-21T17:16:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 709081442,
"name": "CVE-2023-38831",
"full_name": "kehrijksen\/CVE-2023-38831",
"owner": {
"login": "kehrijksen",
"id": 9675317,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9675317?v=4",
"html_url": "https:\/\/github.com\/kehrijksen",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/kehrijksen\/CVE-2023-38831",
"description": "CVE-2023-38831 is an RCE in WinRAR (<6.23)",
"fork": false,
"created_at": "2023-10-24T01:14:03Z",
"updated_at": "2023-10-24T01:19:35Z",
"pushed_at": "2023-10-24T01:26:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 712814993,
"name": "SideCopy-Exploits-CVE-2023-38831",
"full_name": "h3xecute\/SideCopy-Exploits-CVE-2023-38831",
"owner": {
"login": "h3xecute",
"id": 76843512,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76843512?v=4",
"html_url": "https:\/\/github.com\/h3xecute",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/h3xecute\/SideCopy-Exploits-CVE-2023-38831",
"description": "SideCopy APT Group exploits CVE-2023-38831",
"fork": false,
"created_at": "2023-11-01T08:57:15Z",
"updated_at": "2023-11-01T08:57:16Z",
"pushed_at": "2023-11-01T09:06:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 715402481,
"name": "winrar-cve-2023-38831-poc-gen",
"full_name": "s4m98\/winrar-cve-2023-38831-poc-gen",
"owner": {
"login": "s4m98",
"id": 114874332,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114874332?v=4",
"html_url": "https:\/\/github.com\/s4m98",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/s4m98\/winrar-cve-2023-38831-poc-gen",
"description": "WinRAR cve-2023-38831-poc-generator",
"fork": false,
"created_at": "2023-11-07T04:14:04Z",
"updated_at": "2024-12-14T11:06:26Z",
"pushed_at": "2023-11-07T05:24:44Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 718970099,
"name": "WinRAR-Vulnerability-recurrence-tutorial",
"full_name": "xk-mt\/WinRAR-Vulnerability-recurrence-tutorial",
"owner": {
"login": "xk-mt",
"id": 77874955,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77874955?v=4",
"html_url": "https:\/\/github.com\/xk-mt",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/xk-mt\/WinRAR-Vulnerability-recurrence-tutorial",
"description": "WinRAR-6.22、CVE-2023-38831、CNNVD-202308-1943、DM-202307-003730、QVD-2023-19572漏洞复现",
"fork": false,
"created_at": "2023-11-15T07:01:05Z",
"updated_at": "2024-09-23T11:17:20Z",
"pushed_at": "2024-01-15T08:32:01Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 727188390,
"name": "CVE-2023-38831-POC",
"full_name": "MyStuffYT\/CVE-2023-38831-POC",
"owner": {
"login": "MyStuffYT",
"id": 73236689,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73236689?v=4",
"html_url": "https:\/\/github.com\/MyStuffYT",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/MyStuffYT\/CVE-2023-38831-POC",
"description": "Proof-of-concept of CVE-2023-38831",
"fork": false,
"created_at": "2023-12-04T11:13:43Z",
"updated_at": "2023-12-04T11:16:10Z",
"pushed_at": "2024-03-01T20:54:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 730732165,
"name": "CVE-2023-38831",
"full_name": "SpamixOfficial\/CVE-2023-38831",
"owner": {
"login": "SpamixOfficial",
"id": 99183771,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99183771?v=4",
"html_url": "https:\/\/github.com\/SpamixOfficial",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/SpamixOfficial\/CVE-2023-38831",
"description": "CVE-2023-38831 Proof-of-concept code",
"fork": false,
"created_at": "2023-12-12T14:54:30Z",
"updated_at": "2023-12-13T20:06:39Z",
"pushed_at": "2023-12-20T11:24:29Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2023-38831",
"poc",
"proof-of-concept",
"rust"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 735737669,
"name": "winDED",
"full_name": "r1yaz\/winDED",
"owner": {
"login": "r1yaz",
"id": 36794004,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36794004?v=4",
"html_url": "https:\/\/github.com\/r1yaz",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/r1yaz\/winDED",
"description": "Exploit Development using python for CVE-2023-38831 (POC)",
"fork": false,
"created_at": "2023-12-26T01:36:32Z",
"updated_at": "2023-12-29T06:00:17Z",
"pushed_at": "2023-12-28T18:48:21Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2023-38831",
"exploit",
"python",
"winrar"
],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 777256530,
"name": "evil-winrar",
"full_name": "youmulijiang\/evil-winrar",
"owner": {
"login": "youmulijiang",
"id": 111237463,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/111237463?v=4",
"html_url": "https:\/\/github.com\/youmulijiang",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/youmulijiang\/evil-winrar",
"description": "evil-winrar,CVE-2023-38831漏洞利用和社会工程学攻击框架 (evil-winrar, CVE-2023-38831 Vulnerability Exploitation and Social Engineering Attack Framework)",
"fork": false,
"created_at": "2024-03-25T14:05:24Z",
"updated_at": "2024-05-20T16:55:05Z",
"pushed_at": "2024-03-25T14:38:29Z",
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 9,
"score": 0,
"subscribers_count": 2
},
{
"id": 780499356,
"name": "VolleyballSquid-----CVE-2023-38831-and-Bypass-UAC",
"full_name": "solomon12354\/VolleyballSquid-----CVE-2023-38831-and-Bypass-UAC",
"owner": {
"login": "solomon12354",
"id": 84257391,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84257391?v=4",
"html_url": "https:\/\/github.com\/solomon12354",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/solomon12354\/VolleyballSquid-----CVE-2023-38831-and-Bypass-UAC",
"description": "This is my malware",
"fork": false,
"created_at": "2024-04-01T15:59:34Z",
"updated_at": "2024-07-13T01:50:03Z",
"pushed_at": "2024-06-18T01:15:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 783001135,
"name": "CVE-2023-38831",
"full_name": "RomainBayle08\/CVE-2023-38831",
"owner": {
"login": "RomainBayle08",
"id": 90604846,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90604846?v=4",
"html_url": "https:\/\/github.com\/RomainBayle08",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RomainBayle08\/CVE-2023-38831",
"description": null,
"fork": false,
"created_at": "2024-04-06T16:55:29Z",
"updated_at": "2024-04-06T16:55:43Z",
"pushed_at": "2024-04-06T17:00:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 816174543,
"name": "imbyter-WinRAR_CVE-2023-38831",
"full_name": "imbyter\/imbyter-WinRAR_CVE-2023-38831",
"owner": {
"login": "imbyter",
"id": 53294133,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53294133?v=4",
"html_url": "https:\/\/github.com\/imbyter",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/imbyter\/imbyter-WinRAR_CVE-2023-38831",
"description": "WinRAR漏洞测试复现。详参https:\/\/flowus.cn\/share\/a3b35db0-ab5e-4abc-b8d3-5ff284e82e7b",
"fork": false,
"created_at": "2024-06-17T07:30:47Z",
"updated_at": "2024-06-17T07:34:37Z",
"pushed_at": "2024-06-17T07:34:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 817529952,
"name": "PDFernetRemotelo",
"full_name": "UnHackerEnCapital\/PDFernetRemotelo",
"owner": {
"login": "UnHackerEnCapital",
"id": 173314584,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/173314584?v=4",
"html_url": "https:\/\/github.com\/UnHackerEnCapital",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/UnHackerEnCapital\/PDFernetRemotelo",
"description": "PoC - Prueba de Concepto de CVE-2024-4367 en conjunto al CVE-2023-38831 en un solo Script",
"fork": false,
"created_at": "2024-06-19T23:23:07Z",
"updated_at": "2024-11-20T16:30:50Z",
"pushed_at": "2024-06-20T00:02:49Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 819687370,
"name": "CVE-2021-34527-CVE-2023-38831-and-CVE-2023-32784",
"full_name": "Hirusha-N\/CVE-2021-34527-CVE-2023-38831-and-CVE-2023-32784",
"owner": {
"login": "Hirusha-N",
"id": 76760906,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76760906?v=4",
"html_url": "https:\/\/github.com\/Hirusha-N",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Hirusha-N\/CVE-2021-34527-CVE-2023-38831-and-CVE-2023-32784",
"description": null,
"fork": false,
"created_at": "2024-06-25T02:30:31Z",
"updated_at": "2024-06-25T02:32:40Z",
"pushed_at": "2024-06-25T02:32:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 829474031,
"name": "cve-2023-38831-poc",
"full_name": "khanhtranngoccva\/cve-2023-38831-poc",
"owner": {
"login": "khanhtranngoccva",
"id": 61155608,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61155608?v=4",
"html_url": "https:\/\/github.com\/khanhtranngoccva",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/khanhtranngoccva\/cve-2023-38831-poc",
"description": null,
"fork": false,
"created_at": "2024-07-16T13:54:09Z",
"updated_at": "2024-07-16T13:54:55Z",
"pushed_at": "2024-07-16T13:54:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 832765370,
"name": "Windows-X64-RAT",
"full_name": "MaorBuskila\/Windows-X64-RAT",
"owner": {
"login": "MaorBuskila",
"id": 68689543,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68689543?v=4",
"html_url": "https:\/\/github.com\/MaorBuskila",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/MaorBuskila\/Windows-X64-RAT",
"description": "Remote Access Trojan (RAT) for Windows x64 using a combination of vulnerability CVE-2023-38831 (WinRAR < 6.23 vulnerability) and Shellcode exploitation technique.",
"fork": false,
"created_at": "2024-07-23T17:20:06Z",
"updated_at": "2024-10-07T21:32:27Z",
"pushed_at": "2024-07-23T17:30:46Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 838852231,
"name": "cve_2023_38831_scanner",
"full_name": "yezzfusl\/cve_2023_38831_scanner",
"owner": {
"login": "yezzfusl",
"id": 18398621,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18398621?v=4",
"html_url": "https:\/\/github.com\/yezzfusl",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/yezzfusl\/cve_2023_38831_scanner",
"description": "This Python application scans for the CVE-2023-38831 vulnerability in WinRAR.",
"fork": false,
"created_at": "2024-08-06T13:21:27Z",
"updated_at": "2024-08-06T14:44:37Z",
"pushed_at": "2024-12-02T04:08:41Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2023-38831",
"cybersecurity",
"memory-scanning",
"network-analysis",
"sandbox-security",
"security-scanner",
"vulnerability-detection",
"winrar-vulnerability"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 849935552,
"name": "CVE-2023-38831",
"full_name": "FirFirdaus\/CVE-2023-38831",
"owner": {
"login": "FirFirdaus",
"id": 89730202,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89730202?v=4",
"html_url": "https:\/\/github.com\/FirFirdaus",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/FirFirdaus\/CVE-2023-38831",
"description": "A POC demo on CVE-2023-38831",
"fork": false,
"created_at": "2024-08-30T14:48:26Z",
"updated_at": "2024-08-31T08:33:11Z",
"pushed_at": "2024-08-31T08:33:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 863722602,
"name": "LAB-DFIR-cve-2023-38831",
"full_name": "ra3edAJ\/LAB-DFIR-cve-2023-38831",
"owner": {
"login": "ra3edAJ",
"id": 122083416,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/122083416?v=4",
"html_url": "https:\/\/github.com\/ra3edAJ",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ra3edAJ\/LAB-DFIR-cve-2023-38831",
"description": "d",
"fork": false,
"created_at": "2024-09-26T19:44:08Z",
"updated_at": "2024-09-26T19:49:33Z",
"pushed_at": "2024-09-26T19:49:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 864227138,
"name": "CVE-2023-38831-Exploit",
"full_name": "technicalcorp0\/CVE-2023-38831-Exploit",
"owner": {
"login": "technicalcorp0",
"id": 170502012,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/170502012?v=4",
"html_url": "https:\/\/github.com\/technicalcorp0",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/technicalcorp0\/CVE-2023-38831-Exploit",
"description": "This project contains a Python script that exploits **CVE-2023-38831**, a vulnerability in **WinRAR** versions prior to 6.23. The exploit generates a **malicious RAR archive** that triggers the execution of arbitrary code when the victim opens a benign-looking file within the archive (such as a PDF). ",
"fork": false,
"created_at": "2024-09-27T18:23:30Z",
"updated_at": "2024-09-27T18:28:09Z",
"pushed_at": "2024-09-27T18:28:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 872824548,
"name": "CVE-2023-38831",
"full_name": "idkwastaken\/CVE-2023-38831",
"owner": {
"login": "idkwastaken",
"id": 180330197,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/180330197?v=4",
"html_url": "https:\/\/github.com\/idkwastaken",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/idkwastaken\/CVE-2023-38831",
"description": null,
"fork": false,
"created_at": "2024-10-15T06:23:13Z",
"updated_at": "2024-10-15T06:30:45Z",
"pushed_at": "2024-10-15T06:30:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 886745063,
"name": "CVE-2023-38831-POC",
"full_name": "RonF98\/CVE-2023-38831-POC",
"owner": {
"login": "RonF98",
"id": 181740430,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/181740430?v=4",
"html_url": "https:\/\/github.com\/RonF98",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RonF98\/CVE-2023-38831-POC",
"description": "CVE-2023-38831 is a Zero-day WinRAR vulnerability that lets attackers disguise malicious files in archives, tricking users into executing harmful content.",
"fork": false,
"created_at": "2024-11-11T14:25:41Z",
"updated_at": "2024-11-25T09:54:03Z",
"pushed_at": "2024-11-19T14:07:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 897859058,
"name": "CVE-2023-38831_Exploit",
"full_name": "VictoriousKnight\/CVE-2023-38831_Exploit",
"owner": {
"login": "VictoriousKnight",
"id": 97209296,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97209296?v=4",
"html_url": "https:\/\/github.com\/VictoriousKnight",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/VictoriousKnight\/CVE-2023-38831_Exploit",
"description": null,
"fork": false,
"created_at": "2024-12-03T11:13:37Z",
"updated_at": "2024-12-16T15:10:50Z",
"pushed_at": "2024-12-16T15:10:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 909912770,
"name": "winrar-cve-2023-38831",
"full_name": "kuyrathdaro\/winrar-cve-2023-38831",
"owner": {
"login": "kuyrathdaro",
"id": 92511754,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92511754?v=4",
"html_url": "https:\/\/github.com\/kuyrathdaro",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/kuyrathdaro\/winrar-cve-2023-38831",
"description": "POC Exploit Script in Python",
"fork": false,
"created_at": "2024-12-30T03:33:23Z",
"updated_at": "2024-12-30T03:33:23Z",
"pushed_at": "2024-12-30T03:33:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]