mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-17 13:22:21 +01:00
941 lines
No EOL
33 KiB
JSON
941 lines
No EOL
33 KiB
JSON
[
|
||
{
|
||
"id": 682645268,
|
||
"name": "winrar_CVE-2023-38831_lazy_poc",
|
||
"full_name": "BoredHackerBlog\/winrar_CVE-2023-38831_lazy_poc",
|
||
"owner": {
|
||
"login": "BoredHackerBlog",
|
||
"id": 38662926,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38662926?v=4",
|
||
"html_url": "https:\/\/github.com\/BoredHackerBlog"
|
||
},
|
||
"html_url": "https:\/\/github.com\/BoredHackerBlog\/winrar_CVE-2023-38831_lazy_poc",
|
||
"description": "lazy way to create CVE-2023-38831 winrar file for testing",
|
||
"fork": false,
|
||
"created_at": "2023-08-24T16:03:07Z",
|
||
"updated_at": "2023-10-19T06:19:53Z",
|
||
"pushed_at": "2023-08-24T16:13:02Z",
|
||
"stargazers_count": 91,
|
||
"watchers_count": 91,
|
||
"has_discussions": false,
|
||
"forks_count": 19,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 19,
|
||
"watchers": 91,
|
||
"score": 0,
|
||
"subscribers_count": 3
|
||
},
|
||
{
|
||
"id": 682972740,
|
||
"name": "CVE-2023-38831-winrar-exploit",
|
||
"full_name": "b1tg\/CVE-2023-38831-winrar-exploit",
|
||
"owner": {
|
||
"login": "b1tg",
|
||
"id": 33436708,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33436708?v=4",
|
||
"html_url": "https:\/\/github.com\/b1tg"
|
||
},
|
||
"html_url": "https:\/\/github.com\/b1tg\/CVE-2023-38831-winrar-exploit",
|
||
"description": "CVE-2023-38831 winrar exploit generator",
|
||
"fork": false,
|
||
"created_at": "2023-08-25T09:44:08Z",
|
||
"updated_at": "2023-10-19T12:11:18Z",
|
||
"pushed_at": "2023-09-17T02:17:52Z",
|
||
"stargazers_count": 683,
|
||
"watchers_count": 683,
|
||
"has_discussions": false,
|
||
"forks_count": 120,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"0day",
|
||
"cve",
|
||
"exploit"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 120,
|
||
"watchers": 683,
|
||
"score": 0,
|
||
"subscribers_count": 8
|
||
},
|
||
{
|
||
"id": 683645489,
|
||
"name": "CVE-2023-38831-HUNT",
|
||
"full_name": "IR-HuntGuardians\/CVE-2023-38831-HUNT",
|
||
"owner": {
|
||
"login": "IR-HuntGuardians",
|
||
"id": 98984117,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98984117?v=4",
|
||
"html_url": "https:\/\/github.com\/IR-HuntGuardians"
|
||
},
|
||
"html_url": "https:\/\/github.com\/IR-HuntGuardians\/CVE-2023-38831-HUNT",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2023-08-27T08:42:24Z",
|
||
"updated_at": "2023-08-28T08:06:21Z",
|
||
"pushed_at": "2023-08-27T08:52:19Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 683726401,
|
||
"name": "cve-2023-38831",
|
||
"full_name": "Garck3h\/cve-2023-38831",
|
||
"owner": {
|
||
"login": "Garck3h",
|
||
"id": 104743791,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104743791?v=4",
|
||
"html_url": "https:\/\/github.com\/Garck3h"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Garck3h\/cve-2023-38831",
|
||
"description": "一款用于生成winrar程序RCE(即cve-2023-38831)的POC的工具。",
|
||
"fork": false,
|
||
"created_at": "2023-08-27T14:08:36Z",
|
||
"updated_at": "2023-10-07T07:13:53Z",
|
||
"pushed_at": "2023-08-27T14:35:00Z",
|
||
"stargazers_count": 92,
|
||
"watchers_count": 92,
|
||
"has_discussions": false,
|
||
"forks_count": 18,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 18,
|
||
"watchers": 92,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 683843491,
|
||
"name": "CVE-2023-38831-RaRCE",
|
||
"full_name": "ignis-sec\/CVE-2023-38831-RaRCE",
|
||
"owner": {
|
||
"login": "ignis-sec",
|
||
"id": 16636092,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16636092?v=4",
|
||
"html_url": "https:\/\/github.com\/ignis-sec"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ignis-sec\/CVE-2023-38831-RaRCE",
|
||
"description": "An easy to install and easy to run tool for generating exploit payloads for CVE-2023-38831, WinRAR RCE before versions 6.23",
|
||
"fork": false,
|
||
"created_at": "2023-08-27T21:49:37Z",
|
||
"updated_at": "2023-10-12T16:07:42Z",
|
||
"pushed_at": "2023-08-27T22:17:56Z",
|
||
"stargazers_count": 109,
|
||
"watchers_count": 109,
|
||
"has_discussions": false,
|
||
"forks_count": 19,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"archive",
|
||
"exploit",
|
||
"exploit-development",
|
||
"rce",
|
||
"security",
|
||
"winrar"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 19,
|
||
"watchers": 109,
|
||
"score": 0,
|
||
"subscribers_count": 2
|
||
},
|
||
{
|
||
"id": 683930555,
|
||
"name": "CVE-2023-38831",
|
||
"full_name": "HDCE-inc\/CVE-2023-38831",
|
||
"owner": {
|
||
"login": "HDCE-inc",
|
||
"id": 141088081,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/141088081?v=4",
|
||
"html_url": "https:\/\/github.com\/HDCE-inc"
|
||
},
|
||
"html_url": "https:\/\/github.com\/HDCE-inc\/CVE-2023-38831",
|
||
"description": "CVE-2023-38831 PoC (Proof Of Concept)",
|
||
"fork": false,
|
||
"created_at": "2023-08-28T04:56:10Z",
|
||
"updated_at": "2023-10-18T23:22:32Z",
|
||
"pushed_at": "2023-08-28T20:41:57Z",
|
||
"stargazers_count": 30,
|
||
"watchers_count": 30,
|
||
"has_discussions": false,
|
||
"forks_count": 6,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 6,
|
||
"watchers": 30,
|
||
"score": 0,
|
||
"subscribers_count": 0
|
||
},
|
||
{
|
||
"id": 684007687,
|
||
"name": "CVE-2023-38831_ReverseShell_Winrar-RCE",
|
||
"full_name": "Maalfer\/CVE-2023-38831_ReverseShell_Winrar-RCE",
|
||
"owner": {
|
||
"login": "Maalfer",
|
||
"id": 96432001,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96432001?v=4",
|
||
"html_url": "https:\/\/github.com\/Maalfer"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Maalfer\/CVE-2023-38831_ReverseShell_Winrar-RCE",
|
||
"description": "Pasos necesarios para obtener una reverse shell explotando la vulnerabilidad de winrar CVE-2023-38831 en versiones anteriores a 6.23.",
|
||
"fork": false,
|
||
"created_at": "2023-08-28T08:56:16Z",
|
||
"updated_at": "2023-10-16T13:51:27Z",
|
||
"pushed_at": "2023-08-31T07:40:12Z",
|
||
"stargazers_count": 12,
|
||
"watchers_count": 12,
|
||
"has_discussions": false,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 12,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 684145331,
|
||
"name": "WinRAR-Code-Execution-Vulnerability-CVE-2023-38831",
|
||
"full_name": "knight0x07\/WinRAR-Code-Execution-Vulnerability-CVE-2023-38831",
|
||
"owner": {
|
||
"login": "knight0x07",
|
||
"id": 60843949,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60843949?v=4",
|
||
"html_url": "https:\/\/github.com\/knight0x07"
|
||
},
|
||
"html_url": "https:\/\/github.com\/knight0x07\/WinRAR-Code-Execution-Vulnerability-CVE-2023-38831",
|
||
"description": "Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831) ",
|
||
"fork": false,
|
||
"created_at": "2023-08-28T14:48:22Z",
|
||
"updated_at": "2023-10-03T19:09:04Z",
|
||
"pushed_at": "2023-08-28T15:33:27Z",
|
||
"stargazers_count": 38,
|
||
"watchers_count": 38,
|
||
"has_discussions": false,
|
||
"forks_count": 9,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 9,
|
||
"watchers": 38,
|
||
"score": 0,
|
||
"subscribers_count": 5
|
||
},
|
||
{
|
||
"id": 684145428,
|
||
"name": "cve-2023-38831",
|
||
"full_name": "akhomlyuk\/cve-2023-38831",
|
||
"owner": {
|
||
"login": "akhomlyuk",
|
||
"id": 26635022,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26635022?v=4",
|
||
"html_url": "https:\/\/github.com\/akhomlyuk"
|
||
},
|
||
"html_url": "https:\/\/github.com\/akhomlyuk\/cve-2023-38831",
|
||
"description": "CVE-2023-38831 WinRAR",
|
||
"fork": false,
|
||
"created_at": "2023-08-28T14:48:35Z",
|
||
"updated_at": "2023-08-28T15:26:48Z",
|
||
"pushed_at": "2023-08-28T15:35:43Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 684162692,
|
||
"name": "CVE-2023-38831-KQL",
|
||
"full_name": "PascalAsch\/CVE-2023-38831-KQL",
|
||
"owner": {
|
||
"login": "PascalAsch",
|
||
"id": 20398716,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20398716?v=4",
|
||
"html_url": "https:\/\/github.com\/PascalAsch"
|
||
},
|
||
"html_url": "https:\/\/github.com\/PascalAsch\/CVE-2023-38831-KQL",
|
||
"description": "KQL Hunting for WinRAR CVE-2023-38831",
|
||
"fork": false,
|
||
"created_at": "2023-08-28T15:26:14Z",
|
||
"updated_at": "2023-09-01T16:06:40Z",
|
||
"pushed_at": "2023-08-28T16:06:17Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 3,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 684311499,
|
||
"name": "CVE-2023-38831-winrar-expoit-simple-Poc",
|
||
"full_name": "my-elliot\/CVE-2023-38831-winrar-expoit-simple-Poc",
|
||
"owner": {
|
||
"login": "my-elliot",
|
||
"id": 64432235,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64432235?v=4",
|
||
"html_url": "https:\/\/github.com\/my-elliot"
|
||
},
|
||
"html_url": "https:\/\/github.com\/my-elliot\/CVE-2023-38831-winrar-expoit-simple-Poc",
|
||
"description": "CVE-2023-38831 winrar exploit generator and get reverse shell",
|
||
"fork": false,
|
||
"created_at": "2023-08-28T22:08:31Z",
|
||
"updated_at": "2023-09-09T22:57:23Z",
|
||
"pushed_at": "2023-08-28T23:51:31Z",
|
||
"stargazers_count": 10,
|
||
"watchers_count": 10,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 10,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 684442018,
|
||
"name": "CVE-2023-38831",
|
||
"full_name": "thegr1ffyn\/CVE-2023-38831",
|
||
"owner": {
|
||
"login": "thegr1ffyn",
|
||
"id": 95119705,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95119705?v=4",
|
||
"html_url": "https:\/\/github.com\/thegr1ffyn"
|
||
},
|
||
"html_url": "https:\/\/github.com\/thegr1ffyn\/CVE-2023-38831",
|
||
"description": "Proof of Concept (POC) for CVE-2023-38831 WinRAR",
|
||
"fork": false,
|
||
"created_at": "2023-08-29T06:11:42Z",
|
||
"updated_at": "2023-09-10T00:28:15Z",
|
||
"pushed_at": "2023-08-29T06:36:44Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 684673194,
|
||
"name": "CVE-2023-38831-Exploit-and-Detection",
|
||
"full_name": "MortySecurity\/CVE-2023-38831-Exploit-and-Detection",
|
||
"owner": {
|
||
"login": "MortySecurity",
|
||
"id": 6032062,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6032062?v=4",
|
||
"html_url": "https:\/\/github.com\/MortySecurity"
|
||
},
|
||
"html_url": "https:\/\/github.com\/MortySecurity\/CVE-2023-38831-Exploit-and-Detection",
|
||
"description": "This repository has both an attack detection tool and a Proof-of-Concept (PoC) Python script for the WinRAR CVE-2023-38831 vulnerability. ",
|
||
"fork": false,
|
||
"created_at": "2023-08-29T16:12:20Z",
|
||
"updated_at": "2023-08-29T16:16:01Z",
|
||
"pushed_at": "2023-08-29T16:15:56Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 685008470,
|
||
"name": "CVE-2023-38831",
|
||
"full_name": "nhman-python\/CVE-2023-38831",
|
||
"owner": {
|
||
"login": "nhman-python",
|
||
"id": 104791322,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104791322?v=4",
|
||
"html_url": "https:\/\/github.com\/nhman-python"
|
||
},
|
||
"html_url": "https:\/\/github.com\/nhman-python\/CVE-2023-38831",
|
||
"description": "winrar exploit 6.22 <=",
|
||
"fork": false,
|
||
"created_at": "2023-08-30T10:11:16Z",
|
||
"updated_at": "2023-08-30T10:15:43Z",
|
||
"pushed_at": "2023-08-31T07:03:02Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 685043786,
|
||
"name": "CVE-2023-38831-PoC",
|
||
"full_name": "z3r0sw0rd\/CVE-2023-38831-PoC",
|
||
"owner": {
|
||
"login": "z3r0sw0rd",
|
||
"id": 18899200,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18899200?v=4",
|
||
"html_url": "https:\/\/github.com\/z3r0sw0rd"
|
||
},
|
||
"html_url": "https:\/\/github.com\/z3r0sw0rd\/CVE-2023-38831-PoC",
|
||
"description": "Proof-of-Concept for CVE-2023-38831 Zero-Day vulnerability in WinRAR",
|
||
"fork": false,
|
||
"created_at": "2023-08-30T11:52:23Z",
|
||
"updated_at": "2023-10-06T16:41:02Z",
|
||
"pushed_at": "2023-09-01T07:37:20Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"archive",
|
||
"cve-2023-38831",
|
||
"exploit",
|
||
"remote-code-execution",
|
||
"winrar"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 2,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 685141303,
|
||
"name": "CVE-2023-38831_ReverseShell_Winrar",
|
||
"full_name": "BeniBeastt\/CVE-2023-38831_ReverseShell_Winrar",
|
||
"owner": {
|
||
"login": "BeniBeastt",
|
||
"id": 139050304,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/139050304?v=4",
|
||
"html_url": "https:\/\/github.com\/BeniBeastt"
|
||
},
|
||
"html_url": "https:\/\/github.com\/BeniBeastt\/CVE-2023-38831_ReverseShell_Winrar",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2023-08-30T15:49:01Z",
|
||
"updated_at": "2023-08-30T20:05:54Z",
|
||
"pushed_at": "2023-08-30T18:11:13Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 685237935,
|
||
"name": "CVE-2023-38831-Winrar-Exploit-Generator-POC",
|
||
"full_name": "MorDavid\/CVE-2023-38831-Winrar-Exploit-Generator-POC",
|
||
"owner": {
|
||
"login": "MorDavid",
|
||
"id": 24622066,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24622066?v=4",
|
||
"html_url": "https:\/\/github.com\/MorDavid"
|
||
},
|
||
"html_url": "https:\/\/github.com\/MorDavid\/CVE-2023-38831-Winrar-Exploit-Generator-POC",
|
||
"description": "This is a POC for the CVE-2023-3883 exploit targeting WinRAR up to 6.22. Modified some existing internet-sourced POCs by introducing greater dynamism and incorporated additional try-except blocks within the code.",
|
||
"fork": false,
|
||
"created_at": "2023-08-30T19:55:11Z",
|
||
"updated_at": "2023-09-02T02:22:57Z",
|
||
"pushed_at": "2023-08-31T15:07:51Z",
|
||
"stargazers_count": 4,
|
||
"watchers_count": 4,
|
||
"has_discussions": false,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"archive",
|
||
"cve-2023-38831",
|
||
"exploit",
|
||
"rce",
|
||
"rce-exploit",
|
||
"remote-code-execution",
|
||
"winrar"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 4,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 686063338,
|
||
"name": "CVE-2023-38831-winrar",
|
||
"full_name": "Mich-ele\/CVE-2023-38831-winrar",
|
||
"owner": {
|
||
"login": "Mich-ele",
|
||
"id": 30556763,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30556763?v=4",
|
||
"html_url": "https:\/\/github.com\/Mich-ele"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Mich-ele\/CVE-2023-38831-winrar",
|
||
"description": "CVE-2023-38831 winrar exploit builder",
|
||
"fork": false,
|
||
"created_at": "2023-09-01T16:45:42Z",
|
||
"updated_at": "2023-09-01T17:44:03Z",
|
||
"pushed_at": "2023-09-01T17:43:16Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"cve-2023-38831",
|
||
"exploit",
|
||
"winrar"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 3,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 686580975,
|
||
"name": "CVE-2023-38831",
|
||
"full_name": "asepsaepdin\/CVE-2023-38831",
|
||
"owner": {
|
||
"login": "asepsaepdin",
|
||
"id": 122620685,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/122620685?v=4",
|
||
"html_url": "https:\/\/github.com\/asepsaepdin"
|
||
},
|
||
"html_url": "https:\/\/github.com\/asepsaepdin\/CVE-2023-38831",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2023-09-03T09:18:56Z",
|
||
"updated_at": "2023-09-03T10:42:39Z",
|
||
"pushed_at": "2023-09-03T14:08:09Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 686652092,
|
||
"name": "WinrarExploit",
|
||
"full_name": "K3rnel-Dev\/WinrarExploit",
|
||
"owner": {
|
||
"login": "K3rnel-Dev",
|
||
"id": 132711888,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/132711888?v=4",
|
||
"html_url": "https:\/\/github.com\/K3rnel-Dev"
|
||
},
|
||
"html_url": "https:\/\/github.com\/K3rnel-Dev\/WinrarExploit",
|
||
"description": "CVE-2023-38831-WINRAR-EXPLOIT GENERATOR",
|
||
"fork": false,
|
||
"created_at": "2023-09-03T14:03:45Z",
|
||
"updated_at": "2023-09-10T18:43:04Z",
|
||
"pushed_at": "2023-09-03T14:14:30Z",
|
||
"stargazers_count": 4,
|
||
"watchers_count": 4,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"0day",
|
||
"exploit",
|
||
"winrar"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 4,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 686665715,
|
||
"name": "CVE-2023-38831-winrar-exploit",
|
||
"full_name": "Fa1c0n35\/CVE-2023-38831-winrar-exploit",
|
||
"owner": {
|
||
"login": "Fa1c0n35",
|
||
"id": 33335488,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33335488?v=4",
|
||
"html_url": "https:\/\/github.com\/Fa1c0n35"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Fa1c0n35\/CVE-2023-38831-winrar-exploit",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2023-09-03T14:53:42Z",
|
||
"updated_at": "2023-09-03T14:53:55Z",
|
||
"pushed_at": "2023-09-03T14:53:52Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 686761346,
|
||
"name": "WinRAR-CVE-2023-38831",
|
||
"full_name": "xaitax\/WinRAR-CVE-2023-38831",
|
||
"owner": {
|
||
"login": "xaitax",
|
||
"id": 5014849,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5014849?v=4",
|
||
"html_url": "https:\/\/github.com\/xaitax"
|
||
},
|
||
"html_url": "https:\/\/github.com\/xaitax\/WinRAR-CVE-2023-38831",
|
||
"description": "This module exploits a vulnerability in WinRAR (CVE-2023-38831). When a user opens a crafted RAR file and its embedded document, a script is executed, leading to code execution.",
|
||
"fork": false,
|
||
"created_at": "2023-09-03T21:14:05Z",
|
||
"updated_at": "2023-09-16T06:41:55Z",
|
||
"pushed_at": "2023-09-08T06:15:42Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 688341659,
|
||
"name": "CVE-2023-38831-winrar",
|
||
"full_name": "GOTonyGO\/CVE-2023-38831-winrar",
|
||
"owner": {
|
||
"login": "GOTonyGO",
|
||
"id": 107836621,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107836621?v=4",
|
||
"html_url": "https:\/\/github.com\/GOTonyGO"
|
||
},
|
||
"html_url": "https:\/\/github.com\/GOTonyGO\/CVE-2023-38831-winrar",
|
||
"description": "Quick exploit builder for CVE-2023-38831, a vulnerability that affects WinRAR versions before 6.23.",
|
||
"fork": false,
|
||
"created_at": "2023-09-07T06:42:36Z",
|
||
"updated_at": "2023-09-07T06:44:20Z",
|
||
"pushed_at": "2023-09-07T06:45:37Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 690603491,
|
||
"name": "CVE-2023-38831",
|
||
"full_name": "Malwareman007\/CVE-2023-38831",
|
||
"owner": {
|
||
"login": "Malwareman007",
|
||
"id": 86009160,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86009160?v=4",
|
||
"html_url": "https:\/\/github.com\/Malwareman007"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Malwareman007\/CVE-2023-38831",
|
||
"description": "CVE-2023-38831 WinRaR Exploit Generator",
|
||
"fork": false,
|
||
"created_at": "2023-09-12T14:07:00Z",
|
||
"updated_at": "2023-09-25T15:36:35Z",
|
||
"pushed_at": "2023-09-12T16:39:44Z",
|
||
"stargazers_count": 6,
|
||
"watchers_count": 6,
|
||
"has_discussions": false,
|
||
"forks_count": 3,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"0day-exploit",
|
||
"cve-2023-38831",
|
||
"exploit",
|
||
"vulnerability",
|
||
"winrar"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 3,
|
||
"watchers": 6,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 690658119,
|
||
"name": "CVE-2023-38831-WinRAR-Exploit",
|
||
"full_name": "ameerpornillos\/CVE-2023-38831-WinRAR-Exploit",
|
||
"owner": {
|
||
"login": "ameerpornillos",
|
||
"id": 44928938,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44928938?v=4",
|
||
"html_url": "https:\/\/github.com\/ameerpornillos"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ameerpornillos\/CVE-2023-38831-WinRAR-Exploit",
|
||
"description": "Proof of concept (PoC) exploit for WinRAR vulnerability (CVE-2023-38831) vulnerability",
|
||
"fork": false,
|
||
"created_at": "2023-09-12T16:01:17Z",
|
||
"updated_at": "2023-10-12T11:23:55Z",
|
||
"pushed_at": "2023-09-12T16:26:22Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 2,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 692049575,
|
||
"name": "CVE-2023-38831",
|
||
"full_name": "IMHarman\/CVE-2023-38831",
|
||
"owner": {
|
||
"login": "IMHarman",
|
||
"id": 84379579,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84379579?v=4",
|
||
"html_url": "https:\/\/github.com\/IMHarman"
|
||
},
|
||
"html_url": "https:\/\/github.com\/IMHarman\/CVE-2023-38831",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2023-09-15T12:58:55Z",
|
||
"updated_at": "2023-09-15T13:00:37Z",
|
||
"pushed_at": "2023-09-15T13:01:07Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 692636502,
|
||
"name": "CVE-2023-38831",
|
||
"full_name": "an040702\/CVE-2023-38831",
|
||
"owner": {
|
||
"login": "an040702",
|
||
"id": 41360497,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41360497?v=4",
|
||
"html_url": "https:\/\/github.com\/an040702"
|
||
},
|
||
"html_url": "https:\/\/github.com\/an040702\/CVE-2023-38831",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2023-09-17T05:21:30Z",
|
||
"updated_at": "2023-09-17T05:23:56Z",
|
||
"pushed_at": "2023-09-17T05:26:44Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 693647970,
|
||
"name": "cve-2023-38831",
|
||
"full_name": "elefantesagradodeluzinfinita\/cve-2023-38831",
|
||
"owner": {
|
||
"login": "elefantesagradodeluzinfinita",
|
||
"id": 69746530,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69746530?v=4",
|
||
"html_url": "https:\/\/github.com\/elefantesagradodeluzinfinita"
|
||
},
|
||
"html_url": "https:\/\/github.com\/elefantesagradodeluzinfinita\/cve-2023-38831",
|
||
"description": "DR. GANDALF: Aplicacion DESKTOP para WINDOWS, Inyector de archivos ZIP, generador de exploits para vulnerabilidad de WinRAR 6.22 y anteriores.",
|
||
"fork": false,
|
||
"created_at": "2023-09-19T12:47:12Z",
|
||
"updated_at": "2023-10-18T17:34:30Z",
|
||
"pushed_at": "2023-09-24T05:30:38Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 694502812,
|
||
"name": "CVE-2023-38831",
|
||
"full_name": "malvika-thakur\/CVE-2023-38831",
|
||
"owner": {
|
||
"login": "malvika-thakur",
|
||
"id": 60217652,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60217652?v=4",
|
||
"html_url": "https:\/\/github.com\/malvika-thakur"
|
||
},
|
||
"html_url": "https:\/\/github.com\/malvika-thakur\/CVE-2023-38831",
|
||
"description": "Proof-of-Concept (POC) of CVE-2023-38831 Zero-Day vulnerability in WinRAR",
|
||
"fork": false,
|
||
"created_at": "2023-09-21T06:08:30Z",
|
||
"updated_at": "2023-10-09T11:23:27Z",
|
||
"pushed_at": "2023-09-21T09:30:59Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 2,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 704052455,
|
||
"name": "CVE-2023-38831",
|
||
"full_name": "ruycr4ft\/CVE-2023-38831",
|
||
"owner": {
|
||
"login": "ruycr4ft",
|
||
"id": 103446004,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103446004?v=4",
|
||
"html_url": "https:\/\/github.com\/ruycr4ft"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ruycr4ft\/CVE-2023-38831",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2023-10-12T12:46:35Z",
|
||
"updated_at": "2023-10-12T16:13:22Z",
|
||
"pushed_at": "2023-10-12T13:23:29Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
}
|
||
] |