{"id":26514872,"url":"https://github.com/usdtc/hta-exploit","last_synced_at":"2025-03-21T05:29:40.230Z","repository":{"id":281730574,"uuid":"946226015","full_name":"USDTC/HTA-Exploit","owner":"USDTC","description":"Microsoft Windows HTA (HTML Application) - Pinnacle of Remote Code Execution","archived":false,"fork":false,"pushed_at":"2025-03-17T21:30:30.000Z","size":172,"stargazers_count":0,"open_issues_count":0,"forks_count":0,"subscribers_count":0,"default_branch":"main","last_synced_at":"2025-03-17T21:36:10.804Z","etag":null,"topics":["cve","cve-2021-44228","cve-scanning","exploit","exploit-code","exploit-database","exploit-development","exploit-exercises","exploit-kit","exploitation","exploitation-framework","slient-doc-exploit","slient-exploit","slient-exploit-builder","slient-hta-exploit","slient-jpg-exploit","slient-pdf-exploit","slient-png-exploit","slient-url-exploit"],"latest_commit_sha":null,"homepage":null,"language":"C#","has_issues":false,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/USDTC.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":".github/FUNDING.yml","license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null},"funding":{"custom":null}},"created_at":"2025-03-10T20:10:00.000Z","updated_at":"2025-03-17T21:30:34.000Z","dependencies_parsed_at":"2025-03-10T21:42:07.105Z","dependency_job_id":null,"html_url":"https://github.com/USDTC/HTA-Exploit","commit_stats":null,"previous_names":["usdtc/hta-exploit"],"tags_count":1,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/USDTC%2FHTA-Exploit","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/USDTC%2FHTA-Exploit/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/USDTC%2FHTA-Exploit/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/USDTC%2FHTA-Exploit/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/USDTC","download_url":"https://codeload.github.com/USDTC/HTA-Exploit/tar.gz/refs/heads/main","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":244745219,"owners_count":20503040,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["cve","cve-2021-44228","cve-scanning","exploit","exploit-code","exploit-database","exploit-development","exploit-exercises","exploit-kit","exploitation","exploitation-framework","slient-doc-exploit","slient-exploit","slient-exploit-builder","slient-hta-exploit","slient-jpg-exploit","slient-pdf-exploit","slient-png-exploit","slient-url-exploit"],"created_at":"2025-03-21T05:29:39.773Z","updated_at":"2025-03-21T05:29:40.220Z","avatar_url":"https://github.com/USDTC.png","language":"C#","readme":"# Hta-Exploit Downloader Malware Builder\n\n## How to Use\n\n- Download the project to your computer as zip\n- Extract Project to Folder.\n- Make Sure You Have Visual Studio Installed on Your Computer\n- [Click if Visual Studio is Not Installed](https://visualstudio.microsoft.com/en/thank-you-downloading-visual-studio/?sku=Community\u0026channel=Release\u0026version=VS2022\u0026source=VSLandingPage\u0026passive=false\u0026cid=2030)\n\n### Visual Studio :\n\n1. Open the solution file (.sln).\n2. Select **Build Solution** from the **Build** menu or press `Ctrl+Shift+B` to compile the project.\n3. When the build is complete, select **Start Without Debugging** from the **Debug** menu or press `Ctrl+F5` to run the project.\n\n![HTA](https://github.com/QRAXDDL/ExtraSensoryPerception/assets/141562904/d318ce4e-8aeb-4b59-83be-aafeee93d286)\n\n![ht7](https://github.com/QRAXDDL/ExtraSensoryPerception/assets/141562904/5d3cfdd4-7a1f-46dc-86e0-6e81abde55da)\n\n## Disclaimer\n\nThis source code is for educational purposes only. It's created to explore reverse engineering without impacting other gamers' experiences.\n\n## License\n\nThis project is licensed under the MIT. For more information, see the [License](LICENSE).\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fusdtc%2Fhta-exploit","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fusdtc%2Fhta-exploit","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fusdtc%2Fhta-exploit/lists"}