Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/b1tg/cve-2023-38831-winrar-exploit
CVE-2023-38831 winrar exploit generator
https://github.com/b1tg/cve-2023-38831-winrar-exploit
0day cve exploit
Last synced: 1 day ago
JSON representation
CVE-2023-38831 winrar exploit generator
- Host: GitHub
- URL: https://github.com/b1tg/cve-2023-38831-winrar-exploit
- Owner: b1tg
- Created: 2023-08-25T09:44:08.000Z (about 1 year ago)
- Default Branch: main
- Last Pushed: 2023-11-26T06:46:44.000Z (12 months ago)
- Last Synced: 2023-11-26T07:29:07.907Z (12 months ago)
- Topics: 0day, cve, exploit
- Language: Python
- Homepage: https://b1tg.github.io/post/cve-2023-38831-winrar-analysis/
- Size: 538 KB
- Stars: 705
- Watchers: 9
- Forks: 129
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# CVE-2023-38831 winrar exploit generator
## Quick poc test
Generate the default poc for test
```
python cve-2023-38831-exp-gen.py poc
or
python cve-2023-38831-exp-gen.py CLASSIFIED_DOCUMENTS.pdf script.bat poc.rar
```## Custom
1. Place the bait file and (evil) script file in the current directory, the bait file is recommended to be an image (.png, jpg) or a document (.pdf)
2. Run `python cve-2023-38831-exp-gen.py <output name>` to generate your exploit## Screenshots
Infected version: winrar <= 6.22
![demo](./demo.png)
## Analysis Blog
https://b1tg.github.io/post/cve-2023-38831-winrar-analysis/
## Reference
https://www.group-ib.com/blog/cve-2023-38831-winrar-zero-day/