Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/bstyls/winrar-exploit-builder
The WinRAR Exploit Builder is a C# project designed to create an exploit targeting a vulnerability in WinRAR.
https://github.com/bstyls/winrar-exploit-builder
0day 0day-2024 0day-exploit 0day-exploits archive aslr-bypass cve exploit exploit-database exploit-development exploit-kit pdf pdf-exploit pdf-format rce-exploit security winrar winrar-exploit zero-day-exploit zeroday-attack
Last synced: about 4 hours ago
JSON representation
The WinRAR Exploit Builder is a C# project designed to create an exploit targeting a vulnerability in WinRAR.
- Host: GitHub
- URL: https://github.com/bstyls/winrar-exploit-builder
- Owner: BStyls
- License: mit
- Created: 2025-01-14T15:16:16.000Z (25 days ago)
- Default Branch: main
- Last Pushed: 2025-02-04T17:48:41.000Z (4 days ago)
- Last Synced: 2025-02-04T18:34:49.613Z (4 days ago)
- Topics: 0day, 0day-2024, 0day-exploit, 0day-exploits, archive, aslr-bypass, cve, exploit, exploit-database, exploit-development, exploit-kit, pdf, pdf-exploit, pdf-format, rce-exploit, security, winrar, winrar-exploit, zero-day-exploit, zeroday-attack
- Language: C#
- Size: 287 KB
- Stars: 1
- Watchers: 0
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- Funding: .github/FUNDING.yml
- License: LICENSE
Awesome Lists containing this project
README
# WinRAR Exploit Builder
This project contains a WinRAR Exploit developed using the C# language. The exploit is a piece of software designed to target a vulnerability in the WinRAR software to run two specific files at the same time.
## Usage
1. Clone or download this repository to your local machine.
2. Specify the names of your file in Program.cs
3. Compile and run the program
4. The program will create the exploit and save it as the specified output RAR file.## How it works
## Requirements
- .NET Core 3.1 or higher
## License
This project is licensed under the MIT License - see [LICENSE](LICENSE) for details.
## Acknowledgements
This tool was inspired by the need for automated exploit generation in cybersecurity research and testing scenarios