https://github.com/mordavid/cve-2023-38831-winrar-exploit-generator-poc
This is a POC for the CVE-2023-3883 exploit targeting WinRAR up to 6.22. Modified some existing internet-sourced POCs by introducing greater dynamism and incorporated additional try-except blocks within the code.
https://github.com/mordavid/cve-2023-38831-winrar-exploit-generator-poc
archive cve-2023-38831 exploit rce rce-exploit remote-code-execution winrar
Last synced: 14 days ago
JSON representation
This is a POC for the CVE-2023-3883 exploit targeting WinRAR up to 6.22. Modified some existing internet-sourced POCs by introducing greater dynamism and incorporated additional try-except blocks within the code.
- Host: GitHub
- URL: https://github.com/mordavid/cve-2023-38831-winrar-exploit-generator-poc
- Owner: MorDavid
- Created: 2023-08-30T19:55:11.000Z (almost 2 years ago)
- Default Branch: main
- Last Pushed: 2023-08-31T15:07:51.000Z (almost 2 years ago)
- Last Synced: 2025-05-18T22:13:21.722Z (about 1 month ago)
- Topics: archive, cve-2023-38831, exploit, rce, rce-exploit, remote-code-execution, winrar
- Language: Python
- Homepage:
- Size: 192 KB
- Stars: 8
- Watchers: 1
- Forks: 4
- Open Issues: 0