Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | lazy way to create CVE-2023-38831 winrar file for testing | https://github.com/BoredHackerBlog/winrar_CVE-2023-38831_lazy_poc | POC Details |
| 2 | CVE-2023-38831 winrar exploit generator | https://github.com/b1tg/CVE-2023-38831-winrar-exploit | POC Details |
| 3 | None | https://github.com/IR-HuntGuardians/CVE-2023-38831-HUNT | POC Details |
| 4 | 一款用于生成winrar程序RCE(即cve-2023-38831)的POC的工具。 | https://github.com/Garck3h/cve-2023-38831 | POC Details |
| 5 | An easy to install and easy to run tool for generating exploit payloads for CVE-2023-38831, WinRAR RCE before versions 6.23 | https://github.com/ignis-sec/CVE-2023-38831-RaRCE | POC Details |
| 6 | CVE-2023-38831 PoC (Proof Of Concept) | https://github.com/HDCE-inc/CVE-2023-38831 | POC Details |
| 7 | Pasos necesarios para obtener una reverse shell explotando la vulnerabilidad de winrar CVE-2023-38831 en versiones anteriores a 6.23. | https://github.com/Maalfer/CVE-2023-38831_ReverseShell_Winrar-RCE | POC Details |
| 8 | Understanding WinRAR Code Execution Vulnerability (CVE-2023-38831) | https://github.com/knight0x07/WinRAR-Code-Execution-Vulnerability-CVE-2023-38831 | POC Details |
| 9 | CVE-2023-38831 WinRAR | https://github.com/akhomlyuk/cve-2023-38831 | POC Details |
| 10 | KQL Hunting for WinRAR CVE-2023-38831 | https://github.com/PascalAsch/CVE-2023-38831-KQL | POC Details |
| 11 | CVE-2023-38831 winrar exploit generator and get reverse shell | https://github.com/my-elliot/CVE-2023-38831-winrar-expoit-simple-Poc | POC Details |
| 12 | Proof of Concept (POC) for CVE-2023-38831 WinRAR | https://github.com/thegr1ffyn/CVE-2023-38831 | POC Details |
| 13 | This repository has both an attack detection tool and a Proof-of-Concept (PoC) Python script for the WinRAR CVE-2023-38831 vulnerability. | https://github.com/MortySecurity/CVE-2023-38831-Exploit-and-Detection | POC Details |
| 14 | winrar exploit 6.22 <= | https://github.com/nhman-python/CVE-2023-38831 | POC Details |
| 15 | Proof-of-Concept for CVE-2023-38831 Zero-Day vulnerability in WinRAR | https://github.com/z3r0sw0rd/CVE-2023-38831-PoC | POC Details |
| 16 | None | https://github.com/BeniBeastt/CVE-2023-38831_ReverseShell_Winrar | POC Details |
| 17 | This is a POC for the CVE-2023-3883 exploit targeting WinRAR up to 6.22. Modified some existing internet-sourced POCs by introducing greater dynamism and incorporated additional try-except blocks within the code. | https://github.com/MorDavid/CVE-2023-38831-Winrar-Exploit-Generator-POC | POC Details |
| 18 | CVE-2023-38831 winrar exploit builder | https://github.com/Mich-ele/CVE-2023-38831-winrar | POC Details |
| 19 | None | https://github.com/asepsaepdin/CVE-2023-38831 | POC Details |
| 20 | CVE-2023-38831-WINRAR-EXPLOIT GENERATOR | https://github.com/K3rnel-Dev/WinrarExploit | POC Details |
| 21 | None | https://github.com/Fa1c0n35/CVE-2023-38831-winrar-exploit | POC Details |
| 22 | This module exploits a vulnerability in WinRAR (CVE-2023-38831). When a user opens a crafted RAR file and its embedded document, a script is executed, leading to code execution. | https://github.com/xaitax/WinRAR-CVE-2023-38831 | POC Details |
| 23 | Quick exploit builder for CVE-2023-38831, a vulnerability that affects WinRAR versions before 6.23. | https://github.com/GOTonyGO/CVE-2023-38831-winrar | POC Details |
| 24 | CVE-2023-38831 WinRaR Exploit Generator | https://github.com/Malwareman007/CVE-2023-38831 | POC Details |
| 25 | Proof of concept (PoC) exploit for WinRAR vulnerability (CVE-2023-38831) vulnerability | https://github.com/ameerpornillos/CVE-2023-38831-WinRAR-Exploit | POC Details |
| 26 | None | https://github.com/IMHarman/CVE-2023-38831 | POC Details |
| 27 | None | https://github.com/an040702/CVE-2023-38831 | POC Details |
| 28 | DR. GANDALF: Aplicacion DESKTOP para WINDOWS, Inyector de archivos ZIP, generador de exploits para vulnerabilidad de WinRAR 6.22 y anteriores. | https://github.com/elefantesagradodeluzinfinita/cve-2023-38831 | POC Details |
| 29 | Proof-of-Concept (POC) of CVE-2023-38831 Zero-Day vulnerability in WinRAR | https://github.com/malvika-thakur/CVE-2023-38831 | POC Details |
| 30 | None | https://github.com/ruycr4ft/CVE-2023-38831 | POC Details |
| 31 | None | https://github.com/Nielk74/CVE-2023-38831 | POC Details |
| 32 | CVE-2023-38831 is an RCE in WinRAR (<6.23) | https://github.com/kehrijksen/CVE-2023-38831 | POC Details |
| 33 | SideCopy APT Group exploits CVE-2023-38831 | https://github.com/h3xecute/SideCopy-Exploits-CVE-2023-38831 | POC Details |
| 34 | WinRAR cve-2023-38831-poc-generator | https://github.com/s4m98/winrar-cve-2023-38831-poc-gen | POC Details |
| 35 | WinRAR-6.22、CVE-2023-38831、CNNVD-202308-1943、DM-202307-003730、QVD-2023-19572漏洞复现 | https://github.com/xk-mt/WinRAR-Vulnerability-recurrence-tutorial | POC Details |
| 36 | Proof-of-concept of CVE-2023-38831 | https://github.com/MyStuffYT/CVE-2023-38831-POC | POC Details |
| 37 | None | https://github.com/80r1ng/CVE-2023-38831-EXP | POC Details |
| 38 | CVE-2023-38831 Proof-of-concept code | https://github.com/SpamixOfficial/CVE-2023-38831 | POC Details |
| 39 | Exploit Development using python for CVE-2023-38831 (POC) | https://github.com/r1yaz/winDED | POC Details |
| 40 | None | https://github.com/BeniB3astt/CVE-2023-38831_ReverseShell_Winrar | POC Details |
| 41 | CVE-2023-38831 winrar exploit generator and get reverse shell | https://github.com/ahmed-fa7im/CVE-2023-38831-winrar-expoit-simple-Poc | POC Details |
| 42 | evil-winrar,CVE-2023-38831漏洞利用和社会工程学攻击框架 (evil-winrar, CVE-2023-38831 Vulnerability Exploitation and Social Engineering Attack Framework) | https://github.com/youmulijiang/evil-winrar | POC Details |
| 43 | This is my malware | https://github.com/solomon12354/VolleyballSquid-----CVE-2023-38831-and-Bypass-UAC | POC Details |
| 44 | None | https://github.com/RomainBayle08/CVE-2023-38831 | POC Details |
| 45 | winrar exploit 6.22 <= | https://github.com/sh770/CVE-2023-38831 | POC Details |
| 46 | WinRAR漏洞测试复现。详参:https://flowus.cn/share/a3b35db0-ab5e-4abc-b8d3-5ff284e82e7b | https://github.com/imbyter/imbyter-WinRAR_CVE-2023-38831 | POC Details |
| 47 | None | https://github.com/khanhtranngoccva/cve-2023-38831-poc | POC Details |
| 48 | Remote Access Trojan (RAT) for Windows x64 using a combination of vulnerability CVE-2023-38831 (WinRAR < 6.23 vulnerability) and Shellcode exploitation technique. | https://github.com/MaorBuskila/Windows-X64-RAT | POC Details |
| 49 | This Python application scans for the CVE-2023-38831 vulnerability in WinRAR. | https://github.com/yezzfusl/cve_2023_38831_scanner | POC Details |
| 50 | A POC demo on CVE-2023-38831 | https://github.com/FirFirdaus/CVE-2023-38831 | POC Details |
| 51 | d | https://github.com/ra3edAJ/LAB-DFIR-cve-2023-38831 | POC Details |
| 52 | None | https://github.com/technicalcorp2/CVE-2023-38831-exploit-generator | POC Details |
| 53 | This project contains a Python script that exploits **CVE-2023-38831**, a vulnerability in **WinRAR** versions prior to 6.23. The exploit generates a **malicious RAR archive** that triggers the execution of arbitrary code when the victim opens a benign-looking file within the archive (such as a PDF). | https://github.com/technicalcorp0/CVE-2023-38831-Exploit | POC Details |
| 54 | None | https://github.com/idkwastaken/CVE-2023-38831 | POC Details |
| 55 | None | https://github.com/vilonachan/CVE-2023-38831-Winrar-Exploit-Generator-POC | POC Details |
| 56 | None | https://github.com/vilonachan/CVE-2023-38831-winrar-exploit | POC Details |
| 57 | CVE-2023-38831 is a Zero-day WinRAR vulnerability that lets attackers disguise malicious files in archives, tricking users into executing harmful content. | https://github.com/RonF98/CVE-2023-38831-POC | POC Details |
| 58 | None | https://github.com/VictoriousKnight/CVE-2023-38831_Exploit | POC Details |
| 59 | POC Exploit Script in Python | https://github.com/kuyrathdaro/winrar-cve-2023-38831 | POC Details |
| 60 | CVE-2023-38831WinRAR代码执行漏洞复现资源文件 | https://github.com/chaos198800/CVE-2023-38831WinRAR-dai-ma-zhi-xing-lou-dong-fu-xian-zi-yuan-wen-jian | POC Details |
| 61 | This repository has both an attack detection tool and a Proof-of-Concept (PoC) Python script for the WinRAR CVE-2023-38831 vulnerability. | https://github.com/ML-K-eng/CVE-2023-38831-Exploit-and-Detection | POC Details |
| 62 | None | https://github.com/Ben1B3astt/CVE-2023-38831_ReverseShell_Winrar | POC Details |
| 63 | This project demonstrates a simulated exploitation of the WinRAR vulnerability CVE-2023-38831 to execute a reverse shell. The purpose of this task was to showcase how attackers can weaponize compressed archive files to gain remote access to a target machine. | https://github.com/Tolu12wani/Demonstration-of-CVE-2023-38831-via-Reverse-Shell-Execution | POC Details |
| 64 | ict519 assignment | https://github.com/yangdayyy/cve-2023-38831 | POC Details |
| 65 | winrar exploit 6.22 <= | https://github.com/sudo-py-dev/CVE-2023-38831 | POC Details |
| 66 | None | https://github.com/anelya0333/Exploiting-CVE-2023-38831 | POC Details |
| 67 | CVE-2023-38831 ZIP Structure Detection Framework | https://github.com/ouoxii/Software-Testing-Final-Project | POC Details |
| 68 | CVE-2023-38831 (PoC) - WinRAR Exploit | https://github.com/kuyrathdaro/cve-2023-38831 | POC Details |
| 69 | CVE-2023-38831 - WinRAR | https://github.com/mishra0230/CVE-2023-38831 | POC Details |
| 70 | None | https://github.com/ngothienan/CVE-2023-38831 | POC Details |
No public POC found.
Login to generate AI POCNo comments yet