关联漏洞
描述
Advanced WinRAR Path Traversal Exploit Tool for CVE-2025-8088
介绍
# CVE-2025-8088 WinRAR Exploit
> **Advanced WinRAR Path Traversal Exploit Tool**
A sophisticated GUI tool for creating malicious RAR archives that exploit the WinRAR path traversal vulnerability (CVE-2025-8088) using ADS and RAR5 header manipulation.
## Features
- **ADS Exploitation** - NTFS Alternate Data Streams for payload hiding
- **RAR5 Header Manipulation** - Direct header patching for path injection
- **GUI Interface** - Clean, modern user interface
- **Startup Targeting** - Automatic payload placement in Windows startup
- **Custom Decoy Support** - Use your own decoy files or default
## Requirements
- Python 3.6+
- WinRAR CLI
- customtkinter
## Quick Start
```bash
# Install dependencies
pip install -r requirements.txt
# Run the tool
python gui.py
```
## Usage
1. **Select Payload** - Choose your executable file (.exe, .bat, etc.)
2. **Choose Decoy** - Select a decoy file or leave empty for default
3. **Name Archive** - Enter output RAR filename
4. **Build** - Generate the exploit archive
## How It Works
The tool creates RAR archives with path traversal using:
1. **ADS Creation** - Hides payload in NTFS alternate data streams
2. **RAR Building** - Creates base RAR with ADS using WinRAR CLI
3. **Header Patching** - Injects traversal path into RAR5 headers
4. **CRC Recalculation** - Ensures archive integrity
5. **Output** - Delivers malicious RAR ready for extraction
**Path Example**: `..\..\..\..\..\..\..\..\..\..\..\..\..\..\..\..\Users\Administrator\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\payload.exe`
## Disclaimer
This tool is for **educational and authorized testing purposes only**. Use only in controlled environments with proper consent.
## Author
**Made by [@tcixt](https://t.me/tcixt) on Telegram**
---
*Advanced red team tool for CVE-2025-8088 exploitation*
文件快照
[4.0K] /data/pocs/a3315cbd2068a682ded052d6522733a6e53a624f
├── [9.2K] exploit_core.py
├── [5.2K] gui.py
├── [4.0K] output
│ └── [ 32] README.md
├── [1.8K] README.md
└── [ 21] requirements.txt
1 directory, 5 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。