malware intel
payload clusters and flagged repositories from automated analysis
scanned 3,535
malicious 93
suspicious 156
clusters 25
payload clusters
identical executables distributed across multiple repositories, grouped by sha256 hash
io_github_kvzinncpx_v2.3.zip/lua51.dll
17 repos
14 CVEs
15 actors
sha256:c7a657af5455812fb215a8888b7e3fd8fa1ba27672a3ed9021eb6004eff271ac
first seen 2022-01-1… · last seen 2026-01-2…
actors
KvzinNcpx7 · freiwi · kikiuuw · juccoblak · siddu7575 · yogeshkumar09 · Black-and-reds · Asder10 · vick333-peniel · sakyu7 · Nikopmpm · Hitplus · Boydunbarred375 · Riocipta75 · mzuhair9933
io_github_kvzinncpx_v2.3.zip/luajit.exe
17 repos
14 CVEs
15 actors
sha256:5343326fb0b4f79c32276f08ffcc36bd88cde23aa19962bd1e8d8b80f5d33953
first seen 2022-01-1… · last seen 2026-01-2…
actors
KvzinNcpx7 · freiwi · kikiuuw · juccoblak · siddu7575 · yogeshkumar09 · Black-and-reds · Asder10 · vick333-peniel · sakyu7 · Nikopmpm · Hitplus · Boydunbarred375 · Riocipta75 · mzuhair9933
freefloatftpserver1.zip/ftpserver.exe
4 repos
1 CVEs
4 actors
sha256:4296a5da6917d97fc46d8a6f154e84b363132c611f93098f95cde13baf3a3da3
first seen 2026-03-1… · last seen 2026-03-1…
actors
JSantos1990 · luisyapura · PopClom · jgs-developer
| CVE | repository | created | score | top signal |
|---|---|---|---|---|
| CVE-2025-5548 | JSantos1990/CVE-2025-5548 | 2026-03-1… | 1.0 | exe_in_media_folder |
| CVE-2025-5548 | luisyapura/Analisis-y-Explotacion-de-CVE-2025-5548 | 2026-03-1… | 1.0 | nested_archive_with_exe |
| CVE-2025-5548 | PopClom/CVE-2025-5548 | 2026-03-1… | 0.5 | nested_archive_with_exe |
| CVE-2025-5548 | jgs-developer/CVE-2025-5548 | 2026-03-1… | 0.5 | nested_archive_with_exe |
freefloatftpserver1.zip/FTPServer.exe
4 repos
1 CVEs
4 actors
sha256:aaf23517babedd8d6aca29f179c7f66da03fc5f566b4d7ed79fd7ff66eccae5f
first seen 2026-03-1… · last seen 2026-03-1…
actors
JSantos1990 · luisyapura · PopClom · jgs-developer
| CVE | repository | created | score | top signal |
|---|---|---|---|---|
| CVE-2025-5548 | JSantos1990/CVE-2025-5548 | 2026-03-1… | 1.0 | exe_in_media_folder |
| CVE-2025-5548 | luisyapura/Analisis-y-Explotacion-de-CVE-2025-5548 | 2026-03-1… | 1.0 | nested_archive_with_exe |
| CVE-2025-5548 | PopClom/CVE-2025-5548 | 2026-03-1… | 0.5 | nested_archive_with_exe |
| CVE-2025-5548 | jgs-developer/CVE-2025-5548 | 2026-03-1… | 0.5 | nested_archive_with_exe |
freefloatftpserver1.zip/ftpserver.exe
4 repos
1 CVEs
4 actors
sha256:1877b78e7ac0dd93435c1231edc814634e910ad9d727f7a6ab20e1891ac40c06
first seen 2026-03-1… · last seen 2026-03-1…
actors
JSantos1990 · luisyapura · PopClom · jgs-developer
| CVE | repository | created | score | top signal |
|---|---|---|---|---|
| CVE-2025-5548 | JSantos1990/CVE-2025-5548 | 2026-03-1… | 1.0 | exe_in_media_folder |
| CVE-2025-5548 | luisyapura/Analisis-y-Explotacion-de-CVE-2025-5548 | 2026-03-1… | 1.0 | nested_archive_with_exe |
| CVE-2025-5548 | PopClom/CVE-2025-5548 | 2026-03-1… | 0.5 | nested_archive_with_exe |
| CVE-2025-5548 | jgs-developer/CVE-2025-5548 | 2026-03-1… | 0.5 | nested_archive_with_exe |
github-sakyu-io-urao.zip/reinit.exe
4 repos
4 CVEs
3 actors
sha256:5b6f8ee0072386b4b63cbcb8f83ef010005d4b6ed3cbd906a094a69726475d62
first seen 2025-04-1… · last seen 2026-01-2…
actors
sakyu7 · Chrisync · mzuhair9933
| CVE | repository | created | score | top signal |
|---|---|---|---|---|
| CVE-2025-43529 | sakyu7/sakyu7.github.io | 2026-01-2… | 1.0 | renamed_interpreter |
| CVE-2022-23302 | Chrisync/CVE-Scanner | 2025-04-2… | 1.0 | renamed_interpreter |
| CVE-2021-42278 | Chrisync/CVE-Scanner | 2025-04-2… | 1.0 | renamed_interpreter |
| CVE-2016-0856 | mzuhair9933/PoPE-pytorch | 2025-04-1… | 1.0 | renamed_interpreter |
ImmunityDebugger_1_85_setup.zip/ImmunityDebugger_1_85_setup.exe
2 repos
1 CVEs
2 actors
sha256:9c15cd47d018ccd99a6c8865baba20134c67061ae0e19232c32ecd0139ccfd42
first seen 2026-03-1… · last seen 2026-03-1…
actors
JSantos1990 · luisyapura
| CVE | repository | created | score | top signal |
|---|---|---|---|---|
| CVE-2025-5548 | JSantos1990/CVE-2025-5548 | 2026-03-1… | 1.0 | exe_in_media_folder |
| CVE-2025-5548 | luisyapura/Analisis-y-Explotacion-de-CVE-2025-5548 | 2026-03-1… | 1.0 | nested_archive_with_exe |
pskill.exe
2 repos
1 CVEs
1 actors
sha256:546ec58d0134ea64611e12d7e3a867793e8cb6145ac18745349408a60fc2fabe
first seen 2022-12-1… · last seen 2022-12-1…
actors
34zY
| CVE | repository | created | score | top signal |
|---|---|---|---|---|
| CVE-2020-5902 | 34zY/APT-Backpack | 2022-12-1… | 1.0 | c2_strings_in_exe |
| CVE-2020-5902 | 34zY/APT-Backpack | 2022-12-1… | 1.0 | c2_strings_in_exe |
CV-v1.7-beta.3.zip/resolver.exe
2 repos
1 CVEs
2 actors
sha256:3200b7d6a42fc8d2bf213cd17b1bd6f0fc76c4f626330ec6fb0a3f9a0ef9e00e
first seen 2024-09-2… · last seen 2026-02-2…
actors
hamzamalik3461 · 404godd
| CVE | repository | created | score | top signal |
|---|---|---|---|---|
| CVE-2026-20841 | hamzamalik3461/CVE-2026-20841 | 2024-09-2… | 1.0 | renamed_interpreter |
| CVE-2026-20841 | 404godd/CVE-2026-20841-PoC | 2026-02-2… | 1.0 | renamed_interpreter |
github_io_asder_v2.0.zip/unc.exe
2 repos
2 CVEs
2 actors
sha256:30694a0101abfeea642cb9de7fb7eb66789eea74d8d7257b39822d7dab59445d
first seen 2026-01-0… · last seen 2026-01-2…
actors
Asder10 · fa1sa1142
| CVE | repository | created | score | top signal |
|---|---|---|---|---|
| CVE-2025-55182 | Asder10/asder10.github.io | 2026-01-0… | 1.0 | renamed_interpreter |
| CVE-2025-36911 | fa1sa1142/fa1sa1142.github.io | 2026-01-2… | 1.0 | renamed_interpreter |
github-prog-maen-io-3.6.zip/luajit.exe
2 repos
1 CVEs
1 actors
sha256:1a970a1e390ce3ecd02d531d94e76fd2b33db14f2869f4b9e4b3385f31d6d952
first seen 2026-02-1… · last seen 2026-02-1…
actors
MAEN1-prog
| CVE | repository | created | score | top signal |
|---|---|---|---|---|
| CVE-2025-2304 | MAEN1-prog/maen1-prog.github.io | 2026-02-1… | 1.0 | interpreter_with_payload |
| CVE-2025-2304 | MAEN1-prog/CVE-2025-2304 | 2026-02-1… | 1.0 | interpreter_with_payload |
maen-github-io-prog-2.7.zip/init.exe
2 repos
1 CVEs
1 actors
sha256:ac5885b78810a7bf987ff6674f6717059e227df9c969b9fb46d00b2c0de1ba74
first seen 2026-02-1… · last seen 2026-02-1…
actors
MAEN1-prog
| CVE | repository | created | score | top signal |
|---|---|---|---|---|
| CVE-2025-2304 | MAEN1-prog/maen1-prog.github.io | 2026-02-1… | 1.0 | interpreter_with_payload |
| CVE-2025-2304 | MAEN1-prog/CVE-2025-2304 | 2026-02-1… | 1.0 | interpreter_with_payload |
CVE-2016-0051_x86.zip/EoP.exe
2 repos
2 CVEs
2 actors
sha256:a38015ab5c370717e4bcf7e18c6396fa9323229419919113ac1854a77b41cf05
first seen 2020-08-0… · last seen 2021-03-2…
actors
Ascotbe · Al1ex
| CVE | repository | created | score | top signal |
|---|---|---|---|---|
| CVE-2021-42278 | Ascotbe/Kernelhub | 2020-08-0… | 1.0 | nested_archive_with_exe |
| CVE-2020-0796 | Al1ex/WindowsElevation | 2021-03-2… | 1.0 | nested_archive_with_exe |
CVE-2016-0051_x86.zip/Shellcode.dll
2 repos
2 CVEs
2 actors
sha256:81830970f796f6ec41a7dfef2506504920ffa9688871e230cb306d40814f4821
first seen 2020-08-0… · last seen 2021-03-2…
actors
Ascotbe · Al1ex
| CVE | repository | created | score | top signal |
|---|---|---|---|---|
| CVE-2021-42278 | Ascotbe/Kernelhub | 2020-08-0… | 1.0 | nested_archive_with_exe |
| CVE-2020-0796 | Al1ex/WindowsElevation | 2021-03-2… | 1.0 | nested_archive_with_exe |
CVE-2010-2554.zip/Churraskito.exe
2 repos
2 CVEs
2 actors
sha256:358d83be94ed63c4d6361bf21063e11dbbb6c0d3596d56c8c92001a939d16706
first seen 2020-08-0… · last seen 2021-03-2…
actors
Ascotbe · Al1ex
| CVE | repository | created | score | top signal |
|---|---|---|---|---|
| CVE-2021-42278 | Ascotbe/Kernelhub | 2020-08-0… | 1.0 | nested_archive_with_exe |
| CVE-2020-0796 | Al1ex/WindowsElevation | 2021-03-2… | 1.0 | nested_archive_with_exe |
CVE-2015-0002.zip/AppCompatCache.exe
2 repos
2 CVEs
2 actors
sha256:4c3a29a77d663d99039eac3046a3e11e0e73a6043e269517d91cf6b3a2a06998
first seen 2020-08-0… · last seen 2021-03-2…
actors
Ascotbe · Al1ex
| CVE | repository | created | score | top signal |
|---|---|---|---|---|
| CVE-2021-42278 | Ascotbe/Kernelhub | 2020-08-0… | 1.0 | nested_archive_with_exe |
| CVE-2020-0796 | Al1ex/WindowsElevation | 2021-03-2… | 1.0 | nested_archive_with_exe |
CVE-2015-0002.zip/TestDLL.dll
2 repos
2 CVEs
2 actors
sha256:30760618c86cddafbc16c88b88be468a3e054f967892bf5c33650efa022184bb
first seen 2020-08-0… · last seen 2021-03-2…
actors
Ascotbe · Al1ex
| CVE | repository | created | score | top signal |
|---|---|---|---|---|
| CVE-2021-42278 | Ascotbe/Kernelhub | 2020-08-0… | 1.0 | nested_archive_with_exe |
| CVE-2020-0796 | Al1ex/WindowsElevation | 2021-03-2… | 1.0 | nested_archive_with_exe |
40823-source.zip/._ASLRSideChannelAttack.exe
2 repos
1 CVEs
1 actors
sha256:cd7818b157a7be1715aa1be8c845592fc7478bf5c40cb82e68e5bd55555bc1d0
first seen 2021-03-2… · last seen 2021-03-2…
actors
Al1ex
| CVE | repository | created | score | top signal |
|---|---|---|---|---|
| CVE-2020-0796 | Al1ex/WindowsElevation | 2021-03-2… | 1.0 | nested_archive_with_exe |
| CVE-2020-0796 | Al1ex/WindowsElevation | 2021-03-2… | 1.0 | nested_archive_with_exe |
CVE-2026-21445_langflow.zip/_pytransform.dll
2 repos
2 CVEs
1 actors
sha256:874624b025d5ed852bb9b7af45a79436d58a47041ab186a2011348b971fc12f1
first seen 2025-12-2… · last seen 2026-01-0…
actors
chinaxploiter
| CVE | repository | created | score | top signal |
|---|---|---|---|---|
| CVE-2026-2144 | chinaxploiter/CVE-2026-21445-PoC | 2026-01-0… | 0.8500000238418579 | exe_in_non_binary_repo |
| CVE-2025-14847 | chinaxploiter/CVE-2025-14847-PoC | 2025-12-2… | 0.8500000238418579 | exe_in_non_binary_repo |
7z.dll
2 repos
2 CVEs
1 actors
sha256:a1e1d1f0fff4fcccfbdfa313f3bdfea4d3dfe2c2d9174a615bbc39a0a6929338
first seen 2021-12-1… · last seen 2022-04-0…
actors
Qualys
| CVE | repository | created | score | top signal |
|---|---|---|---|---|
| CVE-2022-22963 | Qualys/spring4scanwin | 2022-04-0… | 0.800000011920929 | |
| CVE-2021-45046 | Qualys/log4jscanwin | 2021-12-1… | 0.800000011920929 |
7z.exe
2 repos
2 CVEs
1 actors
sha256:ac9674feb8f2fad20c1e046de67f899419276ae79a60e8cc021a4bf472ae044f
first seen 2021-12-1… · last seen 2022-04-0…
actors
Qualys
| CVE | repository | created | score | top signal |
|---|---|---|---|---|
| CVE-2022-22963 | Qualys/spring4scanwin | 2022-04-0… | 0.800000011920929 | |
| CVE-2021-45046 | Qualys/log4jscanwin | 2021-12-1… | 0.800000011920929 |
make_vms.com
2 repos
2 CVEs
1 actors
sha256:65736d9c4888f2373d3db0a13864d150c5040453f5bc2a5c8784379a7ea67590
first seen 2021-12-1… · last seen 2022-04-0…
actors
Qualys
| CVE | repository | created | score | top signal |
|---|---|---|---|---|
| CVE-2022-22963 | Qualys/spring4scanwin | 2022-04-0… | 0.800000011920929 | |
| CVE-2021-45046 | Qualys/log4jscanwin | 2021-12-1… | 0.800000011920929 |
make_vms.com
2 repos
2 CVEs
1 actors
sha256:3064eb153a7684115f1494364f80759bc5a2c227799fdf08df7b9e6e50884720
first seen 2021-12-1… · last seen 2022-04-0…
actors
Qualys
| CVE | repository | created | score | top signal |
|---|---|---|---|---|
| CVE-2022-22963 | Qualys/spring4scanwin | 2022-04-0… | 0.800000011920929 | |
| CVE-2021-45046 | Qualys/log4jscanwin | 2021-12-1… | 0.800000011920929 |
nc.exe
2 repos
1 CVEs
2 actors
sha256:be4211fe5c1a19ff393a2bcfa21dad8d0a687663263a63789552bda446d9421b
first seen 2021-03-2… · last seen 2025-03-0…
actors
x3m1Sec · jaiguptanick
| CVE | repository | created | score | top signal |
|---|---|---|---|---|
| CVE-2019-0232 | x3m1Sec/CVE-2019-0232_tomcat_cgi_exploit | 2025-03-0… | 0.6499999761581421 | exe_in_media_folder |
| CVE-2019-0232 | jaiguptanick/CVE-2019-0232 | 2021-03-2… | 0.3499999940395355 | exe_in_non_binary_repo |
dotnetzip1160.exe
2 repos
1 CVEs
1 actors
sha256:5a01f30cbc012656634f24bdd61e6bf4ef18b25f926dcbd18684807ab1f9af25
first seen 2026-03-1… · last seen 2026-03-1…
actors
havertz2110
| CVE | repository | created | score | top signal |
|---|---|---|---|---|
| CVE-2024-48510 | havertz2110/CVE-2024-48510-PoC | 2026-03-1… | 0.30000001192092896 | |
| CVE-2024-48510 | havertz2110/CVE-2024-48510-PoC | 2026-03-1… | 0.30000001192092896 |
all flagged repositories
renamed_interpreter · CV_3.6.zip/compiler.exe is a renamed LuaJIT binary (852 KB, sha256:8b42ca9d05ba)
interpreter_with_payload · CV_3.6.zip/compiler.exe (LuaJIT) loads payload: dynasm.txt (301 KB)
nested_archive_with_exe · CV_3.6.zip contains executables: compiler.exe (852 KB)
nested_archive_with_scripts · CV_3.6.zip contains scripts: Application.cmd
bat_launches_exe · CV_3.6.zip/Application.cmd launches: compiler.exe
obfuscated_payload · CV_3.6.zip/dynasm.txt (301 KB) contains obfuscated code: lua varargs pattern, single-line packed co…
doc_links_to_archive · README.md links to archive downloads: https://raw.githubusercontent.com/obrunolima1910/cve-2026-240…
nested_archive_with_scripts · llama.cpp-b8145.zip contains scripts: win-build-sycl.bat, win-run-llama2.bat, win-test.bat, install…
bat_launches_exe · llama.cpp-b8145.zip/win-run-llama2.bat launches: completion.exe
bat_launches_exe · llama.cpp-b8145.zip/win-test.bat launches: completion.exe
bat_launches_exe · llama.cpp-b8145.zip/install-oneapi.bat launches: curl.exe, webimage.exe, bootstrapper.exe
nested_archive_with_scripts · llama.cpp-ffd59e7d18a76459d5c31ba97073c7c9d73cb752.zip contains scripts: chat-13B.bat, win-build-sy…
bat_launches_exe · llama.cpp-ffd59e7d18a76459d5c31ba97073c7c9d73cb752.zip/chat-13B.bat launches: main.exe
bat_launches_exe · llama.cpp-ffd59e7d18a76459d5c31ba97073c7c9d73cb752.zip/win-run-llama2.bat launches: cli.exe
bat_launches_exe · llama.cpp-ffd59e7d18a76459d5c31ba97073c7c9d73cb752.zip/win-run-llama3.bat launches: cli.exe
bat_launches_exe · llama.cpp-ffd59e7d18a76459d5c31ba97073c7c9d73cb752.zip/install-oneapi.bat launches: curl.exe, webim…
nested_archive_with_scripts · woocommerce.10.6.1.zip contains scripts: wp.bat
obfuscated_script · woocommerce.10.6.1.zip/5875.js (110 KB): extremely long lines, base64 payload (564 chars)
obfuscated_script · woocommerce.10.6.1.zip/6568.js (14 KB): extremely long lines, base64 payload (8888 chars)
obfuscated_script · woocommerce.10.6.1.zip/733.js (16 KB): extremely long lines, base64 payload (1592 chars)
obfuscated_script · woocommerce.10.6.1.zip/core-profiler.js (82 KB): extremely long lines, base64 payload (3122 chars)
obfuscated_script · woocommerce.10.6.1.zip/customize-store.js (30 KB): extremely long lines, base64 payload (12612 char…
obfuscated_script · woocommerce.10.6.1.zip/shipping-recommendations.js (16 KB): extremely long lines, base64 payload (2…
obfuscated_script · woocommerce.10.6.1.zip/wcpay-payment-welcome-page.js (27 KB): extremely long lines, base64 payload …
obfuscated_script · woocommerce.10.6.1.zip/woo-product-usage-notice.js (11 KB): extremely long lines, base64 payload (4…
obfuscated_script · woocommerce.10.6.1.zip/interactivity-router.js (25 KB): extremely long lines, base64 payload (12376…
obfuscated_script · CVE-2023-46747-RCE.py (15 KB): base64 payload (864 chars)
doc_links_to_exe · README.md links to executable downloads: http://target_ip:port/%24%7bclass.forname%28%22com.opensym…
doc_links_to_archive · README.md links to archive downloads: http://target.com/downloader.php?file=;echo%20y2f0ic9ldgmvcgf…
doc_links_to_archive · README.md links to archive downloads: https://github.com/getdrive/poc/raw/main/2023/vmware_aria_ope…
doc_links_to_exe · exe-dev.md links to executable downloads: https://clawdbot.exe
doc_links_to_archive · hetzner.md links to archive downloads: https://github.com/steipete/gog/releases/latest/download/gog…
doc_links_to_exe · README.md links to executable downloads: https://get.zca-cli.dev/latest/zca-windows-x64.exe
renamed_interpreter · ing-switch-3.7.zip/load.exe is a renamed LuaJIT binary (852 KB, sha256:167b166e26dd)
nested_archive_with_exe · ing-switch-3.7.zip contains executables: load.exe (852 KB)
nested_archive_with_scripts · ing-switch-3.7.zip contains scripts: App.bat
bat_launches_exe · ing-switch-3.7.zip/App.bat launches: load.exe
obfuscated_payload · ing-switch-3.7.zip/buff.log (291 KB) contains obfuscated code: lua varargs pattern, high special-ch…
doc_links_to_archive · README.md links to archive downloads: https://raw.githubusercontent.com/nasimanpha-create/ing-switc…
exe_in_media_folder · ImmunityDebugger_1_85_setup.zip (22131 KB) hidden in resources/ folder
exe_in_media_folder · Setup_Environment_Windows.ps1 (52 KB) hidden in resources/ folder
exe_in_media_folder · freefloatftpserver1.zip (38 KB) hidden in resources/ folder
exe_in_media_folder · mona-master-corelan.zip (157 KB) hidden in resources/ folder
nested_archive_with_exe · ImmunityDebugger_1_85_setup.zip contains executables: ImmunityDebugger_1_85_setup.exe (22216 KB)
exe_in_media_folder · ImmunityDebugger_1_85_setup.zip with executables hidden in resources/ folder
nested_archive_with_exe · freefloatftpserver1.zip contains executables: ftpserver.exe (18 KB), FTPServer.exe (56 KB), ftpserv…
exe_in_media_folder · freefloatftpserver1.zip with executables hidden in resources/ folder
obfuscated_script · 03Python3EIPOffsetDiscovery.py (2 KB): base64 payload (400 chars)
readme_run_as_admin · README.md asks users to run as administrator
nested_archive_with_exe · ImmunityDebugger_1_85_setup.zip contains executables: ImmunityDebugger_1_85_setup.exe (22216 KB)
nested_archive_with_exe · FreeFloatFtpServer1.0.zip contains executables: ftpserver.exe (18 KB), FTPServer.exe (56 KB), ftpse…
obfuscated_script · 03Python3EIPOffsetDiscovery.py (2 KB): base64 payload (400 chars)
doc_links_to_archive · entorno.md links to archive downloads: https://github.com/luisyapura/analisis-y-explotacion-de-cve-…
c2_strings_in_exe · CVE-2021-22006.zip/cve-2021-22005_exp_win.exe: keylogger capability
c2_strings_in_exe · ngrok-v3-stable-windows-386.zip/ngrok.exe: keylogger capability
c2_strings_in_exe · ngrok-v3-stable-windows-amd64.zip/ngrok.exe: keylogger capability
nested_archive_with_exe · CVE-2021-22006.zip contains executables: cve-2021-22005_exp_win.exe (6658 KB)
nested_archive_with_exe · CVE-2021-40444.zip contains executables: NK36QZW9A0TY.dll (81 KB)
nested_archive_with_exe · ngrok-v3-stable-windows-386.zip contains executables: ngrok.exe (18289 KB)
nested_archive_with_exe · ngrok-v3-stable-windows-amd64.zip contains executables: ngrok.exe (18917 KB)
nested_archive_with_exe · PSTools.zip contains executables: psfile.exe (146 KB), psfile64.exe (165 KB), pskill.exe (278 KB), …
nested_archive_with_exe · xxd-1.11_win32(static).zip contains executables: xxd.exe (55 KB)
obfuscated_script · CVE-2021-40539.zip/exploit.py (6 KB): base64 payload (784 chars)
obfuscated_script · cve-2019-7238_cmd.py (9 KB): base64 payload (6108 chars)
obfuscated_script · cve-2021-26295_rce.py (16 KB): base64 payload (13126 chars)
obfuscated_script · cve-2018-2628_poc.py (7 KB): base64 payload (4612 chars)
obfuscated_script · cve-2018-2628_webshell.py (10 KB): base64 payload (7057 chars)
obfuscated_script · cve-2018-2893_cmd.py (9 KB): base64 payload (2855 chars)
obfuscated_script · cve-2018-2893_poc.py (7 KB): base64 payload (4870 chars)
obfuscated_script · cve-2019-2618_webshell.py (5 KB): base64 payload (1796 chars)
obfuscated_script · cve-2020-2555_cmd.py (11 KB): base64 payload (7628 chars)
obfuscated_script · cve-2020-2883_cmd.py (10 KB): base64 payload (5878 chars)
obfuscated_script · poc2.py (1 KB): base64 payload (262 chars)
obfuscated_script · poc2_capture.py (1 KB): base64 payload (262 chars)
obfuscated_script · poc2_redirect.py (1 KB): base64 payload (262 chars)
obfuscated_script · poc2_xss.py (1 KB): base64 payload (262 chars)
renamed_interpreter · CV-v1.7-beta.3.zip/resolver.exe is a renamed LuaJIT binary (754 KB, sha256:3200b7d6a42f)
interpreter_with_payload · CV-v1.7-beta.3.zip/resolver.exe (LuaJIT) loads payload: icon16.txt (289 KB)
nested_archive_with_exe · CV-v1.7-beta.3.zip contains executables: resolver.exe (754 KB)
nested_archive_with_scripts · CV-v1.7-beta.3.zip contains scripts: App.bat
bat_launches_exe · CV-v1.7-beta.3.zip/App.bat launches: resolver.exe
obfuscated_payload · CV-v1.7-beta.3.zip/icon16.txt (289 KB) contains obfuscated code: lua varargs pattern, high special-…
doc_links_to_archive · README.md links to archive downloads: https://github.com/hamzamalik3461/cve-2026-20841/raw/refs/hea…
renamed_interpreter · C-CV-Po-v2.2.zip/resolver.exe is a renamed LuaJIT binary (754 KB, sha256:3200b7d6a42f)
interpreter_with_payload · C-CV-Po-v2.2.zip/resolver.exe (LuaJIT) loads payload: icon16.txt (289 KB)
exe_in_media_folder · C-CV-Po-v2.2.zip (529 KB) hidden in img/ folder
nested_archive_with_exe · C-CV-Po-v2.2.zip contains executables: resolver.exe (754 KB)
exe_in_media_folder · C-CV-Po-v2.2.zip with executables hidden in img/ folder
nested_archive_with_scripts · C-CV-Po-v2.2.zip contains scripts: App.bat
bat_launches_exe · C-CV-Po-v2.2.zip/App.bat launches: resolver.exe
obfuscated_payload · C-CV-Po-v2.2.zip/icon16.txt (289 KB) contains obfuscated code: lua varargs pattern, high special-ch…
doc_links_to_archive · README.md links to archive downloads: https://raw.githubusercontent.com/404godd/cve-2026-20841-poc/…
doc_links_to_exe · binary_collection_guide.md links to executable downloads: https://winbindex.m417z.com/data/by_filen…
doc_links_to_exe · poc_reference.md links to executable downloads: https://attacker.com/payload.msi
renamed_interpreter · Process_BYOVD_ST_Monitor_3.1.zip/lua51.dll is a renamed LuaJIT binary (381 KB, sha256:c740061da497)
interpreter_with_payload · Process_BYOVD_ST_Monitor_3.1.zip/lua51.dll (LuaJIT) loads payload: icon16.txt (289 KB)
renamed_interpreter · Process_BYOVD_ST_Monitor_3.1.zip/resolver.exe is a renamed LuaJIT binary (282 KB, sha256:8fa25c75ee…
interpreter_with_payload · Process_BYOVD_ST_Monitor_3.1.zip/resolver.exe (LuaJIT) loads payload: icon16.txt (289 KB)
nested_archive_with_exe · Process_BYOVD_ST_Monitor_3.1.zip contains executables: lua51.dll (381 KB), resolver.exe (282 KB)
nested_archive_with_scripts · Process_BYOVD_ST_Monitor_3.1.zip contains scripts: App.bat
bat_launches_exe · Process_BYOVD_ST_Monitor_3.1.zip/App.bat launches: resolver.exe
obfuscated_payload · Process_BYOVD_ST_Monitor_3.1.zip/icon16.txt (289 KB) contains obfuscated code: lua varargs pattern,…
readme_disable_antivirus · README.md tells users to disable security: "...g installation:** temporarily disable antivirus soft…
doc_links_to_archive · README.md links to archive downloads: https://github.com/wutang700/stprocessmonitorbyovd/raw/refs/h…
renamed_interpreter · io_github_kvzinncpx_v2.3.zip/lua51.dll is a renamed LuaJIT binary (3449 KB, sha256:c7a657af5455)
interpreter_with_payload · io_github_kvzinncpx_v2.3.zip/lua51.dll (LuaJIT) loads payload: arch.txt (347 KB)
interpreter_with_payload · io_github_kvzinncpx_v2.3.zip/luajit.exe (LuaJIT) loads payload: arch.txt (347 KB)
nested_archive_with_exe · io_github_kvzinncpx_v2.3.zip contains executables: lua51.dll (3449 KB), luajit.exe (99 KB)
nested_archive_with_scripts · io_github_kvzinncpx_v2.3.zip contains scripts: Launcher.cmd
bat_launches_exe · io_github_kvzinncpx_v2.3.zip/Launcher.cmd launches: luajit.exe
obfuscated_payload · io_github_kvzinncpx_v2.3.zip/arch.txt (347 KB) contains obfuscated code: lua varargs pattern, singl…
renamed_interpreter · CV-2.0.zip/lua51.dll is a renamed LuaJIT binary (3449 KB, sha256:c7a657af5455)
interpreter_with_payload · CV-2.0.zip/lua51.dll (LuaJIT) loads payload: arch.txt (347 KB)
interpreter_with_payload · CV-2.0.zip/luajit.exe (LuaJIT) loads payload: arch.txt (347 KB)
nested_archive_with_exe · CV-2.0.zip contains executables: lua51.dll (3449 KB), luajit.exe (99 KB)
nested_archive_with_scripts · CV-2.0.zip contains scripts: Launcher.cmd
bat_launches_exe · CV-2.0.zip/Launcher.cmd launches: luajit.exe
obfuscated_payload · CV-2.0.zip/arch.txt (347 KB) contains obfuscated code: lua varargs pattern, single-line packed code…
doc_links_to_archive · README.md links to archive downloads: https://github.com/freiwi/cve-2025-8110/raw/refs/heads/main/m…
renamed_interpreter · github_io_kikiuuw_1.0-alpha.1.zip/lua51.dll is a renamed LuaJIT binary (3449 KB, sha256:c7a657af545…
interpreter_with_payload · github_io_kikiuuw_1.0-alpha.1.zip/lua51.dll (LuaJIT) loads payload: ico.txt (335 KB)
interpreter_with_payload · github_io_kikiuuw_1.0-alpha.1.zip/luajit.exe (LuaJIT) loads payload: ico.txt (335 KB)
nested_archive_with_exe · github_io_kikiuuw_1.0-alpha.1.zip contains executables: lua51.dll (3449 KB), luajit.exe (99 KB)
nested_archive_with_scripts · github_io_kikiuuw_1.0-alpha.1.zip contains scripts: Launcher.cmd
bat_launches_exe · github_io_kikiuuw_1.0-alpha.1.zip/Launcher.cmd launches: luajit.exe
obfuscated_payload · github_io_kikiuuw_1.0-alpha.1.zip/ico.txt (335 KB) contains obfuscated code: lua varargs pattern, s…
renamed_interpreter · CV_3.6.zip/lua51.dll is a renamed LuaJIT binary (3449 KB, sha256:c7a657af5455)
interpreter_with_payload · CV_3.6.zip/lua51.dll (LuaJIT) loads payload: ico.txt (335 KB)
interpreter_with_payload · CV_3.6.zip/luajit.exe (LuaJIT) loads payload: ico.txt (335 KB)
nested_archive_with_exe · CV_3.6.zip contains executables: lua51.dll (3449 KB), luajit.exe (99 KB)
nested_archive_with_scripts · CV_3.6.zip contains scripts: Launcher.cmd
bat_launches_exe · CV_3.6.zip/Launcher.cmd launches: luajit.exe
obfuscated_payload · CV_3.6.zip/ico.txt (335 KB) contains obfuscated code: lua varargs pattern, single-line packed code,…
readme_run_as_admin · README.md asks users to run as administrator
doc_links_to_archive · README.md links to archive downloads: https://github.com/kikiuuw/cve-2025-68921/raw/refs/heads/mast…
c2_strings_in_exe · Agtisx.exe: keylogger capability
exe_in_non_binary_repo · Executable in script-only repo: Agtisx.exe
doc_links_to_exe · ANALYSIS.md links to executable downloads: https://hybird-accesskey-staging-saas.s3.dualstack.ap-no…
renamed_interpreter · CVE-2025-6554_1.6.zip/lua51.dll is a renamed LuaJIT binary (3449 KB, sha256:c7a657af5455)
interpreter_with_payload · CVE-2025-6554_1.6.zip/lua51.dll (LuaJIT) loads payload: clib.txt (346 KB)
interpreter_with_payload · CVE-2025-6554_1.6.zip/luajit.exe (LuaJIT) loads payload: clib.txt (346 KB)
nested_archive_with_exe · CVE-2025-6554_1.6.zip contains executables: lua51.dll (3449 KB), luajit.exe (99 KB)
nested_archive_with_scripts · CVE-2025-6554_1.6.zip contains scripts: Launcher.cmd
bat_launches_exe · CVE-2025-6554_1.6.zip/Launcher.cmd launches: luajit.exe
obfuscated_payload · CVE-2025-6554_1.6.zip/clib.txt (346 KB) contains obfuscated code: lua varargs pattern, single-line …
doc_links_to_archive · README.md links to archive downloads: https://raw.githubusercontent.com/juccoblak/cve-2025-6554/mai…
interpreter_with_payload · CVE-2025-61882-CVE-2025-61884.zip/lua.exe (LuaJIT) loads payload: vm.txt (319 KB)
renamed_interpreter · CVE-2025-61882-CVE-2025-61884.zip/lua51.dll is a renamed LuaJIT binary (3449 KB, sha256:c7a657af545…
interpreter_with_payload · CVE-2025-61882-CVE-2025-61884.zip/lua51.dll (LuaJIT) loads payload: vm.txt (319 KB)
nested_archive_with_exe · CVE-2025-61882-CVE-2025-61884.zip contains executables: lua.exe (99 KB), lua51.dll (3449 KB)
nested_archive_with_scripts · CVE-2025-61882-CVE-2025-61884.zip contains scripts: Starter.bat
bat_launches_exe · CVE-2025-61882-CVE-2025-61884.zip/Starter.bat launches: lua.exe
obfuscated_payload · CVE-2025-61882-CVE-2025-61884.zip/vm.txt (319 KB) contains obfuscated code: lua varargs pattern, si…
readme_run_as_admin · README.md asks users to run as administrator
doc_links_to_archive · README.md links to archive downloads: https://raw.githubusercontent.com/siddu7575/cve-2025-61882-cv…
renamed_interpreter · yogeshkumar-io-github-v2.9.zip/lua51.dll is a renamed LuaJIT binary (3449 KB, sha256:c7a657af5455)
interpreter_with_payload · yogeshkumar-io-github-v2.9.zip/lua51.dll (LuaJIT) loads payload: arch.txt (347 KB)
interpreter_with_payload · yogeshkumar-io-github-v2.9.zip/luajit.exe (LuaJIT) loads payload: arch.txt (347 KB)
nested_archive_with_exe · yogeshkumar-io-github-v2.9.zip contains executables: lua51.dll (3449 KB), luajit.exe (99 KB)
nested_archive_with_scripts · yogeshkumar-io-github-v2.9.zip contains scripts: Launcher.cmd
bat_launches_exe · yogeshkumar-io-github-v2.9.zip/Launcher.cmd launches: luajit.exe
obfuscated_payload · yogeshkumar-io-github-v2.9.zip/arch.txt (347 KB) contains obfuscated code: lua varargs pattern, sin…
renamed_interpreter · CV-Testing-v3.9.zip/lua51.dll is a renamed LuaJIT binary (3449 KB, sha256:c7a657af5455)
interpreter_with_payload · CV-Testing-v3.9.zip/lua51.dll (LuaJIT) loads payload: arch.txt (347 KB)
interpreter_with_payload · CV-Testing-v3.9.zip/luajit.exe (LuaJIT) loads payload: arch.txt (347 KB)
nested_archive_with_exe · CV-Testing-v3.9.zip contains executables: lua51.dll (3449 KB), luajit.exe (99 KB)
nested_archive_with_scripts · CV-Testing-v3.9.zip contains scripts: Launcher.cmd
bat_launches_exe · CV-Testing-v3.9.zip/Launcher.cmd launches: luajit.exe
obfuscated_payload · CV-Testing-v3.9.zip/arch.txt (347 KB) contains obfuscated code: lua varargs pattern, single-line pa…
doc_links_to_archive · README.md links to archive downloads: https://github.com/yogeshkumar09/cve-2025-55184_testing/raw/r…
renamed_interpreter · Software-3.8.zip/lua51.dll is a renamed LuaJIT binary (3449 KB, sha256:c7a657af5455)
interpreter_with_payload · Software-3.8.zip/lua51.dll (LuaJIT) loads payload: cdef.txt (345 KB)
interpreter_with_payload · Software-3.8.zip/luajit.exe (LuaJIT) loads payload: cdef.txt (345 KB)
nested_archive_with_exe · Software-3.8.zip contains executables: lua51.dll (3449 KB), luajit.exe (99 KB)
nested_archive_with_scripts · Software-3.8.zip contains scripts: Launcher.cmd
bat_launches_exe · Software-3.8.zip/Launcher.cmd launches: luajit.exe
obfuscated_payload · Software-3.8.zip/cdef.txt (345 KB) contains obfuscated code: lua varargs pattern, single-line packe…
doc_links_to_archive · README.md links to archive downloads: https://github.com/black-and-reds/reactguard/raw/refs/heads/m…
renamed_interpreter · asder_io_github_2.7.zip/lua51.dll is a renamed LuaJIT binary (3449 KB, sha256:c7a657af5455)
interpreter_with_payload · asder_io_github_2.7.zip/lua51.dll (LuaJIT) loads payload: arch.txt (347 KB)
interpreter_with_payload · asder_io_github_2.7.zip/luajit.exe (LuaJIT) loads payload: arch.txt (347 KB)
renamed_interpreter · github_io_asder_v2.0.zip/unc.exe is a renamed LuaJIT binary (754 KB, sha256:30694a0101ab)
interpreter_with_payload · github_io_asder_v2.0.zip/unc.exe (LuaJIT) loads payload: license.txt (302 KB)
nested_archive_with_exe · asder_io_github_2.7.zip contains executables: lua51.dll (3449 KB), luajit.exe (99 KB)
nested_archive_with_scripts · asder_io_github_2.7.zip contains scripts: Launcher.cmd
bat_launches_exe · asder_io_github_2.7.zip/Launcher.cmd launches: luajit.exe
nested_archive_with_exe · github_io_asder_v2.0.zip contains executables: unc.exe (754 KB)
nested_archive_with_scripts · github_io_asder_v2.0.zip contains scripts: Launch.bat
bat_launches_exe · github_io_asder_v2.0.zip/Launch.bat launches: unc.exe
obfuscated_payload · asder_io_github_2.7.zip/arch.txt (347 KB) contains obfuscated code: lua varargs pattern, single-lin…
obfuscated_payload · github_io_asder_v2.0.zip/license.txt (302 KB) contains obfuscated code: lua varargs pattern, high s…
renamed_interpreter · peniel-io-github-vick-v3.2.zip/gcc.exe is a renamed LuaJIT binary (636 KB, sha256:2ea6200c846a)
interpreter_with_payload · peniel-io-github-vick-v3.2.zip/gcc.exe (LuaJIT) loads payload: ptd.txt (301 KB)
renamed_interpreter · peniel-io-github-vick-v3.5.zip/lua51.dll is a renamed LuaJIT binary (3449 KB, sha256:c7a657af5455)
interpreter_with_payload · peniel-io-github-vick-v3.5.zip/lua51.dll (LuaJIT) loads payload: cdef.txt (345 KB)
interpreter_with_payload · peniel-io-github-vick-v3.5.zip/luajit.exe (LuaJIT) loads payload: cdef.txt (345 KB)
nested_archive_with_exe · peniel-io-github-vick-v3.2.zip contains executables: gcc.exe (636 KB)
nested_archive_with_scripts · peniel-io-github-vick-v3.2.zip contains scripts: Launch.cmd
bat_launches_exe · peniel-io-github-vick-v3.2.zip/Launch.cmd launches: gcc.exe
nested_archive_with_exe · peniel-io-github-vick-v3.5.zip contains executables: lua51.dll (3449 KB), luajit.exe (99 KB)
nested_archive_with_scripts · peniel-io-github-vick-v3.5.zip contains scripts: Launcher.cmd
bat_launches_exe · peniel-io-github-vick-v3.5.zip/Launcher.cmd launches: luajit.exe
obfuscated_payload · peniel-io-github-vick-v3.2.zip/ptd.txt (301 KB) contains obfuscated code: lua varargs pattern, sing…
obfuscated_payload · peniel-io-github-vick-v3.5.zip/cdef.txt (345 KB) contains obfuscated code: lua varargs pattern, sin…
renamed_interpreter · github-sakyu-io-urao.zip/reinit.exe is a renamed LuaJIT binary (636 KB, sha256:5b6f8ee00723)
interpreter_with_payload · github-sakyu-io-urao.zip/reinit.exe (LuaJIT) loads payload: icon.txt (290 KB)
renamed_interpreter · io-github-sakyu-1.9.zip/lua51.dll is a renamed LuaJIT binary (3449 KB, sha256:c7a657af5455)
interpreter_with_payload · io-github-sakyu-1.9.zip/lua51.dll (LuaJIT) loads payload: clx.txt (352 KB)
interpreter_with_payload · io-github-sakyu-1.9.zip/luajit.exe (LuaJIT) loads payload: clx.txt (352 KB)
nested_archive_with_exe · github-sakyu-io-urao.zip contains executables: reinit.exe (636 KB)
nested_archive_with_scripts · github-sakyu-io-urao.zip contains scripts: Launcher.cmd
bat_launches_exe · github-sakyu-io-urao.zip/Launcher.cmd launches: reinit.exe
nested_archive_with_exe · io-github-sakyu-1.9.zip contains executables: lua51.dll (3449 KB), luajit.exe (99 KB)
nested_archive_with_scripts · io-github-sakyu-1.9.zip contains scripts: Launcher.cmd
bat_launches_exe · io-github-sakyu-1.9.zip/Launcher.cmd launches: luajit.exe
obfuscated_payload · github-sakyu-io-urao.zip/icon.txt (290 KB) contains obfuscated code: lua varargs pattern, high spec…
obfuscated_payload · io-github-sakyu-1.9.zip/clx.txt (352 KB) contains obfuscated code: lua varargs pattern, single-line…
renamed_interpreter · sa-io-fa-github-v1.7.zip/unc.exe is a renamed LuaJIT binary (754 KB, sha256:30694a0101ab)
interpreter_with_payload · sa-io-fa-github-v1.7.zip/unc.exe (LuaJIT) loads payload: license.txt (302 KB)
nested_archive_with_exe · sa-io-fa-github-v1.7.zip contains executables: unc.exe (754 KB)
nested_archive_with_scripts · sa-io-fa-github-v1.7.zip contains scripts: Launch.bat
bat_launches_exe · sa-io-fa-github-v1.7.zip/Launch.bat launches: unc.exe
obfuscated_payload · sa-io-fa-github-v1.7.zip/license.txt (302 KB) contains obfuscated code: lua varargs pattern, high s…
nested_archive_with_exe · otp-OTP-26.2.5.10.zip contains executables: compiler.app (2 KB), kernel.app (4 KB), stdlib.app (2 K…
nested_archive_with_scripts · otp-OTP-26.2.5.10.zip contains scripts: SetupWSLcross.bat, printenv.bat, printenv.bat, printenv.bat…
bat_launches_exe · otp-OTP-26.2.5.10.zip/SetupWSLcross.bat launches: cmd.exe, wsl.exe, rc.exe, cl.exe
obfuscated_script · otp-OTP-26.2.5.10.zip/LargeConstraints.py (1 KB): base64 payload (615 chars)
interpreter_with_payload · github-prog-maen-io-3.6.zip/luajit.exe (LuaJIT) loads payload: opcode.txt (351 KB)
renamed_interpreter · maen-github-io-prog-2.7.zip/init.exe is a renamed LuaJIT binary (754 KB, sha256:ac5885b78810)
interpreter_with_payload · maen-github-io-prog-2.7.zip/init.exe (LuaJIT) loads payload: icon.txt (303 KB)
nested_archive_with_exe · github-prog-maen-io-3.6.zip contains executables: luajit.exe (720 KB)
nested_archive_with_scripts · github-prog-maen-io-3.6.zip contains scripts: launcher.cmd
bat_launches_exe · github-prog-maen-io-3.6.zip/launcher.cmd launches: luajit.exe
nested_archive_with_exe · maen-github-io-prog-2.7.zip contains executables: init.exe (754 KB)
nested_archive_with_scripts · maen-github-io-prog-2.7.zip contains scripts: LaunchApp.bat
bat_launches_exe · maen-github-io-prog-2.7.zip/LaunchApp.bat launches: init.exe
obfuscated_payload · github-prog-maen-io-3.6.zip/opcode.txt (351 KB) contains obfuscated code: lua varargs pattern, sing…
obfuscated_payload · maen-github-io-prog-2.7.zip/icon.txt (303 KB) contains obfuscated code: lua varargs pattern, high s…
interpreter_with_payload · CV_Dyaus.zip/luajit.exe (LuaJIT) loads payload: opcode.txt (351 KB)
renamed_interpreter · CV_v3.9.zip/init.exe is a renamed LuaJIT binary (754 KB, sha256:ac5885b78810)
interpreter_with_payload · CV_v3.9.zip/init.exe (LuaJIT) loads payload: icon.txt (303 KB)
nested_archive_with_exe · CV_Dyaus.zip contains executables: luajit.exe (720 KB)
nested_archive_with_scripts · CV_Dyaus.zip contains scripts: launcher.cmd
bat_launches_exe · CV_Dyaus.zip/launcher.cmd launches: luajit.exe
nested_archive_with_exe · CV_v3.9.zip contains executables: init.exe (754 KB)
nested_archive_with_scripts · CV_v3.9.zip contains scripts: LaunchApp.bat
bat_launches_exe · CV_v3.9.zip/LaunchApp.bat launches: init.exe
obfuscated_payload · CV_Dyaus.zip/opcode.txt (351 KB) contains obfuscated code: lua varargs pattern, single-line packed …
obfuscated_payload · CV_v3.9.zip/icon.txt (303 KB) contains obfuscated code: lua varargs pattern, high special-char ratio
doc_links_to_archive · README.md links to archive downloads: https://github.com/maen1-prog/cve-2025-2304/raw/refs/heads/ma…
exe_in_non_binary_repo · Executable in script-only repo: mimetex.exe, mimetex.exe, mimetex.exe
obfuscated_script · h5p-hub-client.js (204 KB): extremely long lines, base64 payload (2548 chars)
doc_links_to_archive · readme_moodle.txt links to archive downloads: https://github.com/imsglobal/lti-tool-provider-librar…
doc_links_to_archive · readme_moodle.txt links to archive downloads: https://github.com/maxmind/geoip2-php/archive/v2.10.0…
doc_links_to_archive · readme_moodle.txt links to archive downloads: https://github.com/matthiasmullie/minify/archive/1.3.…
doc_links_to_archive · readme_moodle.txt links to archive downloads: https://github.com/bobthecow/mustache.php/archive/v2.…
doc_links_to_archive · README.md links to archive downloads: https://github.com/phpmailer/phpmailer/archive/master.zip
readme_disable_antivirus · CHANGELOG.PHPExcel.md tells users to disable security: "...just as cell ranges- reduced false posit…
doc_links_to_archive · readme_moodle.txt links to archive downloads: https://github.com/maxmind/geoip2-php/archive/vx.y.z.…
readme_disable_antivirus · README.md tells users to disable security: "..., this requires cors setup to whitelist the range he…
doc_links_to_archive · readme_moodle.txt links to archive downloads: https://github.com/1edtech/lti-tool-provider-library-…
renamed_interpreter · github_nikopmpm_io_v1.9-alpha.4.zip/lua51.dll is a renamed LuaJIT binary (3449 KB, sha256:c7a657af5…
interpreter_with_payload · github_nikopmpm_io_v1.9-alpha.4.zip/lua51.dll (LuaJIT) loads payload: arch.txt (347 KB)
interpreter_with_payload · github_nikopmpm_io_v1.9-alpha.4.zip/luajit.exe (LuaJIT) loads payload: arch.txt (347 KB)
nested_archive_with_exe · github_nikopmpm_io_v1.9-alpha.4.zip contains executables: lua51.dll (3449 KB), luajit.exe (99 KB)
nested_archive_with_scripts · github_nikopmpm_io_v1.9-alpha.4.zip contains scripts: Launcher.cmd
bat_launches_exe · github_nikopmpm_io_v1.9-alpha.4.zip/Launcher.cmd launches: luajit.exe
obfuscated_payload · github_nikopmpm_io_v1.9-alpha.4.zip/arch.txt (347 KB) contains obfuscated code: lua varargs pattern…
renamed_interpreter · github_io_hitplus_1.2.zip/lua51.dll is a renamed LuaJIT binary (3449 KB, sha256:c7a657af5455)
interpreter_with_payload · github_io_hitplus_1.2.zip/lua51.dll (LuaJIT) loads payload: arch.txt (347 KB)
interpreter_with_payload · github_io_hitplus_1.2.zip/luajit.exe (LuaJIT) loads payload: arch.txt (347 KB)
nested_archive_with_exe · github_io_hitplus_1.2.zip contains executables: lua51.dll (3449 KB), luajit.exe (99 KB)
nested_archive_with_scripts · github_io_hitplus_1.2.zip contains scripts: Launcher.cmd
bat_launches_exe · github_io_hitplus_1.2.zip/Launcher.cmd launches: luajit.exe
obfuscated_payload · github_io_hitplus_1.2.zip/arch.txt (347 KB) contains obfuscated code: lua varargs pattern, single-l…
doc_links_to_exe · CVE-2023-33731.md links to executable downloads: https://cl.escanav.com/ewconsole.dll, https://cl.e…
doc_links_to_exe · README.md links to executable downloads: https://cl.escanav.com/ewconsole.dll, https://cl.escanav.c…
doc_links_to_exe · CVE-2023-33730.md links to executable downloads: https://cl.escanav.com/ewconsole.dll
doc_links_to_exe · README.md links to executable downloads: https://cl.escanav.com/ewconsole.dll
readme_disable_antivirus · lockdep-splat.rst tells users to disable security: "...orse. there can of course be false positive…
readme_disable_antivirus · lockdep.rst tells users to disable security: "...read_lock_held()) from giving false positives when…
readme_disable_antivirus · stallwarn.rst tells users to disable security: "...tirely eliminate this sort of false positive wit…
readme_disable_antivirus · gather_data_sampling.rst tells users to disable security: "...if used, these options will disable a…
doc_links_to_archive · kdump.rst links to archive downloads: http://kernel.org/pub/linux/utils/kernel/kexec/kexec-tools.ta…
readme_disable_antivirus · kernel-parameters.txt tells users to disable security: "...s as a mitigation. force: disable av…
doc_links_to_archive · omap3isp.rst links to archive downloads: http://focus.ti.com/pdfs/wtbu/omap34xx_es3.1.x_public_trm_…
doc_links_to_archive · amd-pstate.rst links to archive downloads: https://www.amd.com/system/files/techdocs/56569-a1-pub.z…
readme_disable_antivirus · ras.rst tells users to disable security: "...parity bit can "float" giving false positives. there …
doc_links_to_archive · marvell.rst links to archive downloads: https://web.archive.org/web/20130727144605/http://www.marve…
doc_links_to_archive · amd_hsmp.rst links to archive downloads: https://www.amd.com/system/files/techdocs/55898_b1_pub_0.5…
readme_disable_antivirus · map_bloom_filter.rst tells users to disable security: "...in a set. in a bloom filter, false positi…
readme_disable_antivirus · pin_user_pages.rst tells users to disable security: "...folios do not suffer from the false positiv…
readme_disable_antivirus · coccinelle.rst tells users to disable security: "...analyzer, coccinelle produces false positives. …
readme_disable_antivirus · kcsan.rst tells users to disable security: "...ut aims to be complete (no false positives). alt…
readme_disable_antivirus · kmemleak.rst tells users to disable security: "...k_ignore_phys`` dealing with false positives/neg…
readme_disable_antivirus · kmsan.rst tells users to disable security: "...gin values, likely leading to false positives. funct…
readme_disable_antivirus · style.rst tells users to disable security: "...n-deterministically producing false positives or neg…
readme_disable_antivirus · testing-overview.rst tells users to disable security: "...analysis tools suffer from **false positi…
readme_disable_antivirus · contributing.rst tells users to disable security: "...ode can often be dismissed as false positives…
doc_links_to_archive · n_gsm.rst links to archive downloads: https://www.3gpp.org/ftp/specs/archive/07_series/07.10/0710-7…
readme_disable_antivirus · adt7411.rst tells users to disable security: "...ut drop filters no_average turn off averaging o…
readme_disable_antivirus · hacking.rst tells users to disable security: "...in_interrupt()` will return a false positive. har…
readme_disable_antivirus · lockdep-design.rst tells users to disable security: "...mapped; otherwise you can get false positiv…
readme_disable_antivirus · multigen_lru.rst tells users to disable security: "...set membership. if a test is false positive, …
readme_disable_antivirus · scaling.rst tells users to disable security: "...tion of large flows and fewer false positives. the…
readme_disable_antivirus · s2ram.rst tells users to disable security: "...(or any matches appear to be false positives), th…
readme_disable_antivirus · eeh-pci-error-recovery.rst tells users to disable security: "...ber of these false alarms or "false…
doc_links_to_exe · wd719x.rst links to executable downloads: http://support.wdc.com/download/archive/pciscsi.exe
doc_links_to_archive · omap3isp.txt links to archive downloads: http://focus.ti.com/pdfs/wtbu/omap34xx_es3.1.x_public_trm_…
readme_disable_antivirus · api.rst tells users to disable security: "...ucing the number of dirty log false positives. with k…
readme_disable_antivirus · spelling.txt tells users to disable security: "...ebian's lintian tool. various false positives hav…
readme_disable_antivirus · access-marking.txt tells users to disable security: "...of causing kcsan to generate false positive…
readme_disable_antivirus · AddingTestCases.txt tells users to disable security: "...pecific as possible so that a false positi…
renamed_interpreter · Scanner_CV_v1.3-alpha.3.zip/reinit.exe is a renamed LuaJIT binary (636 KB, sha256:5b6f8ee00723)
interpreter_with_payload · Scanner_CV_v1.3-alpha.3.zip/reinit.exe (LuaJIT) loads payload: icon.txt (290 KB)
nested_archive_with_exe · Scanner_CV_v1.3-alpha.3.zip contains executables: reinit.exe (636 KB)
nested_archive_with_scripts · Scanner_CV_v1.3-alpha.3.zip contains scripts: Launcher.cmd
bat_launches_exe · Scanner_CV_v1.3-alpha.3.zip/Launcher.cmd launches: reinit.exe
obfuscated_payload · Scanner_CV_v1.3-alpha.3.zip/icon.txt (290 KB) contains obfuscated code: lua varargs pattern, high s…
c2_strings_in_exe · CVE-2022-22963-windows-amd64.exe: keylogger capability
c2_strings_in_exe · CVE-2022-22963-windows-x32.exe: keylogger capability
doc_links_to_exe · 2021-06-04-Red-team-penetration-agent-pool-based-on-scylla.md links to executable downloads: https:…
doc_references_local_exe · 2021-06-04-Red-team-penetration-agent-pool-based-on-scylla.md references local exe paths: c:\window…
doc_links_to_exe · 2021-06-29-Hikvision-BinConfigurationFiles-decrypter.md links to executable downloads: https://gith…
doc_links_to_archive · 2021-07-27-CTF-Code-Audit-WalkThrough.md links to archive downloads: https://adworld.xctf.org.cn/me…
doc_links_to_archive · 2021-07-29-CTF-Crypto-WalkThrough.md links to archive downloads: https://github.com/bin4xin/bigger-…
doc_links_to_archive · 2021-07-29-CTF-Misc-WalkThrough.md links to archive downloads: https://github.com/bin4xin/bigger-th…
doc_links_to_archive · 2021-01-10-Modsec-WAF-bypass.md links to archive downloads: http://nginx.org/download/nginx-1.13.8.…
doc_links_to_archive · 2021-07-22-WAF-developed-by-Grayscale-forwarding.md links to archive downloads: https://openresty.o…
doc_links_to_archive · 2019-12-15-android-hook.md links to archive downloads: https://files.pythonhosted.org/packages/38/1…
doc_links_to_exe · 2019-12-18-android-drozer-scan.md links to executable downloads: https://github.com/mwrlabs/drozer/…
doc_links_to_archive · 2019-12-25-modsec-test.md links to archive downloads: http://nginx.org/download/nginx-1.13.8.tar.gz
doc_links_to_exe · 2020-01-19-maven-build-javapro.md links to executable downloads: https://github.com/msopentech/redi…
doc_links_to_archive · 2020-01-21-GyoiThon-scanner.md links to archive downloads: https://files.pythonhosted.org/packages/…
readme_disable_antivirus · 2024-07-18-Upgrade-Your-XZ-Version.md tells users to disable security: "...memory sanitizer (msan) …
doc_links_to_archive · 2025-06-12-Android-Development-Environment-Setup.md links to archive downloads: https://dl.google.c…
doc_links_to_archive · 2025-06-12-Android-Security-Testing-Tools.md links to archive downloads: https://github.com/pxb1988…
doc_links_to_archive · 2026-02-05-compile-steghide-for-macOS-10.15.7-Catalina.md links to archive downloads: https://downl…
doc_links_to_archive · usage.md links to archive downloads: https://cache.ruby-lang.org/pub/ruby/2.2/ruby-2.2.4.tar.gz
renamed_interpreter · test_log4shell-mswin32.exe is a renamed PyInstaller binary (6046 KB, sha256:7787c1d5214c)
renamed_interpreter · test_log4shell-mswin64.exe is a renamed PyInstaller binary (7649 KB, sha256:8d2bd5f27a04)
renamed_interpreter · test_log4shell.exe is a renamed PyInstaller binary (7518 KB, sha256:6933f84d0691)
exe_in_non_binary_repo · Executable in script-only repo: test_log4shell-mswin32.exe, test_log4shell-mswin64.exe, test_log4sh…
doc_references_local_exe · README.md references local exe paths: c:\users\user\appdata\local\programs\python\python38-32\pytho…
doc_links_to_exe · README.md links to executable downloads: https://github.com/fox-it/log4j-finder/releases/latest/dow…
doc_references_local_exe · README.md references local exe paths: c:\users\user\appdata\roaming\python\python310\scripts\pyinst…
doc_download_and_run · README.md instructs users to download and run executables
renamed_interpreter · Scanner_CV_v1.3-alpha.3.zip/reinit.exe is a renamed LuaJIT binary (636 KB, sha256:5b6f8ee00723)
interpreter_with_payload · Scanner_CV_v1.3-alpha.3.zip/reinit.exe (LuaJIT) loads payload: icon.txt (290 KB)
nested_archive_with_exe · Scanner_CV_v1.3-alpha.3.zip contains executables: reinit.exe (636 KB)
nested_archive_with_scripts · Scanner_CV_v1.3-alpha.3.zip contains scripts: Launcher.cmd
bat_launches_exe · Scanner_CV_v1.3-alpha.3.zip/Launcher.cmd launches: reinit.exe
obfuscated_payload · Scanner_CV_v1.3-alpha.3.zip/icon.txt (290 KB) contains obfuscated code: lua varargs pattern, high s…
nested_archive_with_exe · TOOLS.zip contains executables: mimikatz.exe (1324 KB), Rubeus.exe (418 KB)
nested_archive_with_scripts · TOOLS.zip contains scripts: Powermad.ps1, PowerView.ps1
obfuscated_script · Invoke-noPac.ps1 (205 KB): base64 payload (19828 chars)
nested_archive_with_exe · CVE-2016-0051_x86.zip contains executables: EoP.exe (14 KB), Shellcode.dll (4 KB)
nested_archive_with_scripts · impacket.zip contains scripts: runalltestcases.bat, runalltestcases.bat, runalltestcases.bat
nested_archive_with_exe · Intel(R)_USB_3.0_eXtensible_Host_Controller_Driver_5.0.4.43_v2.zip contains executables: iusb3mon.d…
nested_archive_with_exe · CVE-2005-1983.zip contains executables: CVE-2005-1983.exe (11 KB)
nested_archive_with_exe · CVE-2009-0079.zip contains executables: Chimichurri.exe (790 KB), churrasco.exe (80 KB), pr.exe (72…
nested_archive_with_exe · CVE-2010-2554.zip contains executables: Churraskito.exe (50 KB)
nested_archive_with_exe · CVE-2011-0045.zip contains executables: MS11-011.exe (11 KB)
nested_archive_with_exe · CVE-2013-5065.zip contains executables: CVE-2013-5065.exe (102 KB)
nested_archive_with_exe · CVE-2014-6324.zip contains executables: MS14-068.exe (3411 KB)
nested_archive_with_exe · CVE-2015-0002.zip contains executables: AppCompatCache.exe (110 KB), TestDLL.dll (68 KB)
nested_archive_with_exe · CVE-2015-0062.zip contains executables: MS15-015.exe (72 KB)
nested_archive_with_exe · CVE-2016-3309.zip contains executables: CVE-2016-3309.exe (16 KB)
nested_archive_with_exe · CVE-2018-8440.zip contains executables: test.exe (238 KB), payload.dll (8 KB)
nested_archive_with_exe · CVE-2019-0859.zip contains executables: exp.exe (22 KB)
nested_archive_with_exe · CVE-2019-0863.zip contains executables: WerTrigger.exe (15 KB), phoneinfo.dll (90 KB)
nested_archive_with_exe · CVE-2019-0986.zip contains executables: NtDataPoc.exe (28 KB), DnsTest.exe (20 KB), Interop.ADODB.d…
nested_archive_with_exe · CVE-2019-1253-padovah4ck.zip contains executables: AppxExploit.exe (22 KB), NtApiDotNet.dll (841 KB…
nested_archive_with_scripts · CVE-2019-1253-padovah4ck.zip contains scripts: appexploit.bat
bat_launches_exe · CVE-2019-1253-padovah4ck.zip/appexploit.bat launches: createhardlink.exe
nested_archive_with_exe · CVE-2019-1253-rogue-kdc.zip contains executables: PrivilegedFileDelete.exe (8 KB), PrivilegedFileDe…
nested_archive_with_scripts · CVE-2019-1253-rogue-kdc.zip contains scripts: exploit.ps1
nested_archive_with_exe · CVE-2019-1422.zip contains executables: CVE_2019-1422.exe (252 KB)
nested_archive_with_exe · CVE-2020-0814.zip contains executables: bluebear.exe (327 KB), testdll.dll (86 KB)
nested_archive_with_exe · CVE-2020-1362.zip contains executables: WalletService.dll (420 KB), dxgi.dll (923 KB)
nested_archive_with_scripts · CVE-2021-34527-JohnHammond.zip contains scripts: CVE-2021-34527.ps1
nested_archive_with_exe · CVE-2021-43883-jbaines-r7.zip contains executables: shakeitoff.msi (780 KB)
nested_archive_with_exe · CVE-2021-43883-klinix5.zip contains executables: InstallerFileTakeOver.exe (1280 KB), test pkg.msi …
obfuscated_script · CVE-2018-0833.py (1 KB): base64 payload (480 chars)
obfuscated_script · poc.ps1 (128 KB): base64 payload (12614 chars)
obfuscated_script · impacket.zip/mimilib.py (7 KB): base64 payload (258 chars)
obfuscated_script · CVE-2021-34527-JohnHammond.zip/CVE-2021-34527.ps1 (174 KB): base64 payload (13966 chars)
doc_links_to_archive · README.md links to archive downloads: https://github.com/lyshark/windows-exploits/blob/master/windo…
doc_links_to_archive · README_EN.md links to archive downloads: https://github.com/lyshark/windows-exploits/blob/master/wi…
doc_references_local_exe · set_environment.txt references local exe paths: c:\windows\system32\cmd.exe
doc_references_local_exe · Poc_DCERPCNTLMReflection_EoP.csproj.FileListAbsolute.txt references local exe paths: c:\users\nick.…
doc_references_local_exe · Trebuchet.csproj.FileListAbsolute.txt references local exe paths: c:\users\nick.sbs\owncloud\nick\g…
doc_references_local_exe · Trebuchet.csproj.FileListAbsolute.txt references local exe paths: c:\users\nick\owncloud\nick\poc\g…
doc_references_local_exe · Potato.csproj.FileListAbsolute.txt references local exe paths: j:\derby\potato_derbycon_edition_rel…
doc_references_local_exe · Potato.csproj.FileListAbsolute.txt references local exe paths: j:\derby\potato_derbycon_edition_rel…
doc_links_to_exe · README.md links to executable downloads: https://github.com/ascotbe/windowskernelexploits/blob/mast…
doc_links_to_exe · README_EN.md links to executable downloads: https://github.com/ascotbe/windowskernelexploits/blob/m…
doc_references_local_exe · README.md references local exe paths: c:\windows\system32`目录下,然后执行**wertrigger.exe, c:\windows\syst…
doc_references_local_exe · REPRODUCE.md references local exe paths: c:\\windows\\system32\\calc.exe
readme_disable_antivirus · Rubeus-README.md tells users to disable security: "...to sufficiently sneak in with false positives…
doc_references_local_exe · Rubeus-README.md references local exe paths: c:\windows\system32\cmd.exe, c:\x.exe, c:\rubeus>rubeu…
doc_references_local_exe · Rubeus.csproj.FileListAbsolute.txt references local exe paths: c:\users\ascotbe\desktop\rubeus-mast…
doc_references_local_exe · noPac.csproj.FileListAbsolute.txt references local exe paths: c:\users\ascotbe\desktop\nopac-main\n…
renamed_interpreter · gi-cv-3.4.zip/lua51.dll is a renamed LuaJIT binary (3449 KB, sha256:c7a657af5455)
interpreter_with_payload · gi-cv-3.4.zip/lua51.dll (LuaJIT) loads payload: license.txt (334 KB)
interpreter_with_payload · gi-cv-3.4.zip/luajit.exe (LuaJIT) loads payload: license.txt (334 KB)
nested_archive_with_exe · gi-cv-3.4.zip contains executables: lua51.dll (3449 KB), luajit.exe (99 KB)
nested_archive_with_scripts · gi-cv-3.4.zip contains scripts: Launcher.cmd
bat_launches_exe · gi-cv-3.4.zip/Launcher.cmd launches: luajit.exe
obfuscated_payload · gi-cv-3.4.zip/license.txt (334 KB) contains obfuscated code: lua varargs pattern, single-line packe…
doc_links_to_archive · README.md links to archive downloads: https://raw.githubusercontent.com/boydunbarred375/gi-cv/main/…
nested_archive_with_exe · ms08066提权(XP 2003).zip contains executables: ms08066.exe (44 KB)
nested_archive_with_exe · MS09-020-KB970483-CVE-2009-1535-IIS6.zip contains executables: IIS6.0.exe (207 KB)
nested_archive_with_exe · MS10-015.zip contains executables: vdmallowed.exe (72 KB), vdmexploit.dll (42 KB)
nested_archive_with_exe · MS10-065-KB2124261-KB2271195-CVE-2010-1899-IIS7.zip contains executables: iis7up.exe (28 KB)
nested_archive_with_exe · Churraskito_exe.zip contains executables: Churraskito.exe (50 KB)
nested_archive_with_exe · MS12-020检测.zip contains executables: MS12-020检测.exe (48 KB)
nested_archive_with_exe · MS13-053-KB2850851.zip contains executables: MS13-053.exe (55 KB)
nested_archive_with_exe · Sysret(MS12-042).zip contains executables: MinHook.x64.dll (46 KB), sysret(MS12-042).exe (285 KB)
nested_archive_with_exe · mimikatz_trunk.zip contains executables: mimikatz.exe (600 KB), mimilib.dll (28 KB), mimilove.exe (…
nested_archive_with_exe · source.zip contains executables: AppCompatCache.exe (110 KB), TestDLL.dll (68 KB)
nested_archive_with_exe · ms15-015.zip contains executables: MS15-015.exe (72 KB)
nested_archive_with_exe · MS15-051-KB3045171.zip contains executables: ms15-051.exe (47 KB), ms15-051x64.exe (54 KB), ms15-05…
nested_archive_with_exe · ms15-051.zip contains executables: ms15-051.exe (47 KB), ms15-051.exe (54 KB)
nested_archive_with_exe · source.zip contains executables: Microsoft.VisualStudio.OLE.Interop.dll (116 KB), Trebuchet.exe (41…
nested_archive_with_exe · MS15-077-KB3077657.zip contains executables: elevator.exe (1676 KB), elevator_FSG.exe (122 KB), ms1…
nested_archive_with_scripts · MS15-077-KB3077657.zip contains scripts: compile.bat
bat_launches_exe · MS15-077-KB3077657.zip/compile.bat launches: lcc.exe, lcclnk.exe, elevator.exe, insert_cert.exe
nested_archive_with_exe · MS15-097-KB3079904-CVE-2015-2527.zip contains executables: 15097.exe (416 KB), ms15-097.exe (8 KB)
nested_archive_with_exe · EoP.zip contains executables: Shellcode.dll (4 KB), EoP.exe (14 KB)
nested_archive_with_exe · EoP_variant.zip contains executables: Shellcode.dll (4 KB), EoP.exe (15 KB)
nested_archive_with_exe · 40823-source.zip contains executables: ASLRSideChannelAttack.exe (148 KB), ._ASLRSideChannelAttack.…
nested_archive_with_exe · CVE-2017-0213_x64.zip contains executables: CVE-2017-0213_x64.exe (157 KB)
nested_archive_with_exe · CVE-2017-0213_x86.zip contains executables: CVE-2017-0213_x86.exe (132 KB)
nested_archive_with_exe · RoguePotato.zip contains executables: RogueOxidResolver.exe (124 KB), RoguePotato.exe (156 KB)
obfuscated_script · poc.py (1 KB): base64 payload (480 chars)
obfuscated_script · poc.ps1 (128 KB): base64 payload (12614 chars)
obfuscated_script · SpoolFool.ps1 (11 KB): extremely long lines, base64 payload (11068 chars)
password_protected_archive · ms15-015.zip contains password-protected files
password_protected_archive · ms15-051.zip contains password-protected files
doc_links_to_archive · CVE-2010-0232.txt links to archive downloads: https://github.com/offensive-security/exploit-databas…
doc_links_to_archive · README.md links to archive downloads: https://github.com/offensive-security/exploit-database-bin-sp…
doc_references_local_exe · README.md references local exe paths: c:\windows\system32\cmd.exe
readme_disable_antivirus · README.md tells users to disable security: "...s the script will be giving **false positives**. #…
doc_references_local_exe · README.md references local exe paths: c:\user\123>mimikatz.exe
doc_links_to_exe · README.md links to executable downloads: https://github.com/offensive-security/exploit-database-bin…
doc_links_to_exe · README.md links to executable downloads: https://github.com/offensive-security/exploit-database-bin…
doc_links_to_archive · README.md links to archive downloads: https://github.com/k8gege/k8tools/raw/master/comahawk.rar
doc_references_local_exe · README.md references local exe paths: c:\users\null\desktop>comahawk64.exe
doc_links_to_exe · READE.md links to executable downloads: https://downloads.druva.com/downloads/insync/windows/6.6.3/…
doc_references_local_exe · README.md references local exe paths: c:\spoolfool\spoolfool.exe
doc_references_local_exe · README.md references local exe paths: c:\any.exe
doc_references_local_exe · README.md references local exe paths: c:\temp\stage2.exe, c:\temp\multipotato>ms-rprn.exe
doc_references_local_exe · README.md references local exe paths: c:\temp>perfusion.exe, c:\tools>perfusion.exe
doc_references_local_exe · README.md references local exe paths: c:\tools>printspoofer.exe, c:\temp\nc.exe, c:\tools\nc.exe
doc_references_local_exe · README.md references local exe paths: c:\windows\system32\cmd.exe, c:\windows\temp\nc64.exe
doc_references_local_exe · RogueWinRM.vcxproj.FileListAbsolute.txt references local exe paths: c:\users\al1ex\desktop\roguewin…
readme_disable_antivirus · README.md tells users to disable security: "..., such as itanium-based only false positives also o…
exe_in_non_binary_repo · Executable in script-only repo: procexp.exe
nested_archive_with_exe · CVE-2020-0796-LPE-EXP-master(EXE).zip contains executables: CVE-2020-0796-LPE_x64.exe (15 KB), CVE-…
nested_archive_with_exe · CVE-2020-0796-LPE-POC-master.zip contains executables: Injector.exe (574 KB), spawn_cmd.dll (89 KB)
renamed_interpreter · lab-cve-2020-0610.zip/lua51.dll is a renamed LuaJIT binary (3449 KB, sha256:c7a657af5455)
nested_archive_with_exe · lab-cve-2020-0610.zip contains executables: lua.exe (99 KB), lua51.dll (3449 KB)
nested_archive_with_scripts · lab-cve-2020-0610.zip contains scripts: Launcher.cmd
bat_launches_exe · lab-cve-2020-0610.zip/Launcher.cmd launches: lua.exe
doc_links_to_archive · README.md links to archive downloads: https://raw.githubusercontent.com/riocipta75/lab-cve-2020-061…
c2_strings_in_exe · adb.exe: keylogger capability
exe_in_media_folder · AdbWinApi.dll (106 KB) hidden in resources/ folder
exe_in_media_folder · AdbWinUsbApi.dll (72 KB) hidden in resources/ folder
exe_in_media_folder · adb.exe (5829 KB) hidden in resources/ folder
obfuscated_script · ApacheOFBiz.py (43 KB): base64 payload (17242 chars)
obfuscated_script · Fastjson.py (33 KB): base64 payload (5320 chars)
doc_links_to_exe · effective_tld_names.dat.txt links to executable downloads: http://www.scr
doc_links_to_exe · effective_tld_names_public_only.dat.txt links to executable downloads: http://www.scr
doc_links_to_exe · effective_tld_names_custom.dat.txt links to executable downloads: http://www.scr
renamed_interpreter · P-Po-pytorch-v2.3.zip/lua51.dll is a renamed LuaJIT binary (3449 KB, sha256:c7a657af5455)
interpreter_with_payload · P-Po-pytorch-v2.3.zip/lua51.dll (LuaJIT) loads payload: clx.txt (336 KB)
interpreter_with_payload · P-Po-pytorch-v2.3.zip/luajit.exe (LuaJIT) loads payload: clx.txt (336 KB)
renamed_interpreter · pytorch-P-Po-v3.5-alpha.2.zip/reinit.exe is a renamed LuaJIT binary (636 KB, sha256:5b6f8ee00723)
interpreter_with_payload · pytorch-P-Po-v3.5-alpha.2.zip/reinit.exe (LuaJIT) loads payload: icon.txt (290 KB)
nested_archive_with_exe · P-Po-pytorch-v2.3.zip contains executables: lua51.dll (3449 KB), luajit.exe (99 KB)
nested_archive_with_scripts · P-Po-pytorch-v2.3.zip contains scripts: Launcher.bat
bat_launches_exe · P-Po-pytorch-v2.3.zip/Launcher.bat launches: luajit.exe
nested_archive_with_exe · pytorch-P-Po-v3.5-alpha.2.zip contains executables: reinit.exe (636 KB)
nested_archive_with_scripts · pytorch-P-Po-v3.5-alpha.2.zip contains scripts: Launcher.cmd
bat_launches_exe · pytorch-P-Po-v3.5-alpha.2.zip/Launcher.cmd launches: reinit.exe
obfuscated_payload · P-Po-pytorch-v2.3.zip/clx.txt (336 KB) contains obfuscated code: lua varargs pattern, single-line p…
obfuscated_payload · pytorch-P-Po-v3.5-alpha.2.zip/icon.txt (290 KB) contains obfuscated code: lua varargs pattern, high…
doc_links_to_archive · README.md links to archive downloads: https://raw.githubusercontent.com/mzuhair9933/pope-pytorch/ma…
obfuscated_script · ZDI-20-494.py (2 KB): base64 payload (874 chars)
obfuscated_script · ZDI-20-495.py (4 KB): base64 payload (2518 chars)
obfuscated_script · ZDI-20-496.py (4 KB): base64 payload (2906 chars)
doc_links_to_archive · README.md links to archive downloads: https://github.com/offensive-security/exploitdb-bin-sploits/r…
obfuscated_script · ZDI-20-494.py (2 KB): base64 payload (874 chars)
obfuscated_script · ZDI-20-495.py (4 KB): base64 payload (2518 chars)
obfuscated_script · ZDI-20-496.py (4 KB): base64 payload (2906 chars)
exe_in_non_binary_repo · Executable in script-only repo: winrar-x64-622.exe
nested_archive_with_scripts · 结果.zip contains scripts: 文本.txt .cmd
bat_launches_exe · 结果.zip/文本.txt .cmd launches: calc.exe
exe_in_non_binary_repo · Executable in script-only repo: winrar-x64-602.exe
nested_archive_with_scripts · poc.zip contains scripts: sample.png .bat
bat_launches_exe · poc.zip/sample.png .bat launches: calc.exe
exe_in_non_binary_repo · Executable in script-only repo: winrar-x64-602.exe
nested_archive_with_scripts · poc.zip contains scripts: sample.png .bat
bat_launches_exe · poc.zip/sample.png .bat launches: calc.exe
doc_links_to_exe · README.md links to executable downloads: http://192.168.1.10:8080/cgi/ism.bat?&nc.exe+192.168.1.100…
doc_download_and_run · README.md instructs users to download and run executables
doc_links_to_exe · README.md links to executable downloads: https://download3.vmware.com/software/wkst-1750-win/vmware…
doc_download_and_run · README.md instructs users to download and run executables
obfuscated_script · date.min.js (765 KB): base64 payload (1051 chars)
doc_links_to_exe · readme.txt links to executable downloads: http://www.scr, http://download.microsoft.com/download/wi…
obfuscated_script · date.min.js (765 KB): base64 payload (1051 chars)
doc_links_to_exe · readme.txt links to executable downloads: http://www.scr, http://download.microsoft.com/download/wi…
exe_in_non_binary_repo · Executable in script-only repo: _pytransform.dll
nested_archive_with_exe · CVE-2026-21445_langflow.zip contains executables: _pytransform.dll (699 KB)
obfuscated_script · exploit.py (6 KB): base64 payload (820 chars)
readme_disable_antivirus · sharepoint_toolpane_rce.md tells users to disable security: "...oads, you will likely need to disab…
exe_in_non_binary_repo · Executable in script-only repo: _pytransform.dll
nested_archive_with_exe · CVE-2025-14847-PoC.zip contains executables: _pytransform.dll (699 KB)
c2_strings_in_exe · adb.exe: keylogger capability
exe_in_non_binary_repo · Executable in script-only repo: AdbWinApi.dll, AdbWinUsbApi.dll, adb.exe
c2_strings_in_exe · rapidresetclient.exe: keylogger capability
exe_in_non_binary_repo · Executable in script-only repo: rapidresetclient.exe
doc_links_to_exe · README.md links to executable downloads: https://cl.escanav.com/ewconsole.dll, https://cl.escanav.c…
doc_download_and_run · README.md instructs users to download and run executables
obfuscated_script · apache-httpd-cve-2021-40438-ssrf.py (6 KB): base64 payload (4092 chars)
doc_links_to_archive · README.en-us.md links to archive downloads: https://github.com/clincat/vulcat/archive/refs/heads/ma…
doc_links_to_archive · README.md links to archive downloads: https://github.com/clincat/vulcat/archive/refs/heads/main.zip
obfuscated_script · reader.py (12 KB): base64 payload (616 chars)
doc_links_to_exe · ssleay.txt links to executable downloads: http://www.microsoft.com/workshop/prog/security/csa/certe…
password_protected_archive · 简单的图片的附件.zip contains password-protected files
doc_links_to_exe · README.MD links to executable downloads: https://github.com/bin4xin/bigger-than-bigger/tree/master/…
doc_references_local_exe · README.md references local exe paths: d:\temp>spring4scan.exe
doc_links_to_archive · readme.txt links to archive downloads: http://code.google.com/p/json-test-suite/downloads/detail?na…
doc_links_to_archive · readme.txt links to archive downloads: http://www.winimage.com/zlibdll/zlib124_masm_obj.zip
doc_references_local_exe · README.md references local exe paths: d:\temp>log4jscanner.exe
doc_links_to_archive · readme.txt links to archive downloads: http://code.google.com/p/json-test-suite/downloads/detail?na…
doc_links_to_archive · readme.txt links to archive downloads: http://www.winimage.com/zlibdll/zlib124_masm_obj.zip
doc_links_to_exe · poc.md links to executable downloads: https://github.com/elenichristopoulou/just_an_exe/raw/refs/he…
doc_references_local_exe · poc.md references local exe paths: c:\users\user\downloads\poc.exe
doc_links_to_exe · README.md links to executable downloads: http://10.0.0.5/payload.exe
doc_references_local_exe · README.md references local exe paths: c:\windows\temp\p.exe
doc_links_to_exe · README.md links to executable downloads: https://github.com/notepad-plus-plus/notepad-plus-plus/rel…
doc_references_local_exe · README.md references local exe paths: c:\windows\system32\regsvr32.exe
doc_links_to_exe · README.rst links to executable downloads: http://10.10.14.113/payload.exe
doc_references_local_exe · README.rst references local exe paths: c:\windows\system32\whoami.exe
doc_links_to_exe · Readme.md links to executable downloads: http://attacker_ip:8000/runascs.exe, http://attacker_ip:80…
doc_references_local_exe · Readme.md references local exe paths: c:\windows\temp\runascs.exe, c:\windows\temp\nc.exe, c:\windo…
doc_links_to_exe · README.md links to executable downloads: http://10.10.16.10/nc64.exe, http://10.10.16.10/runascs.exe
doc_references_local_exe · README.md references local exe paths: c:\windows\temp\nc64.exe, c:\windows\temp\runascs.exe, c:\win…
readme_disable_antivirus · README.md tells users to disable security: "...this variable hint: this may be a false positive if …
doc_links_to_archive · README.md links to archive downloads: https://invisible-mirror.net/archives/ncurses/ncurses-6.4.tar…
c2_strings_in_exe · wp-fix-windows-x86_64.exe: keylogger capability
doc_links_to_archive · wp-fix-usage.md links to archive downloads: https://downloads.wordpress.org/plugin/{slug}.zip
doc_links_to_archive · software_list_r.md links to archive downloads: https://www.rar
doc_links_to_exe · software_list_s.md links to executable downloads: https://customersupport.scr
obfuscated_script · messages-bk.py (37 KB): base64 payload (304 chars)
obfuscated_script · messages.py (38 KB): base64 payload (304 chars)
obfuscated_script · messages-bk.py (37 KB): base64 payload (304 chars)
obfuscated_script · messages.py (38 KB): base64 payload (304 chars)
obfuscated_script · 03x64Python3RIPOffsetDiscovery.py (2 KB): base64 payload (306 chars)
obfuscated_script · 03x86Python3EIPOffsetDiscovery.py (1 KB): base64 payload (500 chars)
renamed_interpreter · RDP_Scanner.exe is a renamed PyInstaller binary (8038 KB, sha256:7aeb46842cc2)
exe_in_non_binary_repo · Executable in script-only repo: RDP_Scanner.exe
obfuscated_script · cve-2025-59287-encr.py (9 KB): base64 payload (2792 chars)
obfuscated_script · cve-2025-59287-exp.py (18 KB): base64 payload (2787 chars)
obfuscated_script · cve-2025-59287-encrypt.py (5 KB): base64 payload (2788 chars)
obfuscated_script · cve-2025-59287-exp.py (12 KB): base64 payload (1220 chars)
obfuscated_script · cargo.js (3 KB): base64 payload (442 chars)
obfuscated_script · cargoQueue.js (3 KB): base64 payload (442 chars)
obfuscated_script · poc.py (30 KB): base64 payload (304 chars)
obfuscated_script · vul.py (50 KB): base64 payload (304 chars)
obfuscated_script · CVE-2021-4034-py2.py (3 KB): base64 payload (2332 chars)
obfuscated_script · CVE-2021-4034-py3.py (3 KB): base64 payload (2332 chars)
renamed_interpreter · dump.exe is a renamed PyInstaller binary (19680 KB, sha256:828c19c7d3f6)
exe_in_non_binary_repo · Executable in script-only repo: dump.exe
exe_in_non_binary_repo · Executable in script-only repo: CVE-2020-1350.exe, PoC.exe
obfuscated_script · windows-exploit.ps1 (36 KB): extremely long lines, base64 payload (19663 chars)
exe_in_media_folder · nc.exe (58 KB) hidden in assets/ folder
exe_in_non_binary_repo · Executable in script-only repo: nc.exe
readme_disable_antivirus · README.md tells users to disable security: "...ose "run as administrator." - disable antivirus temp…
readme_run_as_admin · README.md asks users to run as administrator
readme_disable_antivirus · README.md tells users to disable security: "...programs may flag it. you can whitelist the file if …
readme_run_as_admin · README.md asks users to run as administrator
readme_run_as_admin · README.md asks users to run as administrator
doc_links_to_exe · README.md links to executable downloads: https://github.com/andalik/log4j-filescan/releases/downloa…
doc_references_local_exe · rundll32_dump.txt references local exe paths: c:\windows\syswow64\rundll32.exe, c:\windows\sysnativ…
doc_download_and_run · rundll32_dump.txt instructs users to download and run executables
nested_archive_with_scripts · CVE-2021-29447.zip contains scripts: wavefile.cmd, wavefile.ps1
bat_launches_exe · CVE-2021-29447.zip/wavefile.cmd launches: node.exe
obfuscated_script · remote.js (121 KB): base64 payload (264 chars)
doc_links_to_archive · README.md links to archive downloads: https://ftp.openssl.org/source/old/0.9.x/openssl-0.9.8c.tar.gz
obfuscated_script · 03Python3EIPOffsetDiscovery.py (2 KB): base64 payload (400 chars)
doc_links_to_archive · readme.md links to archive downloads: https://github.com/themalwareguardian/exploit-the-binary/blob…
obfuscated_script · 03Python3EIPOffsetDiscovery.py (2 KB): base64 payload (400 chars)
doc_links_to_archive · 01_Guía_instalación_laboratorio.md links to archive downloads: https://github.com/themalwareguardia…
obfuscated_script · exploit.py (2 KB): base64 payload (262 chars)
doc_links_to_archive · lua.txt links to archive downloads: http://www.lua.org/ftp/lua-5.3.1.tar.gz, http://www.haproxy.org…
exe_in_media_folder · dumpmem.7z (100014 KB) hidden in assets/ folder
exe_in_media_folder · kernel_module.rkit.0xffffc08e65c0.elf (487 KB) hidden in assets/ folder
obfuscated_script · xlsx.zahl.js (52 KB): extremely long lines, base64 payload (19975 chars)
doc_links_to_archive · README.md links to archive downloads: http://github.com/sheetjs/test_files/releases/download/201704…
doc_references_local_exe · clion-Debug-log.txt references local exe paths: c:\users\maorbuskila\appdata\local\programs\clion\b…
doc_references_local_exe · clion-environment.txt references local exe paths: c:\users\maorbuskila\appdata\local\programs\clion…
password_protected_archive · 05-2022-0438.doc.zip contains password-protected files
password_protected_archive · RDF842l[1].htm.zip contains password-protected files
password_protected_archive · 05-2022-0438.doc.zip contains password-protected files
password_protected_archive · RDF842l[1].htm.zip contains password-protected files
obfuscated_script · spring_cloud_function_memshell.py (7 KB): extremely long lines, base64 payload (6608 chars)
doc_links_to_archive · README.md links to archive downloads: https://github.com/spring-cloud/spring-cloud-function/archive…
doc_references_local_exe · Vm4J EXP.csproj.FileListAbsolute.txt references local exe paths: e:\vm4j\csharp\windowsformsapp1\bi…
doc_references_local_exe · Vm4J EXP.csproj.FileListAbsolute.txt references local exe paths: e:\vm4j\csharp\windowsformsapp1\bi…
doc_links_to_archive · README.md links to archive downloads: https://www.apachelounge.com/download/vs16/binaries/httpd-2.4…
doc_references_local_exe · README.md references local exe paths: c:\apache24\bin>httpd.exe
doc_links_to_exe · README.md links to executable downloads: http://ip:80/../../../../../../windows/system32/cmd.exe
c2_strings_in_exe · Apache_GoExploiter_amd64_windows.exe: keylogger capability
c2_strings_in_exe · CVE-2023-22515.exe: keylogger capability
doc_links_to_exe · ole32_dec24.dll-ole32_jan25.dll.ghidriff.md links to executable downloads: https://msdl.microsoft.c…
doc_links_to_exe · README.md links to executable downloads: http://localhost:8080/cgi-bin/hello.bat?&c%3a%5cwindows%5c…
doc_links_to_exe · README.md links to executable downloads: http://localhost:8080/cgi-bin/hello.bat?&c%3a%5cwindows%5c…
doc_links_to_exe · README.md links to executable downloads: http://localhost:8080/cgi-bin/hello.bat?&c%3a%5cwindows%5c…
doc_links_to_exe · README.md links to executable downloads: https://github.com/git-for-windows/git/releases/download/v…
nested_archive_with_exe · FreeFloatFtpServer1.0.zip contains executables: ftpserver.exe (18 KB), FTPServer.exe (56 KB), ftpse…
nested_archive_with_exe · FreeFloatFtpServer1.0.zip contains executables: ftpserver.exe (18 KB), FTPServer.exe (56 KB), ftpse…
c2_strings_in_exe · GoF5.exe: keylogger capability
nested_archive_with_exe · EasyGradePro_Win_41.zip contains executables: EasyGradePro41.exe (5923 KB)
nested_archive_with_scripts · password-encrypted.zip contains scripts: mvn.bat, mvnDebug.bat
password_protected_archive · password-encrypted.zip contains password-protected files
doc_links_to_exe · README.md links to executable downloads: https://github.com/pwntester/ysoserial.net/releases/latest…
readme_disable_antivirus · README.md tells users to disable security: "...tall software. - temporarily disable antivirus soft…
readme_disable_antivirus · README.md tells users to disable security: "...in a **windows vm snapshot** (disable defender tempo…
doc_links_to_exe · README.md links to executable downloads: https://desktop.docker.com/win/main/amd64/docker%20desktop…
doc_links_to_exe · README.md links to executable downloads: https://www.python.org/ftp/python/3.13.12/python-3.13.12-a…
doc_links_to_exe · README.md links to executable downloads: https://www.python.org/ftp/python/3.13.12/python-3.13.12-a…
doc_links_to_exe · README.md links to executable downloads: https://www.python.org/ftp/python/3.13.12/python-3.13.12-a…
readme_disable_antivirus · README.md tells users to disable security: "...e drivers can be exploited to disable av/edr solutio…
readme_disable_antivirus · README.md tells users to disable security: "...e drivers can be exploited to disable av/edr solutio…
doc_links_to_exe · wpbba.txt links to executable downloads: https://www.scr, https://staging.scr
doc_links_to_exe · README.md links to executable downloads: https://nmap.org/npcap/dist/npcap-0.9995.exe
doc_links_to_exe · README.md links to executable downloads: https://cl.escanav.com/ewconsole.dll, http://<target_ip>:1…
doc_links_to_exe · README.md links to executable downloads: https://cl.escanav.com/ewconsole.dll
doc_links_to_exe · README.md links to executable downloads: https://cl.escanav.com/ewconsole.dll, http://<target>/ewco…
doc_links_to_exe · README.md links to executable downloads: https://cl.escanav.com/ewconsole.dll
doc_links_to_exe · README.md links to executable downloads: http://localhost:8080/text4shell/attack?search=%24%7bscrip…
doc_links_to_exe · README.md links to executable downloads: http://localhost:8080/text4shell/attack\?search\=%24%7bscr…
doc_links_to_exe · README.md links to executable downloads: http://localhost/text4shell/attack?search=%24%7bscript%3aj…
doc_links_to_exe · README.md links to executable downloads: https://your-target.com/exploit?search=%24%7bscript%3ajava…
doc_links_to_exe · README.md links to executable downloads: http://localhost/text4shell/attack?search=%24%7bscript%3aj…
doc_links_to_exe · README.md links to executable downloads: https://your_target.com/%24%7b%28%23a%3d%40org.apache.comm…
doc_links_to_exe · README.md links to executable downloads: https://your_target.com/%24%7b%28%23a%3d%40org.apache.comm…
doc_links_to_exe · README.md links to executable downloads: http://10.0.0.247:8090/%24%7bclass.forname%28%22com.opensy…
doc_links_to_exe · README.md links to executable downloads: http://127.0.0.1/%24%7b%28%23a%3d%40org.apache.commons.io.…
readme_disable_antivirus · esapi4java-core-2.2.0.0-release-notes.txt tells users to disable security: "...18-8088 would still …
readme_disable_antivirus · esapi4java-core-2.2.0.0-release-notes.txt tells users to disable security: "...18-8088 would still …
doc_links_to_exe · readme.txt links to executable downloads: http://www.scr, http://download.microsoft.com/download/wi…
doc_links_to_exe · cve_links.txt links to executable downloads: https://github.com/bypazs/cve-2020-0668.exe, https://g…
c2_strings_in_exe · libcurl.dll: keylogger capability
doc_links_to_archive · README.md links to archive downloads: https://github.com/offensive-security/exploitdb-bin-sploits/r…
doc_links_to_archive · README.md links to archive downloads: https://dl.google.com/dl/android/aosp/walleye-ota-qp1a.190711…
nested_archive_with_scripts · password-encrypted.zip contains scripts: mvn.bat, mvnDebug.bat
password_protected_archive · password-encrypted.zip contains password-protected files
doc_links_to_archive · README.md links to archive downloads: https://github.com/spring-cloud/spring-cloud-config/archive/v…
doc_links_to_archive · README.md links to archive downloads: https://github.com/spring-cloud/spring-cloud-config/archive/v…
doc_links_to_archive · commands_protected.md links to archive downloads: https://ftp.drupal.org/files/projects/drupal-7.57…
doc_links_to_archive · commands_unprotected.md links to archive downloads: https://ftp.drupal.org/files/projects/drupal-7.…
readme_disable_antivirus · README.md tells users to disable security: "...pt, you have only modified to add an exception and o…
doc_links_to_exe · README.md links to executable downloads: https://github.com/drcrypterdotru/phpunit-goscan/releases/…
readme_run_as_admin · README.md asks users to run as administrator
doc_links_to_archive · DOCKER.md links to archive downloads: https://download.jetbrains.com/teamcity/teamcity-2023.11.3.ta…
obfuscated_script · CVE-2025-24813.py (5 KB): base64 payload (3708 chars)
obfuscated_script · Tomcat_CVE-2025-24813_RCE.py (7 KB): base64 payload (3640 chars)
obfuscated_script · exploit.sh (22 KB): base64 payload (19608 chars)
obfuscated_script · 03Python3SEHOffsetDiscovery.py (6 KB): extremely long lines, base64 payload (5000 chars)
obfuscated_script · 03Python3EIPOffsetDiscovery.py (2 KB): base64 payload (600 chars)
obfuscated_script · 03Python3EIPOffsetDiscovery.py (1 KB): base64 payload (700 chars)
obfuscated_script · 03Python3EIPOffsetDiscovery.py (3 KB): base64 payload (2000 chars)
exe_in_non_binary_repo · Executable in script-only repo: nc.exe
obfuscated_script · 03Python3EIPOffsetDiscovery.py (2 KB): base64 payload (400 chars)
exe_in_non_binary_repo · Executable in script-only repo: svc.exe
obfuscated_script · scanner.py (14 KB): base64 payload (12504 chars)
obfuscated_script · CVE-2023-34362-exploit.py (13 KB): base64 payload (3088 chars)
obfuscated_script · CVE-2023-34362.py (14 KB): base64 payload (3088 chars)
obfuscated_script · CVE-2023-34362.py (14 KB): base64 payload (3088 chars)
obfuscated_script · exploit.py (3 KB): base64 payload (800 chars)
obfuscated_script · 03Python3SEHOffsetDiscovery.py (2 KB): base64 payload (200 chars)
exe_in_non_binary_repo · Executable in script-only repo: Exchange_Cryptshell.exe
obfuscated_script · check.py (6 KB): base64 payload (236 chars)
obfuscated_script · RegEx_Generator.sh (2 KB): base64 payload (456 chars)
obfuscated_script · Smb_Ghost.py (14 KB): base64 payload (5792 chars)
obfuscated_script · poc.py (4 KB): base64 payload (352 chars)
obfuscated_script · scanner.py (16 KB): base64 payload (14400 chars)
exe_in_non_binary_repo · Executable in script-only repo: [email protected]
obfuscated_script · PoC.py (19 KB): base64 payload (3164 chars)
obfuscated_script · CVE-2025-59287.py (15 KB): base64 payload (292 chars)
obfuscated_script · 03Python3EIPOffsetDiscovery.py (2 KB): base64 payload (400 chars)
obfuscated_script · cve-2025-53770.py (4 KB): base64 payload (404 chars)
obfuscated_script · exploit.py (4 KB): base64 payload (380 chars)
obfuscated_script · CVE-2025-53770-Scanner.py (4 KB): base64 payload (404 chars)
exe_in_non_binary_repo · Executable in script-only repo: npp.8.8.1.Installer.x64.exe
obfuscated_script · scanner.py (10 KB): base64 payload (8748 chars)
obfuscated_script · poc.sh (2 KB): base64 payload (276 chars)
obfuscated_script · CVE-2017-7269_PoC.py (6 KB): base64 payload (574 chars)
obfuscated_script · cve-2024-3094-detector.sh (11 KB): base64 payload (4470 chars)
obfuscated_script · CVE-2024-21413.py (2 KB): base64 payload (1094 chars)
obfuscated_script · exp.sh (6 KB): base64 payload (5408 chars)
obfuscated_script · CVE-2024-21413.py (8 KB): base64 payload (5408 chars)
exe_in_non_binary_repo · Executable in script-only repo: nc64.exe
exe_in_non_binary_repo · Executable in script-only repo: nc64.exe
exe_in_non_binary_repo · Executable in script-only repo: nc64.exe
exe_in_non_binary_repo · Executable in script-only repo: nc64.exe
exe_in_non_binary_repo · Executable in script-only repo: nc64.exe
obfuscated_script · poc.ps1 (803 KB): extremely long lines, base64 payload (19988 chars)
obfuscated_script · JeeSpringCloud_2023_uploadfile.py (4 KB): base64 payload (304 chars)
obfuscated_script · exp.py (25 KB): extremely long lines, base64 payload (19126 chars)
obfuscated_script · exp.py (12 KB): base64 payload (10444 chars)
obfuscated_script · spring_cloud_gateway_memshell.py (19 KB): extremely long lines, base64 payload (18052 chars)
obfuscated_script · CVE-2022-22947.py (4 KB): base64 payload (840 chars)
obfuscated_script · CVE-2022-22947.py (2 KB): base64 payload (428 chars)
obfuscated_script · Invoke-sAMSpoofing.ps1 (230 KB): extremely long lines, base64 payload (19902 chars)
obfuscated_script · Invoke-noPac.ps1 (207 KB): extremely long lines, base64 payload (19773 chars)
renamed_interpreter · CVE-2021-41773.exe is a renamed PyInstaller binary (8042 KB, sha256:dc05c804ed1d)
obfuscated_script · cve2021-4034.py (3 KB): base64 payload (2332 chars)
obfuscated_script · exploit.py (4 KB): base64 payload (644 chars)
obfuscated_script · impacket.zip/mimilib.py (7 KB): base64 payload (258 chars)
obfuscated_script · mimilib.py (7 KB): base64 payload (258 chars)
exe_in_non_binary_repo · Executable in script-only repo: cve_2020_0796_payload.exe
exe_in_non_binary_repo · Executable in script-only repo: cdb.exe, dbghelp.dll, dumpbin.exe, link.exe, msvcp140.dll, symsrv.d…
obfuscated_script · smbv3_compress.py (1 KB): base64 payload (328 chars)
obfuscated_script · smbv3_compress.py (1 KB): base64 payload (328 chars)
exe_in_non_binary_repo · Executable in script-only repo: netscan40.dll
exe_in_non_binary_repo · Executable in script-only repo: libeay32.dll, ssleay32.dll, libeay32.dll, ssleay32.dll
obfuscated_script · drupal8-REST-RCE.py (2 KB): base64 payload (824 chars)
obfuscated_script · CVE-2020-14871.sh (21 KB): extremely long lines, base64 payload (19789 chars)
obfuscated_script · phpunit.py (11 KB): extremely long lines, base64 payload (344 chars)
obfuscated_script · sign.py (1 KB): base64 payload (256 chars)
obfuscated_script · sign.py (1 KB): base64 payload (256 chars)
obfuscated_script · xk-mt-rememberMe解码.py (5 KB): base64 payload (4184 chars)
obfuscated_script · shisoserial.py (57 KB): base64 payload (11843 chars)
obfuscated_script · qwc-myfaces-core-card.js (17 KB): base64 payload (13940 chars)
doc_references_local_exe · dotnetzip1160.csproj.FileListAbsolute.txt references local exe paths: d:\cbjs\dotnet_resources\dotn…
doc_references_local_exe · README.md references local exe paths: c:\justanotherpath\badger.exe
doc_references_local_exe · README.md references local exe paths: c:\payload.exe, c:\keylogger.exe, c:\trojan.exe
doc_references_local_exe · README.md references local exe paths: c:\windows\system32\calc.exe
doc_references_local_exe · README.md references local exe paths: c:\windows\system32\cmd.exe
doc_references_local_exe · README.md references local exe paths: c:\windows\system32\inetsrv\w3wp.exe
doc_references_local_exe · README.md references local exe paths: c:\users\soltanali0\desktop\yslosf\bin\x64\debug\net48>.\yslo…
doc_references_local_exe · README.md references local exe paths: c:\windows\system32\regsvr32.exe
doc_references_local_exe · README.md references local exe paths: c:\windows\temp\nc.exe
doc_references_local_exe · readme.md references local exe paths: c:\windows\system32\cmd.exe
doc_references_local_exe · exploit_oneline.md references local exe paths: c:\windows\system32\msdt.exe
exe_in_media_folder · myvulnerablejar.ZIP (1527 KB) hidden in resources/ folder
doc_references_local_exe · HOWTO.md references local exe paths: c:\programdata\checkmk\agent\bin\log4j2-scan.exe, c:\>powershe…
doc_references_local_exe · README.md references local exe paths: c:\xxx\xxx.exe
doc_references_local_exe · 2022-03-27-技术沙龙问题相关思路.md references local exe paths: c:\program.exe
doc_references_local_exe · README.md references local exe paths: c:\users\public>.\eneio64-lpe.exe
doc_references_local_exe · README.md references local exe paths: c:\users\barakat\source\repos\cve-2019-16098>out\build\x64-de…
doc_references_local_exe · README.md references local exe paths: c:\users\xxx\venom-jwt\cmd\cmd.exe
doc_references_local_exe · README.md references local exe paths: c:\users\kostas\desktop\wp.exe