![Group-IB Threat Intelligence on X: "⚡️Group-IB Threat intelligence discovers a new 0-day in #WinRAR used to target traders #CVE-2023-38831 allows TAs to spoof file extensions and hide the launch of malicious script Group-IB Threat Intelligence on X: "⚡️Group-IB Threat intelligence discovers a new 0-day in #WinRAR used to target traders #CVE-2023-38831 allows TAs to spoof file extensions and hide the launch of malicious script](https://pbs.twimg.com/media/F4NHsH3agAA3Zc2.jpg)
Group-IB Threat Intelligence on X: "⚡️Group-IB Threat intelligence discovers a new 0-day in #WinRAR used to target traders #CVE-2023-38831 allows TAs to spoof file extensions and hide the launch of malicious script
![Binni Shah on X: "Lizard : Extension spoofer and reveser shell generator (Malicious file generator using RTLO technique to spoof extensions) : https://t.co/RgRuAA16ue cc @linux_choice https://t.co/GD87KDbPNF" / X Binni Shah on X: "Lizard : Extension spoofer and reveser shell generator (Malicious file generator using RTLO technique to spoof extensions) : https://t.co/RgRuAA16ue cc @linux_choice https://t.co/GD87KDbPNF" / X](https://pbs.twimg.com/media/EV-wOPQWoAIiuKa.png)
Binni Shah on X: "Lizard : Extension spoofer and reveser shell generator (Malicious file generator using RTLO technique to spoof extensions) : https://t.co/RgRuAA16ue cc @linux_choice https://t.co/GD87KDbPNF" / X
GitHub - moom825/batch-extention-spoofer: spoof an extension of any file by using U+202E Unicode character
GitHub - Loubaris/Extension-Spoofer: Spoof your payloads/codes extensions into safe extensions | FUD
![Anti-analysis technique for PE Analysis Tools –INT Spoofing– - JPCERT/CC Eyes | JPCERT Coordination Center official Blog Anti-analysis technique for PE Analysis Tools –INT Spoofing– - JPCERT/CC Eyes | JPCERT Coordination Center official Blog](https://blogs.jpcert.or.jp/en/.assets/test_resultfig4.png)