GitHub - moom825/batch-extention-spoofer: spoof an extension of any file by using U+202E Unicode character
![Group-IB Threat Intelligence on X: "⚡️Group-IB Threat intelligence discovers a new 0-day in #WinRAR used to target traders #CVE-2023-38831 allows TAs to spoof file extensions and hide the launch of malicious script Group-IB Threat Intelligence on X: "⚡️Group-IB Threat intelligence discovers a new 0-day in #WinRAR used to target traders #CVE-2023-38831 allows TAs to spoof file extensions and hide the launch of malicious script](https://pbs.twimg.com/media/F4NHsH3agAA3Zc2.jpg)
Group-IB Threat Intelligence on X: "⚡️Group-IB Threat intelligence discovers a new 0-day in #WinRAR used to target traders #CVE-2023-38831 allows TAs to spoof file extensions and hide the launch of malicious script
GitHub - Loubaris/Extension-Spoofer: Spoof your payloads/codes extensions into safe extensions | FUD
![Anti-analysis technique for PE Analysis Tools –INT Spoofing– - JPCERT/CC Eyes | JPCERT Coordination Center official Blog Anti-analysis technique for PE Analysis Tools –INT Spoofing– - JPCERT/CC Eyes | JPCERT Coordination Center official Blog](https://blogs.jpcert.or.jp/en/.assets/test_resultfig4.png)