{"uuid": "04866ad9-bc62-43f7-a496-542098023d96", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5836", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/601", "content": "Tools - Hackers Factory \n\nLTESniffer - An Open-source LTE Downlink/Uplink Eavesdropper \n\nhttps://github.com/SysSec-KAIST/LTESniffer\n\nA POC exploit for CVE-2024-5836 and CVE-2024-6778, allowing for a sandbox escape from a Chrome extension : \n\nhttps://github.com/ading2210/CVE-2024-6778-POC\n\nRecoverPy : Recover overwritten or deleted data : \n\nhttps://github.com/PabloLec/RecoverPy\n\nProjects for security students\n\nhttps://github.com/kurogai/100-redteam-projects\n\nIn-depth repository of Telegram OSINT resources covering, tools, techniques &amp; tradecraft.\n\nhttps://github.com/The-Osint-Toolbox/Telegram-OSINT\n\nGet Active Directory ports with PowerShell\n\nhttps://4sysops.com/archives/get-active-directory-ports-with-powershell/\n\nProof-of-Concept for CVE-2024-46538\n\nhttps://github.com/EQSTLab/CVE-2024-46538\n\nBeginners intro to Linux kernel exploitation (CTF challenge)\n\nhttps://gum3t.xyz/posts/a-gau-hack-from-euskalhack/\n\n#CyberDilara \nhttps://t.me/CyberDilara", "creation_timestamp": "2024-11-01T04:43:11.000000Z"}