{"uuid": "1a42841d-9097-48b5-b173-34a3cdb50f55", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-44193", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/8979", "content": "Tools - Hackers Factory \n\nGitHub - RevoltSecurities/Subdominator: SubDominator helps you discover subdomains associated with a target domain efficiently and with minimal impact for your Bug Bounty\n\nhttps://github.com/RevoltSecurities/Subdominator\n\nGitHub - mbog14/CVE-2024-44193: Hacking Windows through iTunes\u200a - Local Privilege Escalation 0-day\n\nhttps://github.com/mbog14/CVE-2024-44193\n\nExport to GBounty is a Burp Suite extension that enables users to export selected HTTP requests from Burp Suite into a compressed ZIP file. The exported ZIP file can be utilized with the GBounty scanner.\n\nhttps://github.com/BountySecurity/export-to-gbounty\n\nGitHub - doyensec/CSPTPlayground: CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).\n\nhttps://github.com/doyensec/CSPTPlayground\n\nSQL Injection Polyglots / nastystereo.com\n\nhttps://nastystereo.com/security/sqli-polyglots.html\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-11-04T03:37:04.000000Z"}