{"uuid": "274a3fdc-47c2-4413-af01-0a81b37f1c67", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-21939", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3172", "content": "Hackers Factory \n\n\"waf-bypass-maker/waf-community-bypasses\"\n\nhttps://github.com/waf-bypass-maker/waf-community-bypasses\n\nCross Platform Telegram based RAT that communicates via telegram to evade network restrictions\n\nhttps://github.com/machine1337/TelegramRAT\n\nA CLI utility to find domain's known subdomains from curated passive online sources.\n\nhttps://github.com/hueristiq/xsubfind3r\n\nAD_Enumeration_Hunt\n\nAD Pentesting Toolkit! This repository contains a collection of PowerShell scripts and commands that can be used for Active Directory (AD) penetration testing and security assessment.\n\nhttps://github.com/alperenugurlu/AD_Enumeration_Hunt\n\nThe MSSqlPwner tool empowers ethical hackers and security professionals to conduct comprehensive security assessments on MSSQL environments.\n\nhttps://github.com/ScorpionesLabs/MSSqlPwner\n\nDNSWatch - DNS Traffic Sniffer and Analyzer\n\nhttps://github.com/HalilDeniz/DNSWatch\n\nPython based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)\n\nhttps://github.com/stuxnet999/EventTranscriptParser\n\nICS attack simulator for the Tennessee Eastman Process. From the NDSS 2024 paper: \"Attributions for ML-based ICS anomaly detection: From theory to practice\"\n\nhttps://github.com/pwwl/tep-attack-simulator\n\nCVE-2023-21939\n\nVulnerability in the Oracle Java SE, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Swing).\n\nhttps://gist.github.com/win3zz/308c6567e38e096c7071d3564ef164ad\n\nUnderstanding WinRAR Code Execution Vulnerability (CVE-2023-38831)\n\nhttps://github.com/knight0x07/WinRAR-Code-Execution-Vulnerability-CVE-2023-38831\n\nautomatically tests prompt injection attacks on ChatGPT instances\n\nhttps://github.com/utkusen/promptmap\n\n#infosec #cybersecurity #hackersfactory \n\nhttps://t.me/dilagrafie", "creation_timestamp": "2023-08-30T13:46:02.000000Z"}