{"uuid": "27967953-f2d9-4e1d-a4c4-a0b623fa3c33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40725", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/4004", "content": "#GitHub #Tools\n\nThis Python application is an OSINT (Open Source Intelligence) tool called \"Ominis OSINT - Web Hunter.\" It performs online information gathering by querying Google for search results related to a user-inputted query. The tool extracts relevant information such as titles, URLs, and potential mentions of the query in the results.\n\nhttps://github.com/AnonCatalyst/Ominis-Osint\n\nExploit CVE-2024-40725 (Apache httpd) \n\nhttps://github.com/soltanali0/CVE-2024-40725\n\nHere is the full tool. This BOF can be used to identify processes that hold handles to a given file. This can be useful to identify which process is locking a file on disk.\n\nhttps://github.com/Octoberfest7/enumhandles_BOF\n\nProof-of-concept shellcode loaders that leverage AI/ML primitives in C/C++ and Rust to do some shenanigans prior to shellcode detonation.\n\nhttps://github.com/0xTriboulet/T-1\n\nPendingFileRenameOperations + Junctions EDR Disable\n\nhttps://github.com/rad9800/FileRenameJunctionsEDRDisable\n\n#HackersForum", "creation_timestamp": "2024-12-19T04:13:13.000000Z"}