{"uuid": "2a390f9a-eb46-4f09-8bdb-bc84da9939bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-23808", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/2928", "content": "Tools - Hackers Factory \n\n\u200b\u200bSSHLog\n\nA free, source-available Linux daemon written in C++ and Python that passively monitors #OpenSSH servers via eBPF to:\ud83d\udc47\n\nhttps://github.com/sshlog/agent\n\n\u200b\u200bParallels Desktop VM Escape\n\nThis repository contains an exploit for a Parallels Desktop vulnerability which has been assigned CVE-2023-27326. This vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop.\n\nhttps://github.com/Malwareman007/CVE-2023-27326\n\n#infosec #cve #pentesting\n\n\u200b\u200bCVE-2023-28231\n\nDHCP Server Remote Code Execution impact: 2008 R2 SP1 \u0434\u043e Server 2019\n\nhttps://github.com/glavstroy/CVE-2023-28231\n\n#cybersecurity #infosec #cve\n\n\u200b\u200bCVE-2022-23808\n\nphpMyAdmin Exploit\n\nhttps://github.com/dipakpanchal456/CVE-2022-23808\n\n#cve #infosec #pentesting\n\n\u200b\u200bAPTRS\n\nAutomated Penetration Testing Reporting System is an automated reporting tool in Python and Django. The tool allows Penetration testers to create a report directly without using the Traditional Docx file. It also provides an approach to keeping track of the projects and vulnerabilities.\n\nhttps://github.com/JapneetRajput/RedTeaming\n\n#cybersecurity #infosec #pentesting\n\n\u200b\u200bRootKits List Download\n\nThis is the list of all rootkits found so far on github and other sites.\n\nhttps://github.com/d30sa1/RootKits-List-Download\n\n#infosec #pentesting #redteam\n\n\u200b\u200bspotexfil (status: prototype)\n\nA simple attempt to exfiltrate data using spotify API, 300 bytes at a time. We can read a mini file (payload) and encode it inside a playlist description field via Spotify API. Really MVP/prototype, not meant for large files.\n\nhttps://github.com/sourcefrenchy/spotexfil\n\n#infosec #pentesting #redteam\n\n\u200b\u200bshellcode_exec_workerfactory\n\nJust another shellcode execution technique.\n\nhttps://gist.github.com/RistBS/fd4243d6df142d197920e2b72baa3cdd\n\n#infosec #pentesting #redteam\n\n\u200b\u200bAwesome Cobalt Strike\n\n\u2022 The first part is a collection of quality articles about Cobalt Strike.\n\u2022 The third part is about the integration of the new features BOF resources.\n\u2022 This project is to solve the problem of not finding the right aggressor script or BOF when it is needed.\n\nhttps://github.com/zer0yu/Awesome-CobaltStrike\n\n#infosec #pentesting #redteam\n\n\u200b\u200bHacking Neural Networks\n\nThis is a short introduction on methods that use neural networks in an offensive manner (bug hunting, shellcode obfuscation, etc.) and how to exploit neural networks found in the wild (information extraction, malware injection, backdooring, etc.).\n\nhttps://github.com/tigthor/neural-network-hacking\n\n#infosec #pentesting #redteam\n\n\u200b\u200bOffensive Security Tools\n\nHere you will find a useful collection of commands and file resource locations used in Pentesting operations. This reference is will go hand in hand with Kali Linux and the OSCP.\n\nhttps://github.com/Totes5706/Offensive-Security-Cheat-Sheet\n\n#infosec #pentesting #redteam\n\n\u200b\u200bSocialhunte\n\nCrawls the website and finds broken social media links that can be hijacked.\n\nhttps://github.com/utkusen/socialhunter\n\n#pentesting #redteam #bugbounty\n\n\u200b\u200bJustRepository RedTeam\n\nThese are repository for tools and code I modify and compile for fun (?). Note that \"use this for educational purposes only\".\n\nhttps://github.com/dxnboy/redteam\n\n#infosec #pentesting #redteam\n\n\u200b\u200bPenny Testing Tools\n\nA combination of Offensive Security tools and scripts for Red Teamers &amp; Penetration Testers.\n\nhttps://github.com/zruvv/OffensiveSecurity\n\n#infosec #pentesting #redteam\n\n\u200b\u200bOSCP personal cheatsheet\n\nhttps://github.com/Luizfsn/offensive-security-practices-cheatsheet\n\n#infosec #pentesting #redteam\n\n\u200b\u200bVulnerable-AD\n\nCreate a vulnerable active directory that's allowing you to test most of active directory attacks in local lab.\n\nhttps://github.com/WazeHell/vulnerable-AD\n\n#cybersecurity #infosec #pentesting\n\nhttps://t.me/dilagrafie\nhttps://t.me/HackerFactory", "creation_timestamp": "2023-05-07T16:32:40.000000Z"}