{"uuid": "2f4ec9d3-5d63-401e-ab8b-30a8af60c91e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-45067", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/2115", "content": "WPRecon (Wordpress Recon)\n\nWPRecon, is a tool for the recognition of vulnerabilities and blackbox information for wordpress.\n\nWe can use wprecon to recognize the versions of plugins, themes, and wordpress core, in addition to counting users, and waf (web application firewall).\n\nThe purpose of this tool is just to help developers find possible loopholes in their systems/wordpress sites.\n\nhttps://github.com/AngraTeam/wprecon\n\n\u200b\u200bNuclei template CVE-2022-40684\n\nhttps://github.com/NagliNagli/BountyTricks/blob/main/CVE-2022-40684.yaml\n\n#cve\n\n\u200b\u200bChopper payload smuggling\n\nPorted the pascal version to C#, and becomes even better while smuggling the payload using Created Service DisplayName \ud83d\udc47\n\nThe tool would create random service, smuggle the payloads chunks through the windows service display name, and write/decode/execute the final payload.\n\nhttps://github.com/0xsp-SRD/0xsp.com/tree/main/chopper\n\nDetails:\nhttps://ired.dev/discussion/13/chopper-payload-smuggling/p1?new=1\n\n\u200b\u200bCVE-2021-45067\n\nThis bug was Out of Bounds Read caused by treating ANSI string as Unicode which can be exploited to leak sensitive information from the sandboxed adobe reader process.\n\nhttps://github.com/hacksysteam/CVE-2021-45067\n\n#cve\n\n\u200b\u200bOpenBackdoor\n\nOpenBackdoor is an open-source toolkit for textual backdoor attack and defense, which enables easy implementation, evaluation, and extension of both attack and defense models.\n\nhttps://github.com/thunlp/OpenBackdoor\n\n\u200b\u200bSharpAgent\n\nC# havoc implant\n\nA .NET Framework test agent for Havoc C2. I just wanna learn how to make c2 implants. Will receive updates for now.\n\nJust modify the handler to your teamserver. Also it's probably really buggy right now.\n\nhttps://github.com/susMdT/SharpAgent/\n\n\u200b\u200bPsyloDbg\n\nPsyloDbg is a very simple Windows Debugger that currently only monitor for debug events:\n\n\u25ab\ufe0f Exception\n\u25ab\ufe0f Create Thread\n\u25ab\ufe0f Create Process\n\u25ab\ufe0f Exit Thread\n\u25ab\ufe0f Exit Process\n\u25ab\ufe0f Load DLL\n\u25ab\ufe0f Unload DLL\n\u25ab\ufe0f Debug String\n\u25ab\ufe0f RIP\n\nhttps://github.com/DarkCoderSc/PsyloDbg\n\n\u200b\u200bmatano\n\nMatano is an open source security lake platform for AWS. It lets you ingest petabytes of security and log data from various sources, store and query them in an open Apache Iceberg data lake, and create Python detections as code for realtime alerting. Matano is fully serverless and designed specifically for AWS and focuses on enabling high scale, low cost, and zero-ops. Matano deploys fully into your AWS account.\n\nhttps://github.com/matanolabs/matano\n\n\u200b\u200bRedEye\n\nRedEye is an open-source analytic tool developed by CISA and DOE\u2019s Pacific Northwest National Laboratory to assist Red Teams with visualizing and reporting command and control activities. This tool, released in October 2022 on GitHub, allows an operator to assess and display complex data, evaluate mitigation strategies, and enable effective decision making in response to a Red Team assessment. \n\nThe tool parses logs, such as those from Cobalt Strike, and presents the data in an easily digestible format. The users can then tag and add comments to activities displayed within the tool. The operators can use the RedEye\u2019s presentation mode to present findings and workflow to stakeholders.\n\nhttps://github.com/cisagov/RedEye\n\n\u200b\u200bLocksmith\n\nA tool to identify and remediate common misconfigurations in Active Directory Certificate Services\n\nhttps://github.com/TrimarcJake/Locksmith\n\n\u200b\u200bosintui\n\nOpen Source Intelligence Terminal User Interface\n\nhttps://github.com/wssheldon/osintui\n\n#OSINT\n\n\u200b\u200bGhauri\n\nAn advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws\n\nhttps://github.com/r0oth3x49/ghauri\n\n\u200b\u200bThe Soaring Eagle C2\n\nI developed this tool for whoever wants to learn the basics regarding C2 and Malware Development, it is not intended to be used in real world scenarios and engagements you will get caught guaranteed, I developed it for learning not evasion. \n\nhttps://github.com/ItsCyberAli/The-Soaring-Eagle\n\n\u200b\u200b4/5", "creation_timestamp": "2022-12-11T13:30:21.000000Z"}