{"uuid": "31a24990-80a2-4b3f-9a66-b4ff0025a52f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-39063", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3170", "content": "Hackers Factory \n\nOSCP 2023 Preparation Guide | Courses, Tricks, Tutorials, Exercises, Machines\n\nhttps://github.com/rodolfomarianocy/OSCP-Tricks-2023\n\nAwesome list of keywords for Threat Hunting sessions\n\nhttps://github.com/mthcht/ThreatHunting-Keywords\n\nA Curated list of Awesome Python Scripts that Automate Stuffs.\n\nhttps://github.com/hastagAB/Awesome-Python-Scripts\n\nCVE-2023-38389 &lt; Wordpress &lt; JupiterX Core &lt; Unauthenticated Account Takeover\n\nhttps://github.com/codeb0ss/CVE-2023-38389-PoC\n\nSimple EDR that injects a DLL into a process to place a hook on specific Windows API\n\nhttps://github.com/Helixo32/SimpleEDR\n\nCobalt Strike Beacon Object File (BOF) Conversion of the Mockingjay Process Injection Technique\n\nhttps://github.com/ewby/Mockingjay_BOF\n\nRemote Shellcode Injector\n\nhttps://github.com/florylsk/NtRemoteLoad\n\nA Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.\n\nhttps://github.com/almandin/krbjack\n\nDebugAmsi\n\nDebugAmsi is another way to bypass AMSI through the Windows process debugger mechanism.\n\ngithub.com/MzHmO/DebugAmsi\n\nPOC of the CVE-2023-39063\n\nhttps://github.com/AndreGNogueira/CVE-2023-39063 \n\nICSE'23 - CoFuzz: Coordinated hybrid fuzzing framework with advanced coordination mode\n\nhttps://github.com/Tricker-z/CoFuzz\n\n#infosec #cybersecurity #hackersfactory \n\nhttps://t.me/dilagrafie", "creation_timestamp": "2023-08-28T18:21:49.000000Z"}