{"uuid": "36ee1302-2243-41e1-a85a-c3bb4b078105", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-0230", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/171", "content": "Tools - Hackers Factory\n\nRace conditions primitives on speculatively executed code paths (GhostRace)\n\nPaper: https://www.vusec.net/projects/ghostrace/\nWebsite: https://www.vusec.net/projects/ghostrace\nPoC: https://github.com/vusec/ghostrace\n\nBluetooth keystroke injection affecting various OS (CVE-2023-45866, CVE-2024-21306, and CVE-2024-0230) by Marc Newlin\u00a0 \n\nBlog post: https://github.com/skysafe/reblog/blob/main/cve-2024-0230/README.md\nPoC: https://github.com/marcnewlin/hi_my_name_is_keyboard\n\n#bluetooth\n\nComprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reduction (ASR) rules without Admin privileges\n\nhttps://github.com/0xsp-SRD/MDE_Enum\n\nWiFi Penetration Testing &amp; Auditing Tool \n\nhttps://github.com/FLOCK4H/Freeway\n\nbin2ml\u00a0is a command line tool to extract machine learning ready data from software binaries.\n\ngithub.com/br0kej/bin2ml\n\nPython tool for continuous password spraying taking into account the password policy.\n\nhttps://github.com/login-securite/conpass\n\nWeb vulnerability scanner written in Python3 \n\nhttps://github.com/wapiti-scanner/wapiti\n\nZip Slip Vulnerability (Arbitrary file write through archive extraction) \n\nhttps://github.com/snyk/zip-slip-vulnerability/\n\nTunnel TCP connections through a file \n\nhttps://github.com/fiddyschmitt/File-Tunnel?tab=readme-ov-file\n\nA collection of USB hacking\u2013related links.\n\nhttps://github.com/xairy/usb-hacking/blob/master/LINKS.md\n\n#HackersFactory", "creation_timestamp": "2024-06-17T14:10:51.000000Z"}