{"uuid": "39f59665-3892-4df1-88de-9dde78ad6908", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5836", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/7561", "content": "Tools - Hackers Factory \n\nAwesome MXSS\n\nhttps://github.com/msrkp/MXSS\n\nA comprehensive curated list of available Bug Bounty &amp; Disclosure Programs and Write-ups.\n\nhttps://github.com/djadmin/awesome-bug-bounty\n\nMulti-threaded CMS BruteForcer to WordPress, Joomla, Drupal, OpenCart\n\nhttps://github.com/OffXec/brutecms\n\nCobalt Strike Beacon Object Files (BOFs) written in rust with rust core and alloc\n\nhttps://github.com/wumb0/rust_bof\n\nA POC exploit for CVE-2024-5836 and CVE-2024-6778, allowing for a sandbox escape from a Chrome extension\n\nhttps://github.com/ading2210/CVE-2024-6778-POC\n\nMaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection\n\nhttps://github.com/MaLDAPtive/Invoke-Maldaptive\n\nA Python static code analyzer that finds complex, remotely exploitable vulnerabilities powered by Claude.\n\nhttps://github.com/protectai/vulnhuntr\n\ndump Chrome cookies remotely with atexec and CDP\n\nhttps://github.com/zimnyaa/remotechrome\n\n#CyberDilara \nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-31T08:37:42.000000Z"}