{"uuid": "3b259f2b-75cf-42d7-90ea-ec77085d0624", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-49113", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/7911", "content": "#Github #Tools \n\nCreate agents that monitor and act on your behalf. Your agents are standing by!\n\nhttps://github.com/huginn/huginn\n\nStalk your Friends. Find their Instagram, FB and Twitter Profiles using Image Recognition and Reverse Image Search.\n\nhttps://github.com/ThoughtfulDev/EagleEye\n\nCVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overflow exploit\n\nhttps://github.com/absholi7ly/CVE-2025-0282-Ivanti-exploit\n\nA high-performance port spoofing tool built in Rust. Confuse port scanners with dynamic service emulation across all ports. Features customizable signatures, efficient async handling, and easy traffic redirection.\n\nhttps://github.com/vxfemboy/ghostport\n\nLdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113\n\nhttps://github.com/SafeBreach-Labs/CVE-2024-49113\n\n#HackersFactory", "creation_timestamp": "2025-01-14T12:33:29.000000Z"}