{"uuid": "403387d4-b16b-4b11-8e14-50bde3e9a845", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-38146", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3193", "content": "Hackers Factory \n\nCloud Metadata Dictionary useful for SSRF Testing \u00b7 GitHub\n\nhttps://gist.github.com/BuffaloWill/fa96693af67e3a3dd3fb \n\nAI-powered cybersecurity chatbot designed to provide helpful and accurate answers to your cybersecurity-related queries and also do code analysis and scan analysis.\n\nhttps://github.com/morpheuslord/HackBot\n\nbug-bounty/methodology/01-recon.md at master \u00b7 JakobTheDev/bug-bounty\n\nhttps://github.com/JakobTheDev/bug-bounty/blob/master/methodology/01-recon.md\n\nKasperskyLab/TinyCheck: TinyCheck allows you to easily capture network communications from a smartphone or any device which can be associated to a Wi-Fi access point in order to quickly analyze them. This can be used to check if any suspect\n\nhttps://github.com/netstalking-core/netstalking-osint\n\nA fully configurable and extendable Bash obfuscation framework. This tool is intended to help both red team and blue team.\n\nhttps://github.com/Bashfuscator/Bashfuscator\n\nOld Twint style, but zero fat.\n\nhttps://github.com/twintproject/twint-zero\n\nProof-of-Concept for CVE-2023-38146 (\"ThemeBleed\")\n\nhttps://github.com/gabe-k/themebleed\n\nHostHunter a recon tool for discovering hostnames using OSINT techniques.\n\nhttps://github.com/SpiderLabs/HostHunter\n\nOndrik8/RED-Team\n\nhttps://github.com/Ondrik8/RED-Team\n\nAn awesome list of honeypot resources\n\nhttps://github.com/paralax/awesome-honeypots\n\n#infosec #cybersecurity #hackersfactory \n\nhttps://t.me/dilagrafie", "creation_timestamp": "2023-09-16T20:31:38.000000Z"}