{"uuid": "40868315-8315-4ce4-9b4d-d36684812da1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-30088", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/8676", "content": "Tools  - Hackers Factory \n\nTookie-osint has a simple-to-use UI and is really straightforward. The main idea of Tookie-osint is to discover usernames that are requested from an input.\n\nhttps://github.com/Alfredredbird/tookie-osint\n\n#CyberDilara\n\nGPU poisoning; hide the payload inside the gpu memory.\n\nhttps://github.com/H1d3r/GPU_ShellCode\n\nThis is a simple obfuscator for WireGuard. It is designed to make it harder to detect WireGuard traffic by making it look like something else.\n\nhttps://github.com/ClusterM/wg-obfuscator\n\nSploitScan is a powerful and user-friendly tool designed to streamline the process of identifying exploits for known vulnerabilities and their respective exploitation probability.\n\nhttps://github.com/xaitax/SploitScan\n\nA shellcode runner write in Rust use\n\nhttps://github.com/b1tg/rs-shellcode\n\nKernel exploit for Xbox SystemOS using CVE-2024-30088\n\nhttps://github.com/exploits-forsale/collateral-damage\n\nZip Slip Vulnerability in .a Static Library Files.  Since the implemented measure can be bypassed, the vulnerability allows an attacker to extract files to any desired location within the server running #MobSF.\n\nhttps://github.com/MobSF/Mobile-Security-Framework-MobSF/security/advisories/GHSA-4hh3-vj32-gr6j\n\nPython script to monitor your target continuously for new subdomains.\n\nhttps://github.com/faiyazahmad07/monitor_subdomains\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-08-27T09:08:21.000000Z"}