{"uuid": "46015aef-5b75-4dee-b309-d9a2982648d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-43684", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3117", "content": "Tools \ud83d\udd27 \ud83d\udd28 \ud83d\udd27  - Hackers Factory\n\n\u200b\u200bCVE-2023-24488\n\nThe provided script is a Ruby script used to check and detect the CVE-2023-24488 security vulnerability in Citrix Gateway and Citrix ADC.\n\nhttps://github.com/Abo5/CVE-2023-24488\n\n#cve #cybersecurity #infosec\n\nrusty-radamsa\n\nRusty Radamsa is a general purpose fuzzer. It modifies given sample data in ways, which might expose errors in programs intended to process the data.\n\nhttps://github.com/microsoft/rusty-radamsa\n\n#cybersecurity #infosec\n\n\u200b\u200bInvoke-Pre2kSpray\n\nModified DomainPasswordSpray version to enumerate machine accounts and perform a pre2k password spray.\n\nhttps://github.com/eversinc33/Invoke-Pre2kSpray\n\n#infosec #pentesting #redteam\n\n\u200b\u200bCVE-2022-43684\n\nServicenow insecure access control leading to administrator account takeover.\n\nhttps://github.com/lolminerxmrig/CVE-2022-43684\n\n#cve #cybersecurity #infosec\n\n\u200b\u200bCVE-2023-34839\n\nCross Site Request Forgery vulnerability in Issabel issabel-pbx v.4.0.0-6 allows a remote attacker to gain privileges via the a Custom CSRF exploit to create new user function in that application.\n\nhttps://github.com/sahiloj/CVE-2023-34839\n\n#cve #cybersecurity #infosec\n\n\u200b\u200bBackdoor-exploit-python\n\nBackdoor exploit program which helps an user to get information from any user when deployed to the target machine.\n\nhttps://github.com/vaibhavbais007/Backdoor-exploit-python-program\n\n#infosec #pentesting #redteam\n\n\u200b\u200bbouheki\n\nKRSI (eBPF+LSM) based Linux security auditing tool. Security events can be audited and blocked based on the container of the process, and restrictions can be applied to container environments.\n\nhttps://github.com/mrtc0/bouheki\n\n#cybersecurity #infosec\n\n\u200b\u200bgoogleSearcher\n\nA custom Google search (to bypass some limitations on Google with regards to timeouts, vpns etc).\n\nhttps://github.com/AssassinUKG/googleSearcher\n\n#infosec #pentesting #bugbounty\n\nFind GraphQL API vulnerabilities, with Burp Suite Professional\n\nhttps://portswigger.net/blog/find-graphql-api-vulnerabilities-with-burp-suite-professional\n\nGraphQL Portswigger Challenges Writeups\n\nhttps://axon-xerox.medium.com/graphql-portswigger-challenges-writeups-4ed15c832483\n\nBest free AI Image Editing Tools\n\nLEDITS https://huggingface.co/spaces/editing-images/ledits\nUNCROP https://clipdrop.co/uncrop\nMicrosoft Designer https://designer.microsoft.com/\nStable Diffusion Inpainting https://huggingface.co/spaces/runwayml/stable-diffusion-inpainting\nAdobe Firefly AI https://firefly.adobe.com/generate/inpaint\nDragGAN  https://huggingface.co/spaces/radames/DragGan\n\n#infosec #cybersecurity \n\nhttps://t.me/dilagrafie", "creation_timestamp": "2023-07-07T10:44:24.000000Z"}