{"uuid": "49ff5ce7-a361-43d5-b3b8-b8f7940d8e1c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-50379", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/1392", "content": "#Github #Tools\n\nTool for reverse engineering macOS/OS X.\n\nhttps://github.com/steven-michaud/HookCase\n\nCVE-2024-50379: RCE through a race condition in Apache Tomcat\n\nPoC\nhttps://github.com/ph0ebus/Tomcat-CVE-2024-50379-Poc?tab=readme-ov-file\n\nawesome-linux-attack-forensics-purplelabs : Hands-on research around advanced Linux attacks, detection and forensics techniques and tools \n\nhttps://github.com/cr0nx/awesome-linux-attack-forensics-purplelabs\n\nA tool for automating cracking methodologies through Hashcat from the TrustedSec team.\n\nhttps://github.com/trustedsec/hate_crack\n\nCrystalDump : Dump lsass using only NTAPI functions by hand-crafting Minidump files (without MiniDumpWriteDump!!!) : \n\nhttps://github.com/ricardojoserf/NativeDump/tree/crystal-flavour  \n\n#HackersForum", "creation_timestamp": "2024-12-30T05:01:48.000000Z"}