{"uuid": "4ef194d7-ed24-41ba-b229-bb419fadebed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-41717", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3174", "content": "Hackers Factory \n\nA modern tool written in Python that automates your xss findings.\n\nhttps://github.com/faiyazahmad07/xss_vibes\n\nThis repository is to provide a write-up and PoC for CVE-2023-41717.\n\nhttps://github.com/federella/CVE-2023-41717\n\nExploring the Ingenious Utilization of Overwolf's Overlay Framework While Preserving its Native Window Flags. Employing SetWindowsHookEx for Acquiring Keyboard and Mouse Inputs.\n\nhttps://github.com/SurgeGotTappedAgain/Window-Hijack\n\nReal fucking shellcode encryption tool.\n\nhttps://github.com/nickvourd/Supernova\n\nSome of my rough notes for Docker threat detection\n\nhttps://github.com/Antonlovesdnb/DockerDetectionNotes\n\nDigital Forensics Incident Response and Detection engineering\n\nhttps://github.com/adrianlois/DFIR-Detection-Engineering\n\nMaking Favicon.ico based Recon Great again \n\nhttps://github.com/devanshbatham/FavFreak\n\nCVE-2023-36874 PoC\n\nhttps://github.com/d0rb/CVE-2023-36874\n\nA tool for enumerating potential hosts that are open to GSSAPI abuse within Active Directory networks\n\nhttps://github.com/CCob/gssapi-abuse\n\nA collection of companies that disclose adversary TTPs after they have been breached\n\nhttps://github.com/BushidoUK/Breach-Report-Collection\n\nGenerate Live Verizon Phone Numbers from carrier.\n\nhttps://github.com/cyboghost/Numgen-Ultimate\n\n#infosec #cybersecurity #hackersfactory \n\nhttps://t.me/dilagrafie", "creation_timestamp": "2023-09-01T11:58:49.000000Z"}