{"uuid": "5ad4da28-96b2-4bc6-a348-4317c9e12b10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-38077", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3667", "content": "Tools - Hackers Factory \n\nApplication to comfortably monitor your Internet traffic\n\nhttps://github.com/GyulyVGC/sniffnet\n\nOSINT CHEAT SHEET Tools &amp; Methods\n\nhttps://github.com/NotLoBi/NotLoBi\n\nHookchain\n\nhttps://github.com/helviojunior/hookchain\n\nUnwaf is a Go tool designed to help identify WAF bypasses using passive techniques, such as: SPF records and DNS history. By default, Unwaf will check SPF records.\n\nhttps://github.com/mmarting/unwaf\n\nOpenHaystack is a framework for tracking personal Bluetooth devices via Apple's massive Find My network. Use it to create your own tracking tags that you can append to physical objects (keyrings, backpacks, ...) or integrate it into other Bluetooth-capable devices such as notebooks.\n\nhttps://github.com/seemoo-lab/openhaystack\n\nCobalt Strike beacon object files (BOFs) is a feature that was added to the beacon in order to allow rapid beacon extendibility in a more OPSEC way.\n\nhttps://github.com/securifybv/Visual-Studio-BOF-template\n\nCVE-2024-38077-EXP\n\nhttps://github.com/CloudCrowSec001/CVE-2024-38077-POC/tree/main\n\nDockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.\n\nhttps://github.com/UndeadSec/DockerSpy\n\nUltimate Hardware Hacking Gear Guide\n\nhttps://github.com/jcldf/ultimate-hardware-hacking-gear-guide-\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-08-12T02:29:08.000000Z"}