{"uuid": "5b53bcfe-c590-49e7-a259-12b821c1f1a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-25157", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3161", "content": "Hackers Factory \n\nGrype\n\nA vulnerability scanner for container images and filesystems. Easily install the binary to try it out. Works with Syft, the powerful SBOM (software bill of materials) tool for container images and filesystems.\n\nhttps://github.com/anchore/grype\n\n#cybersecurity #infosec #best\n\nCatSniffer\n\nCatSniffer is an original multiprotocol, and multiband board made for sniffing, communicating, and attacking IoT (Internet of Things) devices. It was designed as a highly portable USB stick that integrates the new chips TI CC1352, Semtech SX1262, and Microchip SAMD21E17.\n\nhttps://github.com/ElectronicCats/CatSniffer\n\n#cybersecurity #infosec #pentesting\n\nCVE-2023-25157 \n\nGeoServer SQL Injection - PoC.\n\nhttps://github.com/win3zz/CVE-2023-25157\n\n#cve #cybersecurity #infosec\n\nSYSCALL_API\n\nsyscall_api.asm block is used for dynamically finding the syscall number (SN) inside a function body and performing a manual syscall with the found SN.\n\nhttps://github.com/EgeBalci/syscall_api\n\n#cybersecurity #infosec\n\nEbpfguard\n\nRust library for writing Linux security policies using eBPF.\n\nhttps://github.com/deepfence/ebpfguard\n\n#cybersecurity #infosec\n\nRust Process Herpaderping\n\nRust implementation of the Process Herpaderping original PoC.\n\nhttps://github.com/secur30nly/rust-herpaderping\n\n#cybersecurity #infosec\n\ntun2socks\n\nPowered by gVisor TCP/IP stack.\n\nhttps://github.com/xjasonlyu/tun2socks\n\n#cybersecurity #infosec #privacy\n\nOffensive Bookmarks\n\nA collection of bookmarks for penetration testers, bug bounty hunters, malware developers, reverse engineers and anyone who is just interested in infosec topics.\n\nhttps://github.com/kargisimos/offensive-bookmarks\n\n#infosec #pentesting #redteam\n\nSynergy Httpx\n\nA Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving content dynamically (e.g. payloads).\n\nhttps://github.com/t3l3machus/Synergy-httpx\n\n#infosec #pentesting #redteam\n\nCSRFShark\n\nA utility for manipulating cross-site request forgery attacks. It allows to easily generate a CSRF PoC based on a given HTTP/CURL requests with further possibility to get a permanent link to the result.\n\nhttps://github.com/csrfshark/app\n\nWeb:\nhttps://csrfshark.github.io/app/\n\n#infosec #pentesting #bugbounty\n\nhttps://t.me/dilagrafie", "creation_timestamp": "2023-09-02T11:33:16.000000Z"}