{"uuid": "5c83a043-f415-4307-b93e-8a605b5a08f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-0179", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3154", "content": "Hackers Factory \n\nA COFF loader made in Rust\n\nhttps://github.com/hakaioffsec/coffee\n\nA simple script just made for self use for bypassing 403\n\nhttps://github.com/iamj0ker/bypass-403\n\n403/401 Bypass Methods + Bash Automation + Your Support ;)\n\nhttps://github.com/Dheerajmadhukar/4-ZERO-3\n\nCommon methods to found API endpoints\n\n1- Swagger UI Documentation\n2- Dictionary Attack | Brute force\n3- Common wordlist for API Enum :\nwordlists.assetnote.io\n\nhttps://github.com/Net-hunter121/API-Wordlist\n\n#bugbountytips #BugBounty\n\nLinux Security and Monitoring Scripts\n\nhttps://github.com/sqall01/LSMS\n\nAn OSINT tool that helps detect members of a company with leaked credentials\n\nhttps://github.com/infobyte/emploleaks\n\nDFIQ is a collection of investigative questions and the approaches for answering them\n\nhttps://github.com/google/dfiq\n\nHunts out CobaltStrike beacons and logs operator command output\n\nhttps://github.com/CCob/BeaconEye\n\nA POC of the ContainYourself research presented in DEF CON 31, which abuses the Windows containers framework to bypass EDRs.\n\nhttps://github.com/deepinstinct/ContainYourself\n\nNeedle (CVE-2023-0179) exploit\n\nhttps://github.com/TurtleARM/CVE-2023-0179-PoC\n\n#infosec #cybersecurity #hackersfactory \n\nhttps://t.me/dilagrafie", "creation_timestamp": "2023-08-15T00:23:05.000000Z"}