{"uuid": "66bc225f-bc5d-4f48-8c44-693ae709e5f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-33242", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3159", "content": "Hackers Factory \n\n#exploit\n\n1. WPS Office RCE\n\ngithub.com/ba0gu0/wps-rce\n\n2. CVE-2023-33242:\nLindell17 ECDSA Private Key information disclosure\n\nhttps://github.com/d0rb/CVE-2023-33242\n\nGoogle Calendar RAT is a PoC of Command&amp;Control over Google Calendar Events\n\nhttps://github.com/MrSaighnal/GCR-Google-Calendar-RAT\n\nAn OSINT Metadata analyzing tool that filters through tags and creates reports\n\nhttps://github.com/chriswmorris/Metaforge\n\nSpoof emails from any of the +2 Million domains using MailChannels (DEFCON 31 Talk)\n\nhttps://github.com/byt3bl33d3r/SpamChannel\n\nTrace Labs #OSINT Field Manual\n\n(detailed guide for beginners)\n\n- Getting started\n- Ethics\n- Safety\n- Planning and Preparation\n- Techniques\n- Resources\n\ngithub.com/tracelabs/tofm/\n\nExtract web archive data using Wayback Machine and Common Crawl\n\nhttps://github.com/karust/gogetcrawl\n\nsimple script to extract all web resources by means of .SVN folder exposed over network.\n\nhttps://github.com/anantshri/svn-extractor\n\nSandbox for automated Linux malware analysis.\n\nhttps://github.com/danieluhricek/LiSa\n\n#infosec #cybersecurity #hackersfactory \n\nhttps://t.me/dilagrafie", "creation_timestamp": "2023-08-18T06:25:59.000000Z"}