{"uuid": "6cb90c38-4fa9-45a2-9b50-8633002db3e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-24813", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/8080", "content": "#GitHub #Tools\n\nPublic malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.\n\nhttps://github.com/ayoubfaouzi/al-khaser\n\nFileless ring 3 rootkit with installer and persistence that hides processes, files, network connections, etc.\n\nhttps://github.com/bytecode77/r77-rootkit\n\nApache Tomcat \u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\u6279\u91cf\u68c0\u6d4b\u811a\u672c(CVE-2025-24813)\n\nhttps://github.com/iSee857/CVE-2025-24813-PoC\n\nCRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taking, automated data linking, interactive visualizations, and robust access control. Enhance your CTI workflow from analysis to reporting\u2014all in one secure space.\n\nhttps://github.com/prodaft/cradle\n\n#HackersFactory", "creation_timestamp": "2025-03-19T10:09:01.000000Z"}