{"uuid": "72ef0e9e-00bf-41a1-9ce2-4dffba3e3103", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45519", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3793", "content": "Tools - Hackers Factory \n\nMemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR \n\nhttps://github.com/evild3ad/MemProcFS-Analyzer\n\nTeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.\n\nhttps://github.com/PeterGabaldon/CVE-2024-7479_CVE-2024-7481\n\nGet PROXY List that gets updated everyday \n\nhttps://github.com/TheSpeedX/PROXY-List\n\nPrying Deep - An OSINT tool to collect intelligence on the dark web\n\nhttps://github.com/iudicium/pryingdeep\n\nA tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where we scanned 20k+ public AMIs. \n\nhttps://github.com/saw-your-packet/CloudShovel\n\nCVE-2024-45519\n\nhttps://github.com/p33d/CVE-2024-45519\n\nCVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13 \n\nhttps://github.com/pl4int3xt/cve_2024_0044\n\nGoogle &amp; Shodan Dorks for WebCam\n\nhttps://github.com/ExploitXpErtz/WebCam-Google-Shodan-Dorks\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-14T06:01:06.000000Z"}