{"uuid": "8bcdf1a1-f3e8-430f-be35-4278ee1aa73e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-41120", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/88", "content": "SideLOADR\n\nA \"simple\" script to perform DLL sideloading using Python.\n\nhttps://github.com/Pascal-0x90/sideloadr\n\n\u200b\u200bCallObfuscator\n\nObfuscate (hide) the PE imports from static/dynamic analysis tools.\n\nhttps://github.com/d35ha/CallObfuscator\n\n\u200b\u200bSysmonEoP\n\nHere is PoC for CVE-2022-41120. I combined arb file delete and limited arb file write to get code execution as NT Authority\\System.\n\nhttps://github.com/Wh04m1001/SysmonEoP\n\n#cve #poc\n\n\u200b\u200bteler\n\nReal-time HTTP Intrusion Detection\n\nteler is an real-time intrusion detection and threat alert based on web log that runs in a terminal with resources that we collect and provide by the community. \u2764\ufe0f\n\nhttps://github.com/kitabisa/teler\n\n\u200b\u200bPwnAI\n\nI leverage OpenAI to automate explanations of what malware or suspected malicious code samples are doing\n\nhttps://github.com/NoDataFound/PwnAI\n\n\u200b\u200bPrintNotifyPotato\n\nAnother potato, using PrintNotify COM service for lifting rights\n\nFor Windows 10 - 11 Windows Server 2012 - 2022\n\nhttps://github.com/BeichenDream/PrintNotifyPotato\n\n#infosec #cybersec #\ud835\udddb\ud835\uddee\ud835\uddf0\ud835\uddf8\ud835\uddf2\ud835\uddff\ud835\ude00\ud835\uddd9\ud835\uddee\ud835\uddf0\ud835\ude01\ud835\uddfc\ud835\uddff\ud835\ude06\n\nhttps://t.me/dilagrafie\nhttps://t.me/c/1634518258/5\nhttps://t.me/c/1634518258/6\n\n5/5", "creation_timestamp": "2022-12-07T22:43:40.000000Z"}