{"uuid": "8fcb2324-8086-45d5-aa2c-c91c5c6e2589", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-2868", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3119", "content": "25 Tools \ud83d\udd27 \ud83d\udd27 - Hackers Factory\n\nWinsocky\n\nWinsocket implementation for #CobaltStrike. Used to communicate with the victim using winsockets instead of the traditional ways.\n\nhttps://github.com/WKL-Sec/Winsocky\n\n#infosec #pentesting #redteam\n\n\u200b\u200bUseful #OSINT hints and links\n\nhttps://github.com/seintpl/osint\n\n#cybersecurity #infosec\n\n\u200b\u200bPyrrha\n\nA tool for firmware cartography.\n\nhttps://github.com/quarkslab/pyrrha\n\n#cybersecurity #infosec\n\n\u200b\u200b\ud83d\udd79 apk.sh\n\napk.sh makes #reverse engineering Android apps easier, automating some repetitive tasks like pulling, decoding, rebuilding and patching an APK.\n\nhttps://github.com/ax/apk.sh\n\n#cybersecurity #infosec\n\n\u200b\u200bCVE-2023-3269 \n\nLinux kernel privilege escalation vulnerability.\n\nhttps://github.com/lrh2000/StackRot\n\n#cve #cybersecurity #infosec\n\n\u200b\u200bmmdb-server\n\nFast API server to lookup IP addresses for their geographic location.\n\nhttps://github.com/adulau/mmdb-server\n\n#cybersecurity #infosec\n\n\u200b\u200bCVE-2023-2868\n\nBarracuda ESG Command Injection\n\nhttps://github.com/cfielding-r7/poc-cve-2023-2868\n\n#cve #cybersecurity #infosec\n\n\u200b\u200bDoge-COFFLdr\n\nIts a coff loader ported to go.\n\n\u2022 Ported to go\n\u2022 more opsec\n\u2022 support BeaconOutput\n\u2022 support other Beacon functions(todo)\n\nhttps://github.com/timwhitez/Doge-COFFLdr\n\n#infosec #pentesting #redteam\n\n\u200b\u200bSR-IOV Network Metrics Exporter\n\nExporter that reads metrics for SR-IOV Virtual Functions and exposes them in the Prometheus format.\n\nhttps://github.com/k8snetworkplumbingwg/sriov-network-metrics-exporter\n\n#cybersecurity #infosec\n\n\u200b\u200bnf-tables-lpe\n\nExploits of Team Orca from Sea Security and Qrious Secure for multiple vulnerabilities in Netfilter's nf_table module.\n\nhttps://github.com/kungfulon/nf-tables-lpe\n\n#cybersecurity #infosec\n\n\u200b\u200broute-detect\n\nFind authentication (authn) and authorization (authz) security bugs in web application routes.\n\nhttps://github.com/mschwager/route-detect\n\n#cybersecurity #infosec #pentesting\n\n\u200b\u200bjava-gate\n\nJava JNI HellsGate/HalosGate/TartarusGate/RecycledGate/SSN Syscall/Many Shellcode Loaders.\n\nhttps://github.com/4ra1n/java-gate\n\n#infosec #pentesting #redteam\n\nTakeMyRDP 2.0\n\nA keystroke logger targeting the Remote Desktop Protocol (RDP) related processes, It utilizes a low-level keyboard input hook, allowing it to record keystrokes in certain contexts (like in mstsc.exe and CredentialUIBroker.exe) it operates in the background not as a console windows anymore and handles all messages in a hidden window.\n\nhttps://github.com/nocerainfosec/TakeMyRDP2.0\n\n#infosec #pentesting #redteam\n\nEvil QR\n\nProof-of-concept to demonstrate dynamic QR swap phishing attacks in practice.\n\nhttps://github.com/kgretzky/evilqr\n\n#cybersecurity #infosec\n\n\u200b\u200bDecrypt Chrome Passwords\n\nA simple program to decrypt chrome password saved on your machine. This code has only been tested on windows, so it may not work on other OS.\n\nhttps://github.com/ohyicong/decrypt-chrome-passwords\n\n#cybersecurity #infosec #redteam\n\n\u200b\u200bShortscan\n\nAn IIS short filename enumeration tool.\n\nhttps://github.com/bitquark/shortscan\n\n#cybersecurity #infosec\n\n\u200b\u200bFuzzyLogic.jl\n\nA Flexible Library for Efficient and Productive Fuzzy Inference\n \nhttps://github.com/lucaferranti/fuzzieee2023\n\n#cybersecurity #infosec\n\n\u200b\u200bDECREE\n\nThis is the code repository of the CVPR 2023 paper DECREE, \"Detecting Backdoors in Pre-trained Encoders\", the first backdoor detection method against self-supervising learning (SSL) backdoor attacks.\n\nhttps://github.com/GiantSeaweed/DECREE\n\n#infosec #pentesting #redteam\n\n\u200b\u200bCVE-2023-36163\n\nCross Site Scripting vulnerability in IP-DOT BuildaGate v.BuildaGate5 allows a remote attacker to execute arbitrary code via a crafted script to the mc parameter of the URL.\n\nhttps://github.com/TraiLeR2/CVE-2023-36163\n\n#cve #cybersecurity #infosec\n\n\u200b\u200bCVE-2023-36167\n\nAn issue in AVG AVG Anti-Spyware v.7.5 allows an attacker to execute arbitrary code via a crafted script to the guard.exe component\n\nhttps://github.com/TraiLeR2/CVE-2023-36167\n\n#cve #cybersecurity #infosec\n\n\u200b\u200b1/1", "creation_timestamp": "2023-07-27T07:52:46.000000Z"}