{"uuid": "92e08f07-89c6-4779-ad32-8f9672b23f74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5836", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/7542", "content": "Tools - Hackers Factory \n\nJSNinja is a powerful tool for extracting URLs and sensitive information from JavaScript files\n\nhttps://github.com/iamunixtz/JSNinja\n\nAn x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution : \n\nhttps://github.com/Octoberfest7/Secure_Stager  \n\nA modern 64-bit position independent implant template : \n\nhttps://github.com/Cracked5pider/Stardust  credits\n\nLTESniffer - An Open-source LTE Downlink/Uplink Eavesdropper : \n\nhttps://github.com/SysSec-KAIST/LTESniffer\n\nA POC exploit for CVE-2024-5836 and CVE-2024-6778, allowing for a sandbox escape from a Chrome extension : \n\nhttps://github.com/ading2210/CVE-2024-6778-POC\n\nRecoverPy : Recover overwritten or deleted data : \n\nhttps://github.com/PabloLec/RecoverPy\n\nProjects for security students\n\nhttps://github.com/kurogai/100-redteam-projects\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-27T05:11:12.000000Z"}