{"uuid": "9343ea01-ce65-405c-bdaf-4ae77ea907b0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-40711", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/899", "content": "Tools  - Hackers Factory \n\nScrcpy 2.7, just released, supports game controllers \ud83c\udfae\n\nhttps://github.com/Genymobile/scrcpy/releases/tag/v2.7\n\nPre-Auth Exploit for CVE-2024-40711\n\nhttps://github.com/watchtowrlabs/CVE-2024-40711\n\nRemote Kerberos Relay made easy! Advanced Kerberos Relay Framework\n\nhttps://github.com/CICADA8-Research/RemoteKrbRelay\n\nScan for secrets, endpoints, and other sensitive data after decompiling and deobfuscating Android files.  \n\nhttps://github.com/LucasFaudman/apkscan\n\nCLI tools for forensic investigation of artifacts \n\nhttps://github.com/dfir-dd/dfir-toolkit\n\nCobalt Strike - Malleable C2 Profiles. A collection of profiles used in different projects using Cobalt Strike\n\nhttps://github.com/xx0hcd/Malleable-C2-Profiles\n\nUnleashed ffuf\n\nhttps://github.com/sw33tLie/uff\n\nTools for searching emails for a specific domain\n\nhttp://github.com/Josue87/EmailFinder\n\nhttp://github.com/GiJ03/Infoga\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-09-17T09:02:24.000000Z"}