{"uuid": "a1c099ca-c359-42b2-8284-2ba6212c87e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-2516", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3073", "content": "Tools - Hackers Factory \n\nCVE-2023-3009\n\nStored #XSS on item name - Bypassing CVE-2023-2516 in TeamPass &lt; 3.0.9 - by M Nadeem Qazi.\n\nhttps://github.com/mnqazi/CVE-2023-3009\n\n#cve #cybersecurity #infosec\n\n\u200b\u200bApplywdac \n\nPowerShell script for applying WDAC policies.\n\nhttps://github.com/vu-ls/applywdac\n\n#cybersecurity #infosec\n\n\u200b\u200bfake-useragent\n\nUp-to-date simple useragent faker with real world database.\n\nhttps://github.com/fake-useragent/fake-useragent\n\n#cybersecurity #infosec #privacy\n\n\u200b\u200bProxiFyre \n\nAdvanced SOCKS5 Routing Solution for Windows.\n\nhttps://github.com/wiresock/socksify\n\n#cybersecurity #infosec #privacy\n\n\u200b\u200bThe DEF CON CTF 2023 Qualifier\n\nThis repository contains the open source release for Nautilus Institute's 2023 DEF CON CTF qualifier.\n\nhttps://github.com/Nautilus-Institute/quals-2023\n\n#cybersecurity #infosec\n\n\u200b\u200bWordlists\n\nReal-world infosec wordlists, updated regularly! These wordlists are based on the source code of the CMSes/servers/frameworks listed here. The current wordlists include:\n\n\u2022 Wordpress\n\u2022 Joomla\n\u2022 Drupal\n\u2022 Magento\n\u2022 Ghost\n\u2022 Tomcat\n\nhttps://github.com/trickest/wordlists\n\n#infosec #pentesting #bugbounty\n\n\u200b\u200bNanorobeus\n\nCOFF file (BOF) for managing #Kerberos tickets.\n\nhttps://github.com/wavvs/nanorobeus\n\n#infosec #pentesting #redteam\n\n\u200b\u200bCVE-2023-23638\n\nApache Dubbo Vulnerability Exploitation Engineering Practice, covering Dubbo 3.x from service discovery to vulnerability exploitation and reverse display. \n\nhttps://github.com/YYHYlh/Apache-Dubbo-CVE-2023-23638-exp\n\n#cve #poc #cybersecurity #infosec\n\n\u200b\u200bEPI\n\nProcess injection through entry points hijacking.\n\nhttps://github.com/Kudaes/EPI\n\n#infosec #pentesting #redteam\n\n\u200b\u200bCRTER\n\nA command-line tool for fetching subdomains using the CRT.SH certificate search engine. It allows you to provide a list of domain names or fully-qualified domain names (FQDNs) and retrieve the associated subdomains. The tool fetches the subdomains from CRT.SH and saves them to an output file.\n\nhttps://github.com/Micro0x00/CRTER\n\n#infosec #pentesting #bugbounty\n\n\u200b\u200bHALA\n\nHALA offers a powerful capability that enables you to identify reflected parameters within the response, providing valuable assistance in your testing and hacking endeavors.\n\nhttps://github.com/whalebone7/Hala\n\n#cybersecurity #infosec\n\nhttps://t.me/dilagrafie\nhttps://t.me/HackerFactory", "creation_timestamp": "2023-06-02T09:34:10.000000Z"}