{"uuid": "b295eeaa-2523-429f-bca1-52b5c96890ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-39066", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/2137", "content": "Parshu\n\nFilter URLs to save your time using regex\n\nParshu uses regex to filter out the custom results. Remembering every regex or writing regexes for a task which you do daily is not easy, so parshu will help you to automate the task.\n\nhttps://github.com/R0X4R/Parshu\n\n\u200b\u200bIATelligence\n\nIATelligence is a Python script that extracts the Import Address Table (IAT) from a PE file and uses OpenAI's GPT-3 model to provide details about each Windows API imported by the file. The script also searches for related MITRE ATT&amp;CK techniques and explains how the API could potentially be used by attackers.\n\nIt also displays the hashes of the file and estimates the cost of the GPT-3 requests. IATelligence is a proof of concept for using GPT-3 for malware analysis and quickly assessing the behavior of a malware based on its IAT.\n\nhttps://github.com/fr0gger/IATelligence\n\n\u200b\u200bCVE-2022-46381\n\nYou can scan this vulnerability on your company's subdomains using the nuclei scanner with the template specified in this repo \"CVE-2022-46381.yaml\"\n\nhttps://github.com/omarhashem123/Security-Research/tree/main/CVE-2022-46381\n\n\u200b\u200bZeek-Formatted Threat Intelligence Feeds\n\nThis is a public feed based on Public Threat Feeds and CRITICAL PATH SECURITY gathered data. This feed will be updated as often as possible.\n\nhttps://github.com/CriticalPathSecurity/Zeek-Intelligence-Feeds\n\n\u200b\u200binject-globals\n\nA function for injecting global variables into function calls.\n\nhttps://github.com/victorwss/inject-globals\n\n\u200b\u200bPublic version of Redblood C2\n\nThis is a simple command and control server to handle sessions and your victims.\n\nhttps://github.com/kira2040k/RedbloodC2\n\n\u200b\u200bShadow\n\nA jailbreak detection bypass for modern iOS jailbreaks.\n\nPlease note that Shadow is not designed as an app-specific bypass. Issues mainly in consideration are non-detection related app crashes, regressions from previous versions, and compatibility issues.\n\nhttps://github.com/jjolano/shadow\n\n\u200aDomainDouche - OSINT Tool to Abuse SecurityTrails Domain Suggestion API To Find Potentially Related Domains By Keyword And Brute Force\n\nhttp://www.kitploit.com/2022/12/domaindouche-osint-tool-to-abuse.html\n\nCVE-2022-39066\n\nSQL Injection Vulnerability in ZTE MF286R\n\nhttps://github.com/v0lp3/CVE-2022-39066\n\nDonate\nhttps://t.me/c/1634518258/5\nhttps://t.me/HackerFactory/114\n\n#redteam #infosec #cybersec #\ud835\udddb\ud835\uddee\ud835\uddf0\ud835\uddf8\ud835\uddf2\ud835\uddff\ud835\ude00\ud835\uddd9\ud835\uddee\ud835\uddf0\ud835\ude01\ud835\uddfc\ud835\uddff\ud835\ude06\n\n3/3", "creation_timestamp": "2022-12-14T10:16:53.000000Z"}