{"uuid": "b367b3da-f156-4d1c-9a90-a7116037cfd6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-33246", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3071", "content": "Tools - Hackers Factory \n\nRuy-Lopez\n\nThis repository contains the Proof-of-Concept(PoC) for a new approach to completely prevent DLLs from being loaded into a newly spawned process. The initial use-case idea was to block AV/EDR vendor DLLs from being loaded, so that userland hooking based detections are bypassed.\n\nhttps://github.com/S3cur3Th1sSh1t/Ruy-Lopez\n\n#infosec #pentesting #redteam\n\nCymulate Framework\n\nA framework to help #redteam construct fully customizable and automated APT attacks easily.\n\nhttps://github.com/opabravo/cymulate-framework\n\n#cybersecurity #infosec #pentesting\n\nAttacking WPA3\n\nNew Vulnerabilities &amp; Exploit Framework!\n\nhttps://github.com/domienschepers/wifi-framework\n\nDetails:\nhttps://conference.hitb.org/hitbsecconf2022sin/session/attacking-wpa3-new-vulnerabilities-and-exploit-framework/\n\n#cybersecurity #infosec #pentesting\n\nSshimpanzee\n\nA reverse shell based on sshd supporting DNS and ICMP Tunnelling as well as HTTP and Socks Proxies.\n\nhttps://github.com/lexfo/sshimpanzee\n\n#infosec #pentesting #redteam\n\nMihari\n\nA tool for #OSINT based threat hunting.\n\nhttps://github.com/ninoseki/mihari\n\nCVE-2023-33246\n\nApache rocketmq remote code execution vulnerability.\n\nhttps://github.com/I5N0rth/CVE-2023-33246\n\n#cve #cybersecurity #infosec\n\nRISC-V: Emoji Shellcoding\n\nThis tool \u2692 helps design RISC-V (both 32-bit and 64-bit) shellcodes capable of running arbitrary code, whose ASCII binary representation use only Unicode UTF-8 emojis \ud83e\udd2f.\n\nhttps://github.com/RischardV/emoji-shellcoding\n\n#cybersecurity #infosec #redteam\n\nCQ\n\nCode Query, a universal code security scanning tool.\n\nhttps://github.com/nccgroup/cq\n\n#cybersecurity #infosec\n\nCVE-2020-0796\n\nWindows Protocol TestSuites is to trigger BSoD (full #exploit).\n\nhttps://github.com/Ajomix/CVE-2020-0796\n\n#cve #cybersecurity #infosec\n\nRed Teaming &amp; Pentesting checklists for various engagements\n\nEven though, a penetration test is a creative process most people maintain private checklists to ensure that they will not forget to test networks, systems and applications against various scenarios and maintain the overall quality of the assessment.\n\nhttps://github.com/netbiosX/Checklists\n\n#cybersecurity #infosec\n\nhttps://t.me/dilagrafie\nhttps://t.me/HackerFactory", "creation_timestamp": "2023-05-30T15:17:54.000000Z"}