{"uuid": "ba7cae33-4a0c-4f61-9690-843cd23ba4dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-2859", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3062", "content": "Tools - Hackers Factory \n\nuserefuzz\n\nUser-Agent, X-Forwarded-For and Referer SQLI Fuzzer made with python. Works on linux and unix based systems.\n\nhttps://github.com/root-tanishq/userefuzz\n\n#infosec #pentesting #bugbounty\n\nChrome Cookie Stealer (and injector)\n\nSteal/Inject Chrome cookies over the DevTools (--remote-debugging-port) protocol.\n\nhttps://github.com/magisterquis/chromecookiestealer\n\n#infosec \n\nCVE-2023-2859\n\nStored HTML injection in folderName affecting Admin in TeamPass &lt;3.0.9\n\nhttps://github.com/mnqazi/CVE-2023-2859\n\n#cve #cybersecurity #infosec\n\nWin32 app isolation repo\n\nWin32 app isolation is a new security feature on Windows that helps contain the damage and safeguard user privacy choices in the event of an application compromise. Win32 app isolation is built on the foundation of AppContainers, which offer a security boundary, and components that virtualize resources and provide brokered access to other resources. This repo contains the documentation and tools to help you isolate your applications.\n\nhttps://github.com/microsoft/win32-app-isolation\n\n#cybersecurity #infosec\n\nHunt3r\n\nHunt3r aims to simplify domain recognition by trying to combine three things:\n\n\u2022 Speed of scans\n\u2022 Accuracy of results\n\u2022 Ease of use of the data\n\nhttps://github.com/EasyRecon/Hunt3r\n\n#bugbounty #infosec #pentesting\n\nmonitor_subdomains\n\nMonitor your target continuously for new subdomains using Discord!\n\nhttps://github.com/faiyazahmad07/monitor_subdomains\n\n#infosec #pentesting #bugbounty\n\nGitFive\n\n#OSINT tool to investigate GitHub profiles.\n\nhttps://github.com/mxrch/GitFive\n\n#cybersecurity #infosec\n\nROPfuscator\n\nROPfuscator is a fine-grained code obfuscation framework for LLVM-supported languages using ROP (return-oriented programming). ROPfuscator obfuscates a program at the assembly code level by transforming regular instructions into ROP chains, thwarting our natural conception of normal control flow.\n\nhttps://github.com/ropfuscator/ropfuscator\n\n#cybersecurity #infosec\n\nhttps://t.me/dilagrafie\nhttps://t.me/HackerFactory", "creation_timestamp": "2023-05-25T16:15:06.000000Z"}