{"uuid": "bc17480e-be20-4e66-b5ee-14af44a02b5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45519", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/8888", "content": "Tools - Hackers Factory \n\nIndetectables-net/toolkit: The essential toolkit for reversing, malware analysis, and cracking.\n\nhttps://github.com/indetectables-net/toolkit\n\nGitHub - Chocapikk/CVE-2024-45519: Zimbra - Remote Command Execution (CVE-2024-45519)\n\nhttps://github.com/Chocapikk/CVE-2024-45519\n\nOWASP Amass Project\n\nhttps://github.com/owasp-amass\n\nPoC for the Untrusted Pointer Dereference in the ks.sys driver\n\nhttps://github.com/varwara/CVE-2024-35250\n\nPOC - Unauthenticated RCE Flaw in Rejetto HTTP File Server - CVE-2024-23692\n\nhttps://github.com/verylazytech/CVE-2024-23692\n\nPowerShell Obfuscator\n\nhttps://github.com/TaurusOmar/psobf\n\nModTracer Finds Hidden Linux Kernel Rootkits and then make visible again.\n\nhttps://github.com/MatheuZSecurity/ModTracer\n\n1C RAS Offensive Security Tool\n\nhttps://github.com/sdnv0x4d/rasoff\n\nRust Weaponization for Red Team Engagements.\n\nhttps://github.com/trickster0/OffensiveRust\n\n#CyberDilara\nhttps://t.me/dilagrafie", "creation_timestamp": "2024-10-21T13:23:53.000000Z"}