{"uuid": "dc4942e2-6932-462f-a04f-58e537002f51", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-5806", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/311", "content": "Tools - Hackers Factory \n\nYour best friend in credential reuse attacks\n\nhttps://github.com/D4Vinci/Cr3dOv3r\n\nA classic Anti-Sandbox technique \n\nhttps://github.com/knight0x07/onMouseMove-HtmlFile-PoC\n\nA metasploit module for CVE-2024-5806 in the pull queue\n\nhttps://github.com/rapid7/metasploit-framework/pull/19295\n\nAn automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for vulnerabilities.\n\nhttps://github.com/h4r5h1t/webcopilot\n\nDeobfuscator Code\n\nhttps://github.com/ergrelet/themida-unmutate\n\nExperimental Windows x64 Kernel Rootkit\n\nhttps://github.com/eversinc33/Banshee\n\nNice write up on exploiting CVE-2022-4262, Google Chrome V8 type confusion\n\nhttps://github.com/bjrjk/CVE-2022-4262\n\nRemote Kerberos Relay made easy! Advanced Kerberos Relay Framework\n\nhttps://github.com/CICADA8-Research/RemoteKrbRelay\n\nQuickly find differences and similarities in disassembled code\n\nhttps://github.com/google/bindiff\n\nA collaborative, multi-platform, red teaming framework\n\nhttps://github.com/its-a-feature/Mythic\n\nxyrella is a simple XLL builder without any remote injection functionality\n\nhttps://github.com/zimnyaa/xyrella\n\nStandalone client for proxies of Opera VPN\n\nhttps://github.com/Snawoot/opera-proxy\n\n#HackersFactory\nhttps://t.me/dilagrafie", "creation_timestamp": "2024-07-02T07:40:02.000000Z"}