{"uuid": "e7eff41d-c692-4755-98a9-503fc67f4769", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-38035", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3171", "content": "Hackers Factory \n\nRun PowerShell command without invoking powershell.exe\n\nhttps://github.com/Mr-Un1k0d3r/PowerLessShell\n\nOSCP 2023 Preparation Guide | Courses, Tricks, Tutorials, Exercises, Machines\n\nhttps://github.com/rodolfomarianocy/OSCP-Tricks-2023\n\nCVE-2023-41080\n\nApache Tomcat FORM Authentication redirect\n\nhttps://github.com/shiomiyan/CVE-2023-41080\n\nJDK CVE-2023-21939\n\nhttps://github.com/Y4Sec-Team/CVE-2023-21939\n\nA high-performance, parallel, compilation-based symbolic execution engine\n\nhttps://github.com/Generative-Program-Analysis/GenSym\n\nCVE-2023-38831 winrar exploit generator\n\nhttps://github.com/b1tg/CVE-2023-38831-winrar-exploit\n\nThis lightweight C# demo application showcases interactive remote shell access via named pipes and the SMB protocol.\n\nhttps://github.com/DarkCoderSc/SharpShellPipe\n\nApple BLE proximity pairing message spoofing\n\nhttps://github.com/ECTO-1A/AppleJuice\n\nAssociated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious domain and IPv4 lists.\n\nhttps://github.com/OsmanKandemir/associated-threat-analyzer\n\nIvanti Sentry CVE-2023-38035\n\nhttps://github.com/horizon3ai/CVE-2023-38035\n\n#infosec #cybersecurity #hackersfactory \n\nhttps://t.me/dilagrafie", "creation_timestamp": "2023-08-29T14:27:53.000000Z"}