{"uuid": "ea586449-0482-4f8f-95c6-f7fa72333daf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-FR5H-RQP8-MJ6G", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3248", "content": "Tools - Hackers Factory\n\nCross Site Scripting ( XSS ) Vulnerability Payload List \n\nhttps://github.com/payloadbox/xss-payload-list\n\nYARA detection rule for CVE-2024-4367 arbitrary javascript execution in PDF.js \n\nhttps://github.com/spaceraccoon/detect-cve-2024-4367\n\nThe Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit. \n\nhttps://github.com/0xInfection/XSRFProbe\n\nhttps://github.com/blacklanternsecurity/badsecrets\n\nAutomation for javascript recon in bug bounty. \n\nhttps://github.com/KathanP19/JSFScan.sh\n\nTempMail is a simple web application that allows you to generate temporary email addresses and view the emails received by these addresses. \n\nhttps://github.com/mehmetkahya0/temp-mail \n\nThis Repositories contains list of One Liners with Descriptions and Installation requirements \n\nhttps://github.com/thecybertix/One-Liner-Collections\n\nAutomatic SSRF fuzzer and exploitation tool \n\nhttps://github.com/swisskyrepo/SSRFmap\n\nA tool to fastly get all javascript sources/files \n\nhttps://github.com/003random/getJS\n\nServer-Side Request Forgery in Server Actions \n\nhttps://github.com/vercel/next.js/security/advisories/GHSA-fr5h-rqp8-mj6g\n\nInQL is a robust, open-source Burp Suite extension for advanced GraphQL testing, offering intuitive vulnerability detection, customizable scans, and seamless Burp integration. \n\nhttps://github.com/doyensec/inql\n\n#HackersFactory", "creation_timestamp": "2024-05-25T15:30:14.000000Z"}