{"uuid": "eb5a8000-67af-4935-a843-064d5a956726", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-32784", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3010", "content": "Tools - Hackers Factory \n\n\nCVE-2023-32784\n\nKeePass 2.X Master Password Dumper.\n\nhttps://github.com/vdohney/keepass-password-dumper\n\n#cve #infosec #redteam\n\nPPLFaultDumpBOF\n\nTakes the original PPLFault and the original included DumpShellcode and combinds it all into a BOF targeting #CobaltStrike.\n\nhttps://github.com/trustedsec/PPLFaultDumpBOF\n\n#infosec #pentesting #redteam\n\nMonitoring the internet for new .zip domains\n\ngithub.com/trickest/zip\n\nUpdated raccoon_config to enable storing extracted #Raccoon #Infostealer as JSON. Raccoon C2 still does not seem to care about the User-Agent despite changing it regularly. \n\nhttps://github.com/NexusFuzzy/raccoon_config\n\n\nKeePass Master Password Dumper is a simple proof-of-concept tool used to dump the master password from KeePass's memory. Apart from the first password character, it is mostly able to recover the password in plaintext. RCE not required.\n\nhttps://github.com/vdohney/keepass-password-dumper\n\nExtract all URL endpoints from an application and dump them to the command-line with hakrawler!\n\nURL extraction methods:\n\ud83d\udd77 Spidering the application\n\ud83d\udce0 Querying wayback machine\n\ud83e\udd16 Parsing robots.txt files\n\ud83d\uddfa Parsing sitemap.xml files\n\nInstall now https://github.com/hakluke/hakrawler\n\n\ud83d\udce3 I just got sent the most comprehensive list of Purple Team resources I've ever seen!\n\nI'd be insufferable if I was them - \"That's DOCTOR threat hunter to you\"\n\nhttps://github.com/ch33r10/EnterprisePurpleTeaming\n\nTool to bypass 40x response codes \n\nhttps://github.com/devploit/dontgo403\n\n#infosec #cybersecurity #cybersec\n\nhttps://t.me/dilagrafie\nhttps://t.me/HackerFactory", "creation_timestamp": "2023-06-02T14:24:36.000000Z"}