<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-03T20:01:54.319137+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/ea586449-0482-4f8f-95c6-f7fa72333daf/export</id>
    <title>ea586449-0482-4f8f-95c6-f7fa72333daf</title>
    <updated>2026-05-03T20:01:54.583964+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "ea586449-0482-4f8f-95c6-f7fa72333daf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-FR5H-RQP8-MJ6G", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3248", "content": "Tools - Hackers Factory\n\nCross Site Scripting ( XSS ) Vulnerability Payload List \n\nhttps://github.com/payloadbox/xss-payload-list\n\nYARA detection rule for CVE-2024-4367 arbitrary javascript execution in PDF.js \n\nhttps://github.com/spaceraccoon/detect-cve-2024-4367\n\nThe Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit. \n\nhttps://github.com/0xInfection/XSRFProbe\n\nhttps://github.com/blacklanternsecurity/badsecrets\n\nAutomation for javascript recon in bug bounty. \n\nhttps://github.com/KathanP19/JSFScan.sh\n\nTempMail is a simple web application that allows you to generate temporary email addresses and view the emails received by these addresses. \n\nhttps://github.com/mehmetkahya0/temp-mail \n\nThis Repositories contains list of One Liners with Descriptions and Installation requirements \n\nhttps://github.com/thecybertix/One-Liner-Collections\n\nAutomatic SSRF fuzzer and exploitation tool \n\nhttps://github.com/swisskyrepo/SSRFmap\n\nA tool to fastly get all javascript sources/files \n\nhttps://github.com/003random/getJS\n\nServer-Side Request Forgery in Server Actions \n\nhttps://github.com/vercel/next.js/security/advisories/GHSA-fr5h-rqp8-mj6g\n\nInQL is a robust, open-source Burp Suite extension for advanced GraphQL testing, offering intuitive vulnerability detection, customizable scans, and seamless Burp integration. \n\nhttps://github.com/doyensec/inql\n\n#HackersFactory", "creation_timestamp": "2024-05-25T15:30:14.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/ea586449-0482-4f8f-95c6-f7fa72333daf/export"/>
    <published>2024-05-25T15:30:14+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/a47a4139-f9ad-4213-9f9b-c8c7f414a5ce/export</id>
    <title>a47a4139-f9ad-4213-9f9b-c8c7f414a5ce</title>
    <updated>2026-05-03T20:01:54.583911+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "a47a4139-f9ad-4213-9f9b-c8c7f414a5ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-FR5H-RQP8-MJ6G", "type": "published-proof-of-concept", "source": "https://t.me/GhostsForum/21550", "content": "Tools - Hackers Factory\n\nCross Site Scripting ( XSS ) Vulnerability Payload List \n\nhttps://github.com/payloadbox/xss-payload-list\n\nYARA detection rule for CVE-2024-4367 arbitrary javascript execution in PDF.js \n\nhttps://github.com/spaceraccoon/detect-cve-2024-4367\n\nThe Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit. \n\nhttps://github.com/0xInfection/XSRFProbe\n\nhttps://github.com/blacklanternsecurity/badsecrets\n\nAutomation for javascript recon in bug bounty. \n\nhttps://github.com/KathanP19/JSFScan.sh\n\nTempMail is a simple web application that allows you to generate temporary email addresses and view the emails received by these addresses. \n\nhttps://github.com/mehmetkahya0/temp-mail \n\nThis Repositories contains list of One Liners with Descriptions and Installation requirements \n\nhttps://github.com/thecybertix/One-Liner-Collections\n\nAutomatic SSRF fuzzer and exploitation tool \n\nhttps://github.com/swisskyrepo/SSRFmap\n\nA tool to fastly get all javascript sources/files \n\nhttps://github.com/003random/getJS\n\nServer-Side Request Forgery in Server Actions \n\nhttps://github.com/vercel/next.js/security/advisories/GHSA-fr5h-rqp8-mj6g\n\nInQL is a robust, open-source Burp Suite extension for advanced GraphQL testing, offering intuitive vulnerability detection, customizable scans, and seamless Burp integration. \n\nhttps://github.com/doyensec/inql\n\n#HackersFactory", "creation_timestamp": "2024-05-25T15:30:30.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/a47a4139-f9ad-4213-9f9b-c8c7f414a5ce/export"/>
    <published>2024-05-25T15:30:30+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/1e6ba63d-4f8d-4c7b-8df0-cdc2796877f8/export</id>
    <title>1e6ba63d-4f8d-4c7b-8df0-cdc2796877f8</title>
    <updated>2026-05-03T20:01:54.583856+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "1e6ba63d-4f8d-4c7b-8df0-cdc2796877f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-FR5H-RQP8-MJ6G", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatCommunity/7800", "content": "Tools - Hackers Factory\n\nCross Site Scripting ( XSS ) Vulnerability Payload List \n\nhttps://github.com/payloadbox/xss-payload-list\n\nYARA detection rule for CVE-2024-4367 arbitrary javascript execution in PDF.js \n\nhttps://github.com/spaceraccoon/detect-cve-2024-4367\n\nThe Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit. \n\nhttps://github.com/0xInfection/XSRFProbe\n\nhttps://github.com/blacklanternsecurity/badsecrets\n\nAutomation for javascript recon in bug bounty. \n\nhttps://github.com/KathanP19/JSFScan.sh\n\nTempMail is a simple web application that allows you to generate temporary email addresses and view the emails received by these addresses. \n\nhttps://github.com/mehmetkahya0/temp-mail \n\nThis Repositories contains list of One Liners with Descriptions and Installation requirements \n\nhttps://github.com/thecybertix/One-Liner-Collections\n\nAutomatic SSRF fuzzer and exploitation tool \n\nhttps://github.com/swisskyrepo/SSRFmap\n\nA tool to fastly get all javascript sources/files \n\nhttps://github.com/003random/getJS\n\nServer-Side Request Forgery in Server Actions \n\nhttps://github.com/vercel/next.js/security/advisories/GHSA-fr5h-rqp8-mj6g\n\nInQL is a robust, open-source Burp Suite extension for advanced GraphQL testing, offering intuitive vulnerability detection, customizable scans, and seamless Burp integration. \n\nhttps://github.com/doyensec/inql\n\n#HackersFactory", "creation_timestamp": "2024-05-25T15:32:53.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/1e6ba63d-4f8d-4c7b-8df0-cdc2796877f8/export"/>
    <published>2024-05-25T15:32:53+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/1a6e6948-40fc-454e-b9e5-3ad90ac045a3/export</id>
    <title>1a6e6948-40fc-454e-b9e5-3ad90ac045a3</title>
    <updated>2026-05-03T20:01:54.583804+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "1a6e6948-40fc-454e-b9e5-3ad90ac045a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-FR5H-RQP8-MJ6G", "type": "published-proof-of-concept", "source": "https://t.me/lcmysecteamch/7847", "content": "Tools - Hackers Factory\n\nCross Site Scripting ( XSS ) Vulnerability Payload List \n\nhttps://github.com/payloadbox/xss-payload-list\n\nYARA detection rule for CVE-2024-4367 arbitrary javascript execution in PDF.js \n\nhttps://github.com/spaceraccoon/detect-cve-2024-4367\n\nThe Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit. \n\nhttps://github.com/0xInfection/XSRFProbe\n\nhttps://github.com/blacklanternsecurity/badsecrets\n\nAutomation for javascript recon in bug bounty. \n\nhttps://github.com/KathanP19/JSFScan.sh\n\nTempMail is a simple web application that allows you to generate temporary email addresses and view the emails received by these addresses. \n\nhttps://github.com/mehmetkahya0/temp-mail \n\nThis Repositories contains list of One Liners with Descriptions and Installation requirements \n\nhttps://github.com/thecybertix/One-Liner-Collections\n\nAutomatic SSRF fuzzer and exploitation tool \n\nhttps://github.com/swisskyrepo/SSRFmap\n\nA tool to fastly get all javascript sources/files \n\nhttps://github.com/003random/getJS\n\nServer-Side Request Forgery in Server Actions \n\nhttps://github.com/vercel/next.js/security/advisories/GHSA-fr5h-rqp8-mj6g\n\nInQL is a robust, open-source Burp Suite extension for advanced GraphQL testing, offering intuitive vulnerability detection, customizable scans, and seamless Burp integration. \n\nhttps://github.com/doyensec/inql\n\n#HackersFactory", "creation_timestamp": "2024-05-25T15:33:16.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/1a6e6948-40fc-454e-b9e5-3ad90ac045a3/export"/>
    <published>2024-05-25T15:33:16+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/ba84acce-3840-4e31-8232-1541ac9f79de/export</id>
    <title>ba84acce-3840-4e31-8232-1541ac9f79de</title>
    <updated>2026-05-03T20:01:54.583748+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "ba84acce-3840-4e31-8232-1541ac9f79de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-FR5H-RQP8-MJ6G", "type": "published-proof-of-concept", "source": "https://t.me/lcmysecteamch/4430", "content": "Tools - Hackers Factory\n\nCross Site Scripting ( XSS ) Vulnerability Payload List \n\nhttps://github.com/payloadbox/xss-payload-list\n\nYARA detection rule for CVE-2024-4367 arbitrary javascript execution in PDF.js \n\nhttps://github.com/spaceraccoon/detect-cve-2024-4367\n\nThe Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit. \n\nhttps://github.com/0xInfection/XSRFProbe\n\nhttps://github.com/blacklanternsecurity/badsecrets\n\nAutomation for javascript recon in bug bounty. \n\nhttps://github.com/KathanP19/JSFScan.sh\n\nTempMail is a simple web application that allows you to generate temporary email addresses and view the emails received by these addresses. \n\nhttps://github.com/mehmetkahya0/temp-mail \n\nThis Repositories contains list of One Liners with Descriptions and Installation requirements \n\nhttps://github.com/thecybertix/One-Liner-Collections\n\nAutomatic SSRF fuzzer and exploitation tool \n\nhttps://github.com/swisskyrepo/SSRFmap\n\nA tool to fastly get all javascript sources/files \n\nhttps://github.com/003random/getJS\n\nServer-Side Request Forgery in Server Actions \n\nhttps://github.com/vercel/next.js/security/advisories/GHSA-fr5h-rqp8-mj6g\n\nInQL is a robust, open-source Burp Suite extension for advanced GraphQL testing, offering intuitive vulnerability detection, customizable scans, and seamless Burp integration. \n\nhttps://github.com/doyensec/inql\n\n#HackersFactory", "creation_timestamp": "2024-05-25T15:33:16.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/ba84acce-3840-4e31-8232-1541ac9f79de/export"/>
    <published>2024-05-25T15:33:16+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/14e7fa51-22f3-435d-8a9e-70abba40525c/export</id>
    <title>14e7fa51-22f3-435d-8a9e-70abba40525c</title>
    <updated>2026-05-03T20:01:54.583692+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "14e7fa51-22f3-435d-8a9e-70abba40525c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-FR5H-RQP8-MJ6G", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3256", "content": "Tools - Hackers Factory\n\nIt creates a livedump of the machine through NtDebugSystemControl to extract the COM secret and context, to then inject inside this process.\n\nhttps://github.com/Slowerzs/PPLSystem\n\nAgentic LLM Vulnerability Scanner \n\nhttps://github.com/msoedov/agentic_security\n\nA Chrome/Firefox browser extension to show alerts for reflected query params, show Wayback archive links for the current path, show hidden elements and enable disabled elements. \n\nhttps://github.com/msoedov/agentic_security\n\nPowerful+Fast Kubernetes service discovery tools via kubernetes DNS service. Currently supported service ip-port BruteForcing / AXFR Domain Transfer Dump / Coredns WildCard Dump \n\nhttps://github.com/Esonhugh/k8spider\n\nHTTP 403 bypass tool \n\nhttps://github.com/trap-bytes/403jump\n\n\nMOBEXLER - A Mobile Application Penetration Testing Platform\n\nhttps://github.com/enciphers-team/Mobexler/blob/master/docs/index.md\n\nA library for detecting known secrets across many web frameworks \n\nhttps://github.com/blacklanternsecurity/badsecrets\n\nThe Yoast SEO plugin for WordPress is vulnerable to... \n\nhttps://github.com/advisories/GHSA-3733-6v6m-39mh\n\nServer-Side Request Forgery in Server Actions \n\nhttps://github.com/vercel/next.js/security/advisories/GHSA-fr5h-rqp8-mj6g\n\nFuzz 401/403/404 pages for bypasses \n\nhttps://github.com/intrudir/BypassFuzzer\n\nAn interactive shell to spoof some LOLBins command line \n\nhttps://github.com/itaymigdal/LOLSpoof\n\nFully customisable, offensive security reporting solution designed for pentesters, red teamers and other security-related people alike. \n\nhttps://github.com/Syslifters/sysreptor\n\n#HackersFactory", "creation_timestamp": "2024-05-30T10:08:39.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/14e7fa51-22f3-435d-8a9e-70abba40525c/export"/>
    <published>2024-05-30T10:08:39+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/cb69c8a5-9c55-40d4-a183-d9dce141eba6/export</id>
    <title>cb69c8a5-9c55-40d4-a183-d9dce141eba6</title>
    <updated>2026-05-03T20:01:54.583634+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "cb69c8a5-9c55-40d4-a183-d9dce141eba6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-FR5H-RQP8-MJ6G", "type": "published-proof-of-concept", "source": "https://t.me/GhostClanOfficial/929", "content": "Tools - Hackers Factory\n\nIt creates a livedump of the machine through NtDebugSystemControl to extract the COM secret and context, to then inject inside this process.\n\nhttps://github.com/Slowerzs/PPLSystem\n\nAgentic LLM Vulnerability Scanner \n\nhttps://github.com/msoedov/agentic_security\n\nA Chrome/Firefox browser extension to show alerts for reflected query params, show Wayback archive links for the current path, show hidden elements and enable disabled elements. \n\nhttps://github.com/msoedov/agentic_security\n\nPowerful+Fast Kubernetes service discovery tools via kubernetes DNS service. Currently supported service ip-port BruteForcing / AXFR Domain Transfer Dump / Coredns WildCard Dump \n\nhttps://github.com/Esonhugh/k8spider\n\nHTTP 403 bypass tool \n\nhttps://github.com/trap-bytes/403jump\n\n\nMOBEXLER - A Mobile Application Penetration Testing Platform\n\nhttps://github.com/enciphers-team/Mobexler/blob/master/docs/index.md\n\nA library for detecting known secrets across many web frameworks \n\nhttps://github.com/blacklanternsecurity/badsecrets\n\nThe Yoast SEO plugin for WordPress is vulnerable to... \n\nhttps://github.com/advisories/GHSA-3733-6v6m-39mh\n\nServer-Side Request Forgery in Server Actions \n\nhttps://github.com/vercel/next.js/security/advisories/GHSA-fr5h-rqp8-mj6g\n\nFuzz 401/403/404 pages for bypasses \n\nhttps://github.com/intrudir/BypassFuzzer\n\nAn interactive shell to spoof some LOLBins command line \n\nhttps://github.com/itaymigdal/LOLSpoof\n\nFully customisable, offensive security reporting solution designed for pentesters, red teamers and other security-related people alike. \n\nhttps://github.com/Syslifters/sysreptor\n\n#HackersFactory", "creation_timestamp": "2024-05-30T10:09:06.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/cb69c8a5-9c55-40d4-a183-d9dce141eba6/export"/>
    <published>2024-05-30T10:09:06+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/ff68ea34-785a-424b-afe4-f04386b5ec05/export</id>
    <title>ff68ea34-785a-424b-afe4-f04386b5ec05</title>
    <updated>2026-05-03T20:01:54.583575+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "ff68ea34-785a-424b-afe4-f04386b5ec05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-FR5H-RQP8-MJ6G", "type": "published-proof-of-concept", "source": "https://t.me/GhostsForum/21710", "content": "Tools - Hackers Factory\n\nIt creates a livedump of the machine through NtDebugSystemControl to extract the COM secret and context, to then inject inside this process.\n\nhttps://github.com/Slowerzs/PPLSystem\n\nAgentic LLM Vulnerability Scanner \n\nhttps://github.com/msoedov/agentic_security\n\nA Chrome/Firefox browser extension to show alerts for reflected query params, show Wayback archive links for the current path, show hidden elements and enable disabled elements. \n\nhttps://github.com/msoedov/agentic_security\n\nPowerful+Fast Kubernetes service discovery tools via kubernetes DNS service. Currently supported service ip-port BruteForcing / AXFR Domain Transfer Dump / Coredns WildCard Dump \n\nhttps://github.com/Esonhugh/k8spider\n\nHTTP 403 bypass tool \n\nhttps://github.com/trap-bytes/403jump\n\n\nMOBEXLER - A Mobile Application Penetration Testing Platform\n\nhttps://github.com/enciphers-team/Mobexler/blob/master/docs/index.md\n\nA library for detecting known secrets across many web frameworks \n\nhttps://github.com/blacklanternsecurity/badsecrets\n\nThe Yoast SEO plugin for WordPress is vulnerable to... \n\nhttps://github.com/advisories/GHSA-3733-6v6m-39mh\n\nServer-Side Request Forgery in Server Actions \n\nhttps://github.com/vercel/next.js/security/advisories/GHSA-fr5h-rqp8-mj6g\n\nFuzz 401/403/404 pages for bypasses \n\nhttps://github.com/intrudir/BypassFuzzer\n\nAn interactive shell to spoof some LOLBins command line \n\nhttps://github.com/itaymigdal/LOLSpoof\n\nFully customisable, offensive security reporting solution designed for pentesters, red teamers and other security-related people alike. \n\nhttps://github.com/Syslifters/sysreptor\n\n#HackersFactory", "creation_timestamp": "2024-05-30T10:10:01.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/ff68ea34-785a-424b-afe4-f04386b5ec05/export"/>
    <published>2024-05-30T10:10:01+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/68c8561a-8a7c-4353-ba1e-6559645cb827/export</id>
    <title>68c8561a-8a7c-4353-ba1e-6559645cb827</title>
    <updated>2026-05-03T20:01:54.583499+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "68c8561a-8a7c-4353-ba1e-6559645cb827", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-FR5H-RQP8-MJ6G", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/155", "content": "Tools - Hackers Factory\n\nCross Site Scripting ( XSS ) Vulnerability Payload List \n\nhttps://github.com/payloadbox/xss-payload-list\n\nYARA detection rule for CVE-2024-4367 arbitrary javascript execution in PDF.js \n\nhttps://github.com/spaceraccoon/detect-cve-2024-4367\n\nThe Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit. \n\nhttps://github.com/0xInfection/XSRFProbe\n\nhttps://github.com/blacklanternsecurity/badsecrets\n\nAutomation for javascript recon in bug bounty. \n\nhttps://github.com/KathanP19/JSFScan.sh\n\nTempMail is a simple web application that allows you to generate temporary email addresses and view the emails received by these addresses. \n\nhttps://github.com/mehmetkahya0/temp-mail \n\nThis Repositories contains list of One Liners with Descriptions and Installation requirements \n\nhttps://github.com/thecybertix/One-Liner-Collections\n\nAutomatic SSRF fuzzer and exploitation tool \n\nhttps://github.com/swisskyrepo/SSRFmap\n\nA tool to fastly get all javascript sources/files \n\nhttps://github.com/003random/getJS\n\nServer-Side Request Forgery in Server Actions \n\nhttps://github.com/vercel/next.js/security/advisories/GHSA-fr5h-rqp8-mj6g\n\nInQL is a robust, open-source Burp Suite extension for advanced GraphQL testing, offering intuitive vulnerability detection, customizable scans, and seamless Burp integration. \n\nhttps://github.com/doyensec/inql\n\n#HackersFactory", "creation_timestamp": "2024-06-17T14:00:55.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/68c8561a-8a7c-4353-ba1e-6559645cb827/export"/>
    <published>2024-06-17T14:00:55+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/fc0b106a-60c5-48e7-8989-8a65201265e0/export</id>
    <title>fc0b106a-60c5-48e7-8989-8a65201265e0</title>
    <updated>2026-05-03T20:01:54.582551+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "fc0b106a-60c5-48e7-8989-8a65201265e0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-FR5H-RQP8-MJ6G", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/158", "content": "Tools - Hackers Factory\n\nIt creates a livedump of the machine through NtDebugSystemControl to extract the COM secret and context, to then inject inside this process.\n\nhttps://github.com/Slowerzs/PPLSystem\n\nAgentic LLM Vulnerability Scanner \n\nhttps://github.com/msoedov/agentic_security\n\nA Chrome/Firefox browser extension to show alerts for reflected query params, show Wayback archive links for the current path, show hidden elements and enable disabled elements. \n\nhttps://github.com/msoedov/agentic_security\n\nPowerful+Fast Kubernetes service discovery tools via kubernetes DNS service. Currently supported service ip-port BruteForcing / AXFR Domain Transfer Dump / Coredns WildCard Dump \n\nhttps://github.com/Esonhugh/k8spider\n\nHTTP 403 bypass tool \n\nhttps://github.com/trap-bytes/403jump\n\n\nMOBEXLER - A Mobile Application Penetration Testing Platform\n\nhttps://github.com/enciphers-team/Mobexler/blob/master/docs/index.md\n\nA library for detecting known secrets across many web frameworks \n\nhttps://github.com/blacklanternsecurity/badsecrets\n\nThe Yoast SEO plugin for WordPress is vulnerable to... \n\nhttps://github.com/advisories/GHSA-3733-6v6m-39mh\n\nServer-Side Request Forgery in Server Actions \n\nhttps://github.com/vercel/next.js/security/advisories/GHSA-fr5h-rqp8-mj6g\n\nFuzz 401/403/404 pages for bypasses \n\nhttps://github.com/intrudir/BypassFuzzer\n\nAn interactive shell to spoof some LOLBins command line \n\nhttps://github.com/itaymigdal/LOLSpoof\n\nFully customisable, offensive security reporting solution designed for pentesters, red teamers and other security-related people alike. \n\nhttps://github.com/Syslifters/sysreptor\n\n#HackersFactory", "creation_timestamp": "2024-06-17T14:07:45.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/fc0b106a-60c5-48e7-8989-8a65201265e0/export"/>
    <published>2024-06-17T14:07:45+00:00</published>
  </entry>
</feed>
