<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/static/style.xsl" type="text/xsl"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
  <id>https://db.gcve.eu/sightings/feed</id>
  <title>Most recent sightings.</title>
  <updated>2026-05-09T20:10:56.893644+00:00</updated>
  <author>
    <name>Vulnerability-Lookup</name>
    <email>info@gcve.eu</email>
  </author>
  <link href="https://db.gcve.eu" rel="alternate"/>
  <generator uri="https://lkiesow.github.io/python-feedgen" version="1.0.0">python-feedgen</generator>
  <subtitle>Contains only the most 10 recent sightings.</subtitle>
  <entry>
    <id>https://db.gcve.eu/sighting/208c6258-92fa-4a6e-9f93-5a42a8cf8272/export</id>
    <title>208c6258-92fa-4a6e-9f93-5a42a8cf8272</title>
    <updated>2026-05-09T20:10:57.713202+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "208c6258-92fa-4a6e-9f93-5a42a8cf8272", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-X574-M823-4X7W", "type": "seen", "source": "https://t.me/badbclubua/49", "content": "\u041e\u0431\u0445\u043e\u0434 \u0447\u0442\u0435\u043d\u0438\u044f \u0444\u0430\u0439\u043b\u043e\u0432 \u0432 vite.js https://github.com/vitejs/vite/security/advisories/GHSA-x574-m823-4x7w \u043f\u043e\u0438\u0441\u043a\u043e\u0432\u0438\u043a\u0438 \u0433\u043e\u0432\u043e\u0440\u044f\u0442 \u0447\u0442\u043e \u043d\u0430 \u0440\u043e\u0441\u0441\u0438\u0438 \u0435\u0441\u0442\u044c \u0442\u0430\u043a\u043e\u0435 \ud83d\ude08", "creation_timestamp": "2025-03-27T10:36:37.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/208c6258-92fa-4a6e-9f93-5a42a8cf8272/export"/>
    <published>2025-03-27T10:36:37+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/f2ddc5ef-2571-4a60-82d9-eb06b35c0be9/export</id>
    <title>f2ddc5ef-2571-4a60-82d9-eb06b35c0be9</title>
    <updated>2026-05-09T20:10:57.713136+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "f2ddc5ef-2571-4a60-82d9-eb06b35c0be9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-X574-M823-4X7W", "type": "published-proof-of-concept", "source": "Telegram/C1-VU2gk3ZCgj49KfzdA3E3vdUpKoicmY6MT6hUVGsPZAac", "content": "", "creation_timestamp": "2025-03-27T11:11:50.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/f2ddc5ef-2571-4a60-82d9-eb06b35c0be9/export"/>
    <published>2025-03-27T11:11:50+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/81cb91cf-b660-4168-b437-ea5a37d5c504/export</id>
    <title>81cb91cf-b660-4168-b437-ea5a37d5c504</title>
    <updated>2026-05-09T20:10:57.713026+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "81cb91cf-b660-4168-b437-ea5a37d5c504", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-X574-M823-4X7W", "type": "published-proof-of-concept", "source": "https://t.me/NinjaSec/28332", "content": "Umbrella is a file dropper dedicated to pentest, its download files on target system are execute them without a double execution of exe, only of embed.\n\ngit clone https://github.com/4w4k3\n\nWifiphisher\u00a0is a rogue Access Point framework for conducting red team engagements or Wi-Fi security testing. Using Wifiphisher, penetration testers can easily achieve a man-in-the-middle position against wireless clients by performing targeted Wi-Fi association attacks. Wifiphisher can be further used to mount victim-customized web phishing attacks against the connected clients in order to capture credentials (e.g. from third party login pages or WPA/WPA2 Pre-Shared Keys) or infect the victim stations with malwares.\n\ngit clone https://github.com/wifiphisher/wifiphisher.git # Download the latest revision \n\nTermux repository for hacking tools and packages\n\nhttps://github.com/Hax4us/TermuxBlack\n\n#Termux\n\nThis channel is dedicated to educational purposes.\n\nEasY_HaCk is a tool for network scanning and information gathering\n\n\u2022 git clone https://github.com/sabri-zaki/EasY_HaCk\n\nWishphish is a Termux tool which using for hack someone's front camera using a permission link..we wanna port forwarding tools for generate link..and we can grab someone picture when he opened this link and give allow permission.\n\n\u2022 git clone https://github.com/kinghacker0/WishFish\n\nBLACKPHISH\n\nNOTE:This is still in BETA so you may see problems, please open an issue on GitHub and report them!\n\n$ git clone https://github.com/iinc0gnit0/BlackPhish\n\n#Termux\n\nserver.fs.deny bypassed when using ?raw?? \u00b7 Advisory \u00b7 vitejs/vite \u00b7 \n\nhttps://github.com/vitejs/vite/security/advisories/GHSA-x574-m823-4x7w\n\nInstantly share code, notes, and snippets.\n\nhttps://gist.github.com/grugq/03167bed45e774551155\n\n0day Today is the ultimate database of exploits and vulnerabilities\n\nhttps://0day.today\n\n./Phone: a mobile phone forensic framework for security researchers and forensic experts.\n\nIt's now available on github, follow the instructions and you will get it up and running successfully.\n\nhttps://github.com/cyb3rfortr3ss/Phone\n\nKali Linux 2024.4! \n\nhttps://kali.org/blog/kali-linux-2024-4-release/\n\nContaining new default python, updates to gnome 47, raspberry pi imager improvements, nethunter updates and more! Check it out!\n\n#CyberBulletin\n\nURLFINDER\n\n- different sources (alienvault,commoncrawl etc)\n- filter by extensions/regex\n- very fast (122000+ URLs in 30 sec):\n\nhttps://github.com/projectdiscovery/urlfinder\n\nOSINT Tool For Research Social Media Accounts By Username\n\nhttps://github.com/AnkhCorp/Snoop\n\nA tool to identify technologies and services used by domains through their DNS footprints\n\nhttps://github.com/Elite-Security-Systems/radar\n\nTop 20 Bug Bounty Platforms \n \n- HackerOne\n- Bugcrowd\n- Synack\n- YesWeHack\n- Intigriti\n- Open Bug Bounty\n- Hacken Proof\n- Cobalt\n- ZeroCopter\n- Bugbounter\n- Detectify\n- SafeHats\n-Secuna\n- Vulnerability Lab\n- Yogosha\n- BugBounty.jp\n- CyberArmy\n- Hackrate\n- Bounty Factory\n- Immunefi\n\n\ud83e\udd77\n\nA collection of several hundred online tools for OSINT.\n\nhttps://github.com/cipher387/osint_stuff_tool_collection\n\nPEN-300 (OSEP) resource.\n \nhttps://github.com/In3x0rabl3/OSEP\n\nIf you know about hacking you know that, one of the\u00a0most fatal hacker attacks\u00a0is the Dos (denial of service) attack. XLR8_BOMBER\u00a0is\u00a0a Dos attack tool for SMS,\u00a0it\u00a0sends 100s of SMS as well as calls on someone's phone so that they cannot use their phone properly.\n\n\u2022 git clone https://github.com/khansaad1275/XLR8_BOMBER\n\nThe unique thing about this tool is that it also helps you to\u00a0bypass 2-factor authentication. This tool uses NGrok tunneling so you can use this tool on public networks.\u2076\n\n\u2022 git clone https://github.com/The-Boss-Hacker/BossAdv.git\n\nLazyMux is a tool that helps you to install and use multiple penetration testing and hacking tools on the Android system with ease.", "creation_timestamp": "2025-04-18T13:50:58.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/81cb91cf-b660-4168-b437-ea5a37d5c504/export"/>
    <published>2025-04-18T13:50:58+00:00</published>
  </entry>
  <entry>
    <id>https://db.gcve.eu/sighting/22d95b33-5b44-4979-8ea8-2bcdba3ccea5/export</id>
    <title>22d95b33-5b44-4979-8ea8-2bcdba3ccea5</title>
    <updated>2026-05-09T20:10:57.709507+00:00</updated>
    <author>
      <name>cedric</name>
      <uri>http://db.gcve.eu/user/cedric</uri>
    </author>
    <content>{"uuid": "22d95b33-5b44-4979-8ea8-2bcdba3ccea5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "GHSA-X574-M823-4X7W", "type": "seen", "source": "https://t.me/NinjaSec/217", "content": "1. File Droppers / Remote Execution Tools\n\nUmbrella \u2013 File dropper for pentests, executes files silently\nhttps://github.com/4w4k3\n\nDocEx \u2013 Document-based data exfiltration\nhttps://github.com/DarkSpaceSecurity/DocEx\n---\n\n2. Wireless Attacks / Wi-Fi Pentesting\n\nWifiphisher \u2013 Rogue access point framework\nhttps://github.com/wifiphisher/wifiphisher.git\n---\n\n3. Termux Tool Collections\n\nTermuxBlack \u2013 BlackArch-like repo for Termux\nhttps://github.com/Hax4us/TermuxBlack\n\nDevilX \u2013 110+ tools installer\nhttps://github.com/MrHacker-X/DevilX.git\n\nLazyMux \u2013 Easy installer for pentesting tools\nhttps://github.com/Gameye98/Lazymux\n\nT-Remix \u2013 Termux customizer with password and prompt themes\nhttps://github.com/Bhaviktutorials/T-Remix\n\nDh-All \u2013 300+ hacking tools in one installer\nhttps://github.com/DH-AL/Dh-All\n---\n\n4. OSINT / Recon / Information Gathering\n\nSMWYG \u2013 Massive credentials database for OSINT\nhttps://github.com/Viralmaniar/SMWYG-Show-Me-What-You-Got.git\n\nTrape \u2013 Real-time OSINT and social engineering framework\nhttps://github.com/jofpin/trape.git\n\nSnoop \u2013 Social media OSINT by username\nhttps://github.com/AnkhCornp/Snoop\n\nRadar \u2013 Tech &amp;amp; service detection via DNS footprints\nhttps://github.com/Elite-Security-Systems/radar\n\nOSINT Tool Collection \u2013 100s of OSINT utilities\nhttps://github.com/cipher387/osint_stuff_tool_collection\n\nCustom OSINT Search Engines\nhttps://github.com/paulpogoda/OSINT-CSE\n\nONIOFF \u2013 Inspect Deep Web (onion) URLs\nhttps://github.com/k4m4/onioff.git\n---\n\n5. Phishing / Social Engineering Tools\n\nWishFish \u2013 Front camera phishing via link\nhttps://github.com/kinghacker0/WishFish\n\nBlackPhish \u2013 Phishing tool (BETA)\nhttps://github.com/iinc0gnit0/BlackPhish\n\nBlack Mafia (PUBG Phishing)\nhttps://github.com/lovehacker404/Phishing\n\nSocialFish \u2013 Phishing &amp;amp; information collector\nhttps://github.com/UndeadSec/SocialFish\n---\n\n6. Exploits &amp;amp; Vulnerability Research\n\nCommix \u2013 Command injection automation\nhttps://github.com/commixproject/commix.git\n\nUFONet \u2013 DDoS via botnets\nhttps://github.com/epsylon/ufonet.git\n\nURLFinder \u2013 Extract URLs from multiple sources\nhttps://github.com/projectdiscovery/urlfinder\n\nOSEP Resource (PEN-300)\nhttps://github.com/In3x0rabl3/OSEP\n\nFaraday \u2013 Vulnerability management platform\n\nCore: https://github.com/infobyte/faraday.git\n\nFrontend: https://github.com/infobyte/faraday_angular_frontend.git\n---\n\n7. SMS / Call Bombers\n\nXLR8_BOMBER \u2013 SMS/Call spam tool\nhttps://github.com/khansaad1275/XLR8_BOMBER\n\nMaster Bomber 2.0 \u2013 Online SMS/Call bomber\nhttps://github.com/jatinkalwar/m-bomber2.O\n---\n\n8. Remote Access / RATs\n\nAsyncRAT Dark Mode\nhttps://github.com/MonsterCadd/AsyncRAT-Dark-Mode\n---\n\n9. Bash / Virus Tools\n\nInfect \u2013 Bash-based Android virus spreader (warning: destructive)\nhttps://github.com/noob-hackers/infect\n---\n\n10. Brute Force &amp;amp; Automation\n\nBrutegram \u2013 Instagram brute forcer\nhttps://github.com/Err0r-ICA/Brutegram\n---\n\n11. Mobile Forensics / Analysis\n\n./Phone \u2013 Mobile forensic toolkit\nhttps://github.com/cyb3rfortr3ss/Phone\n---\n\n12. Video / Media Tools\n\nbash2mp4 \u2013 YouTube video downloader for Termux\nhttps://github.com/htr-tech/bash2mp4\n\nInsta_report_eyes \u2013 Instagram report sender\nhttps://github.com/z6il/Insta_report_eyes\n---\n\n13. Operating Systems / Environment Tools\n\nInstall Ubuntu on Termux (No Root)\nhttps://github.com/tahmidrayat/ubuntu\n---\n\n14. Hacking Toolkits &amp;amp; Generators\n\nKitHack \u2013 Toolkit and backdoor generator\nhttps://github.com/AdrMXR/KitHack\n\nBossAdv \u2013 2FA Bypass + Tunneling tool\nhttps://github.com/The-Boss-Hacker/BossAdv.git\n---\n\n15. Compilation / Exploit Injectors\n\nElfDoor-gcc \u2013 Inject payload into binaries via gcc\nhttps://github.com/MatheuZSecurity/ElfDoor-gcc\n---\n\n16. Vulnerability / Exploit Databases\n\n0day.today \u2013 Database of public and private exploits\nhttps://0day.today\n---\n\n17. Notable Links / References\n\nViteJS Advisory\nhttps://github.com/vitejs/vite/security/advisories/GHSA-x574-m823-4x7w\n\ngrugq Snippet (Operational Security)\nhttps://gist.github.com/grugq/03167bed45e774551155\n\nKali Linux 2024.4 Release Notes\nhttps://kali.org/blog/kali-linux-2024-4-release/\n\n#GrayHats", "creation_timestamp": "2025-04-19T16:26:39.000000Z"}</content>
    <link href="https://db.gcve.eu/sighting/22d95b33-5b44-4979-8ea8-2bcdba3ccea5/export"/>
    <published>2025-04-19T16:26:39+00:00</published>
  </entry>
</feed>
