{"vulnerability": "cve-2022-20494", "sightings": [{"uuid": "9e71542b-fb5c-47d2-a164-9fd475f801f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2022-20494", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/2381", "content": "\u200b\u200bADB-Toolkit\n\nADB-Toolkit is a BASH Script with 28 options and an #METASPLOIT Section which has 6 options which is made to do easy penetration testing in #Android Device. \n\nhttps://github.com/ASHWIN990/ADB-Toolkit\n\n\u200b\u200bworkslikeaJARM\n\nMethod of finding interesting domains using keywords + JARMs.\n\nhttps://github.com/sketchymoose/workslikeaJARM\n\nDetails:\nhttps://sketchymoose.blogspot.com/2023/01/they-are-always-after-me-lucky-jarms.html\n\n\u200b\u200bBugHunter Nuclei templates\n\nI will upload more #nuclei templates that help during the #bugbounty hunting process.\n\nhttps://github.com/ayadim/Nuclei-bug-hunter\n\n\u200b\u200bCVE-2022-20494\n\nExploit app for CVE-2022-20494, a high severity permanent denial-of-service vulnerability that leverages Android's DND (Do not disturb) feature.\n\nhttps://github.com/Supersonic/CVE-2022-20494\n\n\u200b\u200bHW Call Stack\n\nYet another \"Call Stack Spoofing\" implementation. Works for syscalls and APIs, supports x64, x86 and WoW64.\n\nhttps://github.com/fortra/hw-call-stack\n\n\u200b\u200bDigitalOcean Droplet Proxy for Burp Suite\n\nUse this #Burp plugin to automatically spin up a DigitalOcean droplet whenever Burp starts, and shut it down whenever Burp closes. The droplet functions as a SOCKS5 proxy, and the Burp settings are automatically updated to route traffic through the droplet.\n\nhttps://github.com/honoki/burp-digitalocean-droplet-proxy\n\n\u200b\u200bHooka\n\nShellcode loader, hooks detector and more written in Golang.\n\nhttps://github.com/D3Ext/Hooka\n\n\u200b\u200bDroneSecurity\n\nThis project is a receiver for DJI's Drone-ID protocol. The receiver works either live with an SDR, or offline on pre-recorded captures. \n\nhttps://github.com/RUB-SysSec/DroneSecurity\n\nstylehax\n\nA Nintendo DSi browser #exploit.\n\nSee it in action on YouTube! Check out the blog post for the technical writeup.\n\nhttps://github.com/nathanfarlow/stylehax\n\nDetails:\nhttps://farlow.dev/2023/03/02/hacking-the-nintendo-dsi-browser\n\n\u200b\u200bCamRaptor\n\nA tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials.\n\nhttps://github.com/EntySec/CamRaptor\n\n\u200b\u200bVulnPlanet \ud83e\ude90\n\nWell-structured vulnerable code snippets with fixes for Web2, Web3, API, Mobile (iOS and Android) and Infrastructure-as-Code (IaC)\n\nhttps://github.com/yevh/VulnPlanet\n\n\u200b\u200bs6_pcie_microblaze\n\nPCI Express DIY hacking toolkit for Xilinx SP605. This repository is also home of Hyper-V Backdoor and Boot Backdoor\n\nhttps://github.com/Cr4sh/s6_pcie_microblaze\n\n\u200b\u200bInvoke-PSObfuscation\n\nAn in-depth approach to obfuscating the individual components of a PowerShell payload whether you're on Windows or Kali Linux.\n\nhttps://github.com/gh0x0st/Invoke-PSObfuscation\n\n\u200b\u200bXSStrike\n\nAdvanced #XSS Detection Suite\n\nXSStrike is a Cross Site Scripting detection suite equipped with four hand written parsers, an intelligent payload generator, a powerful fuzzing engine and an incredibly fast crawler.\n\nhttps://github.com/s0md3v/XSStrike\n\n\u200b\u200bEnvizon \n\nNetwork visualization &amp; pentest reporting\n\nThis tool is designed, developed and supported by evait security. In order to give something back to the security community, we publish our internally used and developed, state of the art network visualization and vulnerability reporting tool, 'envizon'. We hope your feedback will help to improve and hone it even further.\n\nhttps://github.com/evait-security/envizon\n\n\u200b\u200bgotld\n\nEnumerate all possible root domains of any organization on the fly \u2728\n\nCommand-line tool to enumerate top-level domains, check response codes and find potential vulnerabilities for bug bounty hunters and security researchers.\n\nhttps://github.com/WHOISshuvam/gotld\n\n\u200b\u200bdirsearch \n\nWeb path discovery. \n\nAn advanced web path brute-forcer.\n\nhttps://github.com/maurosoria/dirsearch\n\n\u200b\u200bGo-Hacking\n\nA comprehensive and FREE Online Go hacking tutorial utilizing the x64, ARM64 and ARM32 architectures going step-by-step into the world of reverse engineering Golang from scratch.\n\nhttps://github.com/mytechnotalent/Go-Hacking\n\nBTC:\nbc1q62lwma4r3w3klq4mcn5hys9nps5h40qmafrc8e\n\n\ud835\udddb\ud835\uddee\ud835\uddf0\ud835\uddf8\ud835\uddf2\ud835\uddff\ud835\ude00 \ud835\uddd9\ud835\uddee\ud835\uddf0\ud835\ude01\ud835\uddfc\ud835\uddff\ud835\ude06\nhttps://t.me/dilagrafie\n\n2/2", "creation_timestamp": "2023-03-05T09:31:54.000000Z"}]}