{"uuid": "0442e063-a9dc-42c8-9218-ec281df7f375", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-5630", "type": "published-proof-of-concept", "source": "https://t.me/HackClubFoundation/117", "content": "\ud83c\udd95TOOLS HACKING \ud83d\udd25\ud83d\udd25\ud83d\udd25\n\n\ud83d\udcbbExploit MENU\ud83d\udd1d\n1. AutoXploiter Bot\n2. Splitter+Auto Run\n3. Perlalfa scan+Auto upload\n4. Phpunit scan+Auto upload\n5. WP-CVE-2023-5630 scan+Auto upload\n6. Subfinder V2\n7. Lavmanager Scanner\n8. Config File Scanner\n9. JFU Scanner\n10. KCFinder Scanner\n11. Joomla Exploit\n12. Alfa-Roxy-RSF-WPInstall-phpuniy Exploit[GOOD!]\n13. PRESTASHOP 200 BOT\n14. Exploit phpmyadmin+Laravrel\n\n\ud83c\udf10GRABBER MENU\ud83d\udc68\u200d\ud83d\udcbb\n1. Grab By Domain\n2. Unlimit Grabber\n3. Grabber By Page\n4. Reverse IPs V1\n5. Reverse IPs V2\n6. Grabber Zone-H\n\n\ud83d\udccaOTHER MENU\ud83d\udd25\n1. Mass Subdomain Finder\n2. CMS Scanner\n3. Remove Duplicate\n4. Brute Force Password Webshell\n5. Add https/http\n6. Delete https/http\n7. mass upload cpannel to shell\n8. Mass Upload Shell WP File Manager\n\n\u2b07\ufe0fFree Update\n\u2b07\ufe0f Full Tutorial\n\u2b07\ufe0f Open Source\n\u2b07\ufe0fFor Price can nego![tipis]\n\u2b07\ufe0f pay via \ud83d\udc68\u200d\ud83e\uddb3\n\ud83d\ude80 @ZyyExploiter", "creation_timestamp": "2024-11-27T12:48:12.000000Z"}