{"uuid": "2d558d2e-ed5a-4879-9856-9ed7351d0634", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2020-2509", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/2172", "content": "#Tool - \ud835\udddb\ud835\uddee\ud835\uddf0\ud835\uddf8\ud835\uddf2\ud835\uddff\ud835\ude00 \ud835\uddd9\ud835\uddee\ud835\uddf0\ud835\ude01\ud835\uddfc\ud835\uddff\ud835\ude06\n\n\u200b\u200bWinPwnage\n\nWindows UAC bypass, Elevate, Persistence methods \n\nhttps://github.com/rootm0s/WinPwnage\n\ngo-shellcode-loader\n\nGO obfuscation, shellcode loader AES encryption.\n\nhttps://github.com/HZzz2/go-shellcode-loader\n\n\u200b\u200bTerraformGoat\n\nTerraformGoat is selefra research lab's \"Vulnerable by Design\" multi cloud deployment tool.\n\nCurrently supported cloud vendors include Alibaba Cloud, Tencent Cloud, Huawei Cloud, Amazon Web Services, Google Cloud Platform, Microsoft Azure.\n\nhttps://github.com/selefra/TerraformGoat\n\n\u200b\u200bOverkill \n\nExploit for a patched vulnerability affecting QNAP QTS. Due to the way QNAP discloses vulnerabilities, I'm unsure if this issue has a CVE or not. However, it was likely patched in November 2020 and April 2021. The n-day was \"discovered\" while doing diff analysis for CVE-2020-2509.\n\nhttps://github.com/jbaines-r7/overkill\n\n\u200b\u200bSSL Checker\n\nPython script that collects SSL/TLS information from hosts\n\nIt's a simple script running in python that collects SSL/TLS information then it returns the group of information in JSON. It can also connect through your specified SOCKS server.\n\nhttps://github.com/narbehaj/ssl-checker\n\nOauth-scan \n\n#Burp Suite Extension written in Java with the aim to provide some automatic security checks, which could be useful during penetration testing on applications implementing OAUTHv2 and OpenID standards.\n\n\u25ab\ufe0f Open Redirect issues on Redirect_Uri parameter\n\u25ab\ufe0f Authorization Code Replay issues\n\u25ab\ufe0f Leakage of secrets (i.e. Tokens, Codes)\n\u25ab\ufe0f PKCE misconfigurations\n\u25ab\ufe0f Nonce parameter misconfigurations\n\nhttps://github.com/PortSwigger/oauth-scan\n\n\u200b\u200bAntiDDOS-system\n\nProtect your web app from #DDOS attack or the Dead Ping + CAPTCHA VERIFICATION in one line! \n\nCaptcha integrated into the system, if he passes this check, then it is a human and not a robot! \n\nhttps://github.com/Sanix-Darker/AntiDDOS-system\n\n\u200b\u200bAPIKit\n\nDiscovery, Scan and Audit APIs Toolkit All In One.\n\nhttps://github.com/API-Security/APIKit\n\n\u200b\u200bTropX\n\nThe best penetration testing and tech tools unified into one beatiful command line interface!\n\nCommand line application to run penetration testing scripts. It aims to more efficiently run long processes and tedious tasks by allowing the creation of custom scripts in the CLI that can be run whenever. \n\nhttps://github.com/troopek/TropX\n\n\u200b\u200bbopscrk\n\nTool to generate smart and powerful wordlists.\n\nTargeted-attack wordlist creator: introduce personal info related to target, combines every word and transforms results into possible passwords. The lyricpass module allows to search lyrics related to artists and include them to the wordlists.\n\nhttps://github.com/r3nt0n/bopscrk\n\n\u200b\u200bWinpayloads\n\nUndetectable Windows Payload Generation.\n\nFeatures:\n1. Persistence - Adds payload persistence on reboot\n2. Psexec Spray - Spray hashes until successful connection and psexec payload on target\n3. Upload to local webserver - Easy deployment\n4. Powershell stager - allows invoking payloads in memory &amp; more\n5. Anti sandboxing techniques\n6. Custom shellcode\n\nhttps://github.com/nccgroup/Winpayloads\n\n\u200b\u200bErebus \n\nFast and customisable parameter based vulnerability scanner based on simple YAML Rules\n\nErebus is used to test every parameter across targets based on Yaml templates leading to zero false positives and providing fast scanning on large number of hosts. Erebus offers many useful features including an intercepting proxy which allows researchers to browse the web, click on links and erebus will test every parameter that passes through the proxy.\n\nhttps://github.com/ethicalhackingplayground/erebus\n\n\u200b\u200bZeratool\n\nAutomatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems\n\nThis tool uses angr to concolically analyze binaries by hooking printf and looking for unconstrained paths. \n\nhttps://github.com/ChrisTheCoolHut/Zeratool\n\nTool \ud835\udddb\ud835\uddee\ud835\uddf0\ud835\uddf8\ud835\uddf2\ud835\uddff\ud835\ude00 \ud835\uddd9\ud835\uddee\ud835\uddf0\ud835\ude01\ud835\uddfc\ud835\uddff\ud835\ude06\nwww.ghostclan.org", "creation_timestamp": "2022-12-24T16:06:16.000000Z"}