{"uuid": "2fa4bae9-adaf-4c7e-b9b7-306b494336bd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38200", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/1001", "content": "Tools - Hackers Factory \n\nSpider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported.\n\nhttps://github.com/blacklanternsecurity/MANSPIDER\n\nNameless C2 - A C2 with all its components written in Rust.\n\nhttps://github.com/trickster0/NamelessC2\n\nBOF for C2 framework\n\nhttps://github.com/mr-r3bot/bof-modules\n\nCUPSHax\n\nhttps://github.com/RickdeJager/cupshax\n\nA work in progress BOF/COFF loader in Rust.\n\nhttps://github.com/yamakadi/ldr\n\nCVE-2024-38200 - Microsoft Office NTLMv2 Disclosure Vulnerability.\n\nhttps://github.com/passtheticket/CVE-2024-38200\n\nCompleted update for my TrustedInstaller process execution tool.\n\nhttps://github.com/daem0nc0re/PrivFu?tab=readme-ov-file#trustexec\n\n#CyberDilara \nhttps://t.me/CyberDilara", "creation_timestamp": "2024-09-30T08:34:27.000000Z"}