{"uuid": "3881570c-cd76-4a87-9891-246e1dbc1fab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45866", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/7875", "content": "#Github #Tools \n\nRed teaming tool to dump LSASS memory, bypassing basic countermeasures.\n\nhttps://github.com/0xdea/blindsight\n\nCVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) \ud83d\udd13 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)\n\nhttps://github.com/pentestfunctions/BlueDucky\n\nFully functional, from-scratch alternative to the Cobalt Strike Beacon (red teaming tool), offering transparency and flexibility for security professionals and enthusiasts\n\nhttps://github.com/ElJaviLuki/CobaltStrike_OpenBeacon\n\nACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminating the need for tools like accesschk.exe or other non-native binaries.\n\nhttps://github.com/t3l3machus/ACEshark\n\nAims to identify sleeping beacons\n\nhttps://github.com/thefLink/Hunt-Sleeping-Beacons\n\nA Simple JS code to keylogger data and send it to the personal server\n\nhttps://github.com/11whoami99/XSS-keylogger\n\n#HackersForum", "creation_timestamp": "2025-01-10T09:06:03.000000Z"}