{"uuid": "3cf33ef4-d7dc-4324-96cf-491fb6591ac7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-5830", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/1011", "content": "Tools - Hackers Factory \n\nSmall security related tools created in Python and Bash for CTF players, bug bounty hunters, pentesters and developers.\n\nhttps://github.com/bl4de/security-tools\n\nCrawl4AI: Open-source LLM Friendly Web Crawler &amp; Scrapper\n\nhttps://github.com/unclecode/crawl4ai\n\nTerminate AV/EDR Processes using kernel driver\n\nhttps://github.com/mertdas/SharpTerminator\n\nSmart contract audit skills roadmap for beginners, auditors, engineers, etc.\n\nhttps://github.com/slowmist/SlowMist-Learning-Roadmap-for-Becoming-a-Smart-Contract-Auditor\n\nReflective DLL Injection Made Bella\n\nhttps://github.com/oldboy21/RflDllOb\n\nScriptSentry finds misconfigured and dangerous logon scripts.\u00a0 \n\nhttps://github.com/techspence/scriptsentry\n\nActivation cache poisoning to elevate from medium to high integrity (CVE-2024-6769) \n\nhttps://github.com/fortra/CVE-2024-6769\n\nExploitation of a type confusion vulnerability in v8 (Chrome, CVE-2024-5830)\n\nhttps://github.blog/security/vulnerability-research/from-object-transition-to-rce-in-the-chrome-renderer/\n\nEDR &amp; Antivirus Bypass to Gain Shell Access.\n\nhttps://github.com/murat-exp/EDR-Antivirus-Bypass-to-Gain-Shell-Access\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-02T05:45:02.000000Z"}