{"uuid": "4de972da-5002-41d0-a708-e38e7a2a18a1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-38389", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3175", "content": "Hackers Factory \n\nCVE-2023-38389 &lt; Wordpress &lt; JupiterX Core &lt; Unauthenticated Account Takeover\n\nhttps://github.com/codeb0ss/CVE-2023-38389-PoC\n\nShodan Dorks\n\nhttps://github.com/HernanRodriguez1/Dorks-Shodan-2023\n\nA modern tool written in Python that automates your xss findings.\n\nhttps://github.com/faiyazahmad07/xss_vibes\n\nAn open-source intelligence (OSINT) analysis tool leveraging GPT-powered embeddings and vector search engines for efficient data processing\n\nhttps://github.com/estebanpdl/osintgpt\n\nThe only graphql wordlists you'll ever need. Operations, field names, type names... Collected on more than 60k distinct GraphQL schemas.\n\nhttps://github.com/Escape-Technologies/graphql-wordlist\n\nNucleiFuzzer is a Powerful Automation tool for detecting XSS, SQLi, SSRF, Open-Redirect, etc.. Vulnerabilities in Web Applications\n\nhttps://github.com/0xKayala/NucleiFuzzer\n\nTunnlTo is a lightweight, fast, Windows WireGuard VPN client built for split tunneling.\n\nhttps://github.com/TunnlTo/desktop-app\n\nA list of writeups from the Google VRP Bug Bounty program\n\nhttps://github.com/xdavidhu/awesome-google-vrp-writeups\n\nReading an Arbitrary ThinkPHP 5.X File.\n\nhttps://github.com/momika233/TP5_Arbitrary_file_read/blob/main/TP5_Arbitrary_file_read.yaml\n\nA simple utility to perform reverse WHOIS lookups using whoisxml API\n\nhttps://github.com/devanshbatham/revwhoix\n\n#infosec #cybersecurity #hackersfactory \n\nhttps://t.me/dilagrafie", "creation_timestamp": "2023-09-02T10:33:45.000000Z"}