{"uuid": "501c7373-e0f1-414a-88cf-ca3d8639d306", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-4427", "type": "published-proof-of-concept", "source": "https://t.me/lcmysecteamch/6627", "content": "Tools - Hackers Factory \n\nPoC for a SMS-based shell. Send commands and receive responses over SMS from mobile broadband capable computers\n\nhttps://github.com/persistent-security/SMShell\n\nLinux anti-debugging and anti-analysis rust library\n\nhttps://github.com/0xor0ne/debugoff\n\nNuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)\n\nhttps://github.com/kaanatmacaa/CVE-2024-23897\n\nCVE-2023-4427\n\nhttps://github.com/tianstcht/CVE-2023-4427\n\nDisable Windows Defender (+ UAC Bypass, + Upgrade to SYSTEM)\n\nhttps://github.com/EvilGreys/Disable-Windows-Defender-\n\nA repo for TPM sniffing greatness\n\nhttps://github.com/NoobieDog/TPM-Sniffing\n\nSmall toolkit for extracting information and dumping sensitive strings from Windows processes\n\nhttps://github.com/mlcsec/proctools\n\nSecretPixel is a cutting-edge steganography tool designed to securely conceal sensitive information within images. It stands out in the realm of digital steganography by combining advanced encryption, compression, and a seeded Least Significant Bit (LSB) technique to provide a robust solution for embedding data undetectably.\n\nhttps://github.com/x011/SecretPixel\n\nSmall toolkit for extracting information and dumping sensitive strings from Windows processes\n\nhttps://github.com/mlcsec/proctools\n\nThe code that wasn\u2019t there: Reading memory on an Android device by accident\n\nhttps://github.blog/2023-02-23-the-code-that-wasnt-there-reading-memory-on-an-android-device-by-accident/\n\n#HackersFactory", "creation_timestamp": "2024-02-12T11:50:19.000000Z"}