{"uuid": "58da2536-10b4-4f79-aca0-c3e50843eba5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38014", "type": "seen", "source": "https://t.me/InfoSecInsider/302", "content": "Tools - Hackers Factory \n\nWrite-up of a malware analysis of an #opendir python code.\n\nOpen Dir -&gt; Obfuscated Python -&gt; DONUT Launcher -&gt; XWorm\n\nhttps://github.com/lasq88/MalwareAnalysis/blob/main/writeups/xworm/xworm.md\n\nWhatsApp-extension-manipulation-PoC\n\nhttps://github.com/0x6rss/WhatsApp-extension-manipulation-PoC/blob/main/wp.py\n\nThe simulation includes written tools, C2 servers, backdoors, exploitation techniques, stagers, bootloaders, and many other tools.\n\nHttps://github.com/S3N4T0R-0X0/APT-Attack-Simulation\n\nIvanti EPM AgentPortal RCE Vulnerability\n https://github.com/horizon3ai/CVE-2024-29847\n\nCVE-2024-29847: Deserialization of untrusted data in the agent portal of Ivanti EPM before 2022 SU6, or the 2024 September update allows a remote unauthenticated attacker to achieve remote code execution.\n\nhttps://github.com/horizon3ai/CVE-2024-29847\n\nCVE-2024-38014: Windows Installer Elevation of Privilege Vulnerability.\n\nhttps://github.com/sec-consult/msiscan?tab=readme-ov-file\n\nCVE-2024-30051: Windows DWM Core Library Elevation of Privilege Vulnerability.\n\nhttps://github.com/fortra/CVE-2024-30051?tab=readme-ov-file\n\nDecrypt GlobalProtect configuration and cookie files.\n https://github.com/rotarydrone/GlobalUnProtect\n\nSniffnet\n\nApplication to comfortably monitor your Internet traffic\n\nhttps://github.com/GyulyVGC/sniffnet\n\nParse FFUF results in GUI with option to sort based on response code, size, keyword\n\nhttps://github.com/VikzSharma/ffufwebparser\n\n#CyberDilara \nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-16T08:01:25.000000Z"}