{"uuid": "67e1bb71-457e-41d9-99cd-b9366a095f8d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-32353", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3081", "content": "proXXy\n\nA super simple multithreaded proxy scraper; scraping &amp; checking ~50k HTTP, HTTPS, SOCKS4, &amp; SOCKS5 proxies.\n\nhttps://github.com/Atropa-Solanaceae/proXXy\n\n#privacy #infosec #pentesting\n\n\u200b\u200bCVE-2023-32353\n\nLocal privilege escalation via iTunes in Windows.\n\nhttps://github.com/86x/CVE-2023-32353-PoC\n\n#cve #cybersecurity #infosec\n\n\u200b\u200bZIP Domains\n\nWelcome to our project dedicated to providing up-to-date data on newly registered .zip domains. With the recent introduction of the .zip top-level domain (TLD) by Google, concerns have arisen within the community regarding potential attack vectors associated with this TLD. To address these concerns and ensure the safety of internet users, we have initiated this workflow aimed at gathering comprehensive information about .zip domains as they are registered.\n\nhttps://github.com/trickest/zip\n\n#cybersecurity #infosec\n\n\u200b\u200bDCMB\n\nDont Call Me Back - Dynamic kernel callback resolver.\n\nhttps://github.com/GetRektBoy724/DCMB\n\n#cybersecurity #infosec\n\n\u200b\u200bThreat hunting/detecting using KQL queries\n\nA repository of KQL queries focused on threat hunting and threat detecting for Microsoft Sentinel &amp; Microsoft 365 Defender.\n\nhttps://github.com/cyb3rmik3/KQL-threat-hunting-queries\n\n#cybersecurity #infosec\n\n\u200b\u200bBanshee\n\nExperimental Windows x64 Kernel Rootkit.\n\nhttps://github.com/eversinc33/Banshee\n\n#infosec #pentesting #redteam\n\n\u200b\u200bKRBTGS \n\nA post-exploitation option for #CobaltStrike to retrieve a working TGT for the current user that Beacon is running as, or impersonating.\n\nhttps://github.com/realoriginal/krbtgs\n\n#infosec #pentesting #redteam\n\n\u200b\u200bhorQRux\n\nBy splitting a #QR code into 7 fragments, we may physically split and distribute a #secret into the real world. For example by printing the QR fragments onto transparent paper and handing them out to multiple people.\n\nhttps://github.com/jzck/horqrux\n\n\u200b\u200bRansomware Map\n\nMap tracking #ransomware ecosystem, by OCD World Watch team.\n\nhttps://github.com/cert-orangecyberdefense/ransomware_map\n\n#cybersecurity #infosec\n\n\u200b\u200bNekoClient\n\nIt appears that the attacker behind CurseForge's June 2023 malware incident posted a deobfuscated version of their malware by accident.\n\nhttps://github.com/clrxbl/NekoClient\n\n#infosec #pentesting #redteam\n\n\u200b\u200bNODESUB\n\nA command-line tool for finding subdomains in bug bounty programs. It supports various subdomain enumeration techniques and provides flexible options for customization.\n\nhttps://github.com/pikpikcu/nodesub\n\n#infosec #pentesting #bugbounty\n\n\u200b\u200bOSINT-SPY \n\nPerforms #OSINT scan on email/domain/ip_address/organization using OSINT-SPY. It can be used by Data Miners, Infosec Researchers, Penetration Testers and cyber crime investigator in order to find deep information about their target.\n\nhttps://github.com/SharadKumar97/OSINT-SPY\n\n#cybersecurity #infosec #pentesting\n\n\u200b\u200bPhoneInfoga\n\nInformation gathering framework for phone numbers.\n\nhttps://github.com/sundowndev/PhoneInfoga\n\n#OSINT #infosec #recon #best\n\n\u200b\u200bmsa-exploit-checker\n\nPoC and checker tool to detect if \"The Exploit\" for Microsoft accounts is enabled.\n\nhttps://github.com/george/msa-exploit-checker\n\n#cybersecurity #infosec\n\n\u200b\u200bHiphp\n\nFree &amp; Open source project for create a BackDoor to control PHP-based sites.\n\nhttps://github.com/yasserbdj96/hiphp\n\n#infosec #pentesting #redteam\n\n\u200b\u200bDavRelayUp\n\nA universal no-fix local privilege escalation in domain-joined windows workstations where LDAP signing is not enforced (the default settings).\n\nhttps://github.com/yasserbdj96/hiphp\n\n#infosec #pentesting #redteam\n\n\u200b\u200bTor\n\nA python based module for using tor proxy/network services on windows, osx, linux with just one click.\n\nhttps://github.com/r0oth3x49/Tor\n\n#cybersecurity #infosec #privacy\n\n\u200b\u200bArts Of Get System\n\nThis directory is for PoCs to help learning how to get SYSTEM privilege.\n\nhttps://github.com/daem0nc0re/PrivFu/tree/main/ArtsOfGetSystem\n\n#infosec #pentesting #redteam\n\nhttps://t.me/dilagrafie\n\n\u200b\u200b2/2", "creation_timestamp": "2023-06-10T08:16:32.000000Z"}