{"uuid": "7071b6ea-7b59-4825-a3fb-78f7468c1c8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9464", "type": "published-proof-of-concept", "source": "https://t.me/InfoSecInsider/540", "content": "Tools - Hackers Factory \n\nThis is the development tree. Production downloads are at:\n\nhttps://github.com/simsong/bulk_extractor\n\nZero Infrastructure Password Cracking\n\nhttps://github.com/JoelGMSec/Cloudtopolis\n\nGitHub - Exafunction/codeium-react-code-editor: AI-enabled code editor for React. Unlimited AI autocomplete capabilities with full Typescript support.\n\nhttps://github.com/Exafunction/codeium-react-code-editor\n\nA VMWare logger using built-in backdoor.\n\nhttps://github.com/Azvanzed/vmw-logger-rs\n\nProof of Concept Exploit for CVE-2024-9464\n\nhttps://github.com/horizon3ai/CVE-2024-9464\n\nNow You See Me, Now You Don't\n\nhttps://github.com/ZeroMemoryEx/Chaos-Rootkit\n\nUnauthenticated Remote Code Execution via Angular-Base64-Upload Library\n\nhttps://github.com/rvizx/CVE-2024-42640\n\nProof of concept of CVE-2024-3656 [Keycloak] low-privilege users to access administrative functionalities\n\nhttps://github.com/h4x0r-dz/CVE-2024-3656\n\n#CyberDilara \nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-23T06:15:18.000000Z"}