{"uuid": "80aac993-e2b3-4ea9-83f8-793fcb9c0e71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-31726", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3061", "content": "Tools - Hackers Factory \n\nPCAPeek \n\nA proof-of-concept re-assembler for reverse VNC traffic such as IcedID &amp; Qakbot's VNC Backdoors.\n\nhttps://github.com/0xThiebaut/PCAPeek\n\n#cybersecurity #infosec\n\nProcOpen-PHP-Webshell\n\nExperience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.\n\nhttps://github.com/d4rkiZ/ProcOpen-PHP-Webshell\n\n#infosec #pentesting #redteam\n\nKeyhacks \n\nA repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.\n\nhttps://github.com/streaak/keyhacks\n\n#infosec #pentesting #bugbounty\n\nDetections - Browser Credential Harvesting\n\nWeb browsers today allow users to store their username and passwords, directly to log into their application of choice. Threat actors can retrieve these credentials using either the Windows API or decrypting specific files. This detection strategy focuses on specific files that are needed by the attacker to retrieve the user\u2019s web browser stored credentials.\n\nhttps://github.com/cybergoatpsyops/detections/tree/main/techniques/webCredentialHarvest\n\n#cybersecurity #infosec\n\nopera-proxy\n\nStandalone Opera VPN client. Just run it and it'll start a plain HTTP proxy server forwarding traffic through \"Opera VPN\" proxies of your choice. By default the application listens on 127.0.0.1:18080.\n\nhttps://github.com/Snawoot/opera-proxy\n\n#VPN #infosec #privacy\n\nCVE-2023-31779\n\nStored XSS vulnerability exists in the \"Reaction to comment\" feature. An attacker with user privilege on kanban board can execute JavaScript code in the browsers of users who open card with malicious reaction.\n\nhttps://github.com/jet-pentest/CVE-2023-31779\n\n#cve #cybersecurity #infosec\n\nCVE-2023-31726\n\nPOC for CVE-2023-31726: AList 3.15.1 is vulnerable to Incorrect Access Control, which can be exploited by attackers to obtain sensitive information.\n\nhttps://github.com/J6451/CVE-2023-31726\n\n#cve #poc #infosec\n\nSubScraper\n\nPerform subdomain enumeration through various techniques and retrieve detailed output to aid in further testing.\n\nhttps://github.com/m8sec/subscraper\n\n#infosec #pentesting #bugbounty\n\nEnumStrike\n\nCobalt Strike Aggressor script to automate host and domain enumeration.\n\nhttps://github.com/DallasFR/EnumStrike\n\n#infosec #pentesting #redteam\n\nSkyhook\n\nA REST-driven web application used to smuggle files into and out of networks defended by perimeter controls that inspect and act on traffic perceived to contain malicious content.\n\nhttps://github.com/blackhillsinfosec/skyhook\n\n#infosec #pentesting #redteam\n\nPyRDP\n\nRDP monster-in-the-middle (mitm) and library for Python with the ability to watch connections live or after the fact.\n\nhttps://github.com/GoSecure/pyrdp\n\n#infosec #pentesting #redteam\n\nNimRekey \n\nAn experiment in improving existing anti-copy techniques. This one allows a binary to rewrite itself on disk after the first execution with a new key and encrypted secrets (like shellcode, URLs, etc)\n\nhttps://github.com/OffenseTeacher/NimRekey\n\n#cybersecurity #infosec\n\nopenSquat\n\nOpen-source Intelligence (OSINT) security tool to identify cyber squatting threats to specific companies or domains, such as:\ud83d\udc47\n\n\u2022 Phishing campaigns\n\u2022 Domain squatting\n\u2022 Typo squatting\n\u2022 Bitsquatting\n\u2022 IDN homograph attacks\n\u2022 Doppenganger domains\n\u2022 Other brand/domain related scams\n\nhttps://github.com/atenreiro/opensquat\n\n#OSINT #cybersecurity #infosec\n\nMalleable-CS-Profiles\n\nA list of python tools to help create an OPSEC-safe Cobalt Strike profile. This is the Github repository of the relevant blog post: Unleashing the Unseen: Harnessing the Power of Cobalt Strike Profiles for EDR Evasion.\n\nhttps://github.com/WKL-Sec/Malleable-CS-Profiles\n\n#infosec #pentesting #redteam\n\nOffensive-Rust\n\nhttps://github.com/winsecurity/Offensive-Rust\n\n#infosec #pentesting #redteam\n\nRansomware Notes\n\nThis is a collection of various #ransomware notes from the past to the present.\n\nhttps://github.com/threatlabz/ransomware_notes\n\n#cybersecurity #infosec\n\nhttps://t.me/dilagrafie\nhttps://t.me/HackerFactory", "creation_timestamp": "2023-05-25T13:55:27.000000Z"}