{"uuid": "858a3341-bde2-401d-b13a-b3a3108df31e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30052", "type": "seen", "source": "https://t.me/orderofsixangles/2474", "content": "Exploiting AMD atdcm64a.sys arbitrary pointer dereference \u2013 Part 3\n\nLiving off Microsoft Copilot\n\nhunt down APTs\n\neBPF Crash Course for Beginners\n\nExploiting Visual Studio via dump files - CVE-2024-30052\n\nPowerShell Command History Forensics\n\nchill kernel hacking for fun\n\nSilently Install Chrome Extension For Persistence\n\nPopping Android Vulnerabilities From Notification to WebView XSS\n\nReverse Engineering Android Spyware ...with LaurieWired\n\n\u041c\u0430\u0442\u0435\u0440\u0438\u0430\u043b\u044b KLEE 2024 workshop (1,2)\n\nFuzzing and Symbolic Execution for Multipath Malware Tracing: Bridging Theory and Practice via Survey and Experiments\n\nA collection of PowerShell scripts for analyzing data from Microsoft 365 and Microsoft Entra ID", "creation_timestamp": "2024-10-14T05:47:44.000000Z"}