{"uuid": "9861d485-d040-4df4-a60d-10f6a52a6902", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-9464", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/7527", "content": "Tools - Hackers Factory \n\nThis is the development tree. Production downloads are at:\n\nhttps://github.com/simsong/bulk_extractor\n\nZero Infrastructure Password Cracking\n\nhttps://github.com/JoelGMSec/Cloudtopolis\n\nGitHub - Exafunction/codeium-react-code-editor: AI-enabled code editor for React. Unlimited AI autocomplete capabilities with full Typescript support.\n\nhttps://github.com/Exafunction/codeium-react-code-editor\n\nA VMWare logger using built-in backdoor.\n\nhttps://github.com/Azvanzed/vmw-logger-rs\n\nProof of Concept Exploit for CVE-2024-9464\n\nhttps://github.com/horizon3ai/CVE-2024-9464\n\nNow You See Me, Now You Don't\n\nhttps://github.com/ZeroMemoryEx/Chaos-Rootkit\n\nUnauthenticated Remote Code Execution via Angular-Base64-Upload Library\n\nhttps://github.com/rvizx/CVE-2024-42640\n\nProof of concept of CVE-2024-3656 [Keycloak] low-privilege users to access administrative functionalities\n\nhttps://github.com/h4x0r-dz/CVE-2024-3656\n\n#CyberDilara \nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-23T06:15:12.000000Z"}