{"uuid": "99feb6e8-5f3a-4660-909f-9e021d22df27", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-40348", "type": "published-proof-of-concept", "source": "https://t.me/GhostClanInt/25337", "content": "Tools - Hackers Factory \n\nAmoloHT/TTWAF: \u300c\ud83e\uddf1\u300dTest a list of payloads and see if you can bypass it.\n\nhttps://github.com/AmoloHT/TTWAF\n\nOWASP/www-project-netryx: Next level Java web security framework. \n\nhttps://github.com/OWASP/www-project-netryx\n\nPrivFu/TokenAssignor at main daem0nc0re/PrivFu.\n\nhttps://github.com/daem0nc0re/PrivFu/tree/main/TokenAssignor\n\nRPISEC/MBE: Course materials for Modern Binary Exploitation by RPISEC\n\nhttps://github.com/RPISEC/MBE\n\nBigb0x/CVE-2024-40348: POC for CVE-2024-40348. Will attempt to read /etc/passwd from target\n\nhttps://github.com/bigb0x/CVE-2024-40348\n\nPumpbin/pumpbin: \ud83c\udf83 PumpBin is an Implant Generation Platform.\n\nhttps://github.com/pumpbin/pumpbin\n\nBellingcat/name-variant-search: A tool for searching common variations of a human name\n\nhttps://github.com/bellingcat/name-variant-search\n\nMegadose/nqntnqnqmb: Allows you to retrieve information on linkedin profiles, companies on linkedin and search on linkedin companies/persons\n\nhttps://github.com/megadose/nqntnqnqmb\n\nThis cheat sheet contains common enumeration and attack methods for Windows Active Directory with the use of powershell.\n\nhttps://github.com/drak3hft7/Cheat-Sheet---Active-Directory\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-07-24T08:13:30.000000Z"}