{"uuid": "a24ca755-59f7-4e73-bc7d-e2b43a9be7b3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-38396", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/6836", "content": "Tools - Hackers Factory \n\nOfficial Kali Linux tool to check all urls of a domain for SQL injections.\n\nhttps://github.com/malvads/sqlmc\n\nAn ADCS honeypot to catch attackers in your internal network.\n\nhttps://github.com/srlabs/Certiception\n\nActive Directory Cheat Sheet\n\nhttps://github.com/Integration-IT/Active-Directory-Exploitation-Cheat-Sheet\n\nA decompiler-agnostic plugin for interacting with AI in your decompiler. GPT-4, Claude, and local models supported.\n\nhttps://github.com/mahaloz/DAILA\n\nA SOCKS proxy written in Python that randomizes your source IP address. Round-robin your evil packets through SSH tunnels or give them billions of unique source addresses.\n\nhttps://github.com/blacklanternsecurity/TREVORproxy\n\nCloud-Based Identity to Exfiltration Attack\n\nhttps://github.com/LearningKijo/SecurityResearcher-Note/blob/main/SecurityResearcher-Note-Folder%2FDay16-CloudId-Exfiltration-AttackReport-Part1.md\n\nPoC for iTerm2 CVEs CVE-2024-38396 and CVE-2024-38395 which allow code execution\n\nhttps://github.com/vin01/poc-cve-2024-38396\n\nReflective DLL to privesc from NT Service to SYSTEM using SeImpersonateToken privilege.\n https://github.com/sokaRepo/CoercedPotatoRDLL\n\nEyes is an OSINT tool to get existing accounts from an email\n\nhttps://github.com/C3n7ral051nt4g3ncy/Eyes\n\nTunnel all your traffic over Websocket or HTTP2 - Bypass firewalls/DPI - Static binary available \n\ngithub.com/erebe/wstunnel\n\n#CyberDilara \nhttps://t.me/CyberDilara", "creation_timestamp": "2024-06-30T13:56:15.000000Z"}