{"uuid": "a4c091ff-55fe-49c3-ae0d-dc5e07e7fa9f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-47522", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/2863", "content": "Tools - Hackers Factory \n\nyetAnotherObfuscator\n\nA C# obfuscator tool that can bypass Windows Defender antivirus. I made this tool mainly as an excuse to learn more about C# and how obfuscators function.\n\nhttps://github.com/0xb11a1/yetAnotherObfuscator\n\n#cybersecurity #infosec #pentesting #redteam\n\nhttps://github.com/Mr-xn/BLACKHAT_USA2022\n\n\u200b\u200bFreeMetsrvLoader\n\nFork of freeBokuLoader which targets and frees Metsrv's initial reflective DLL package.\n\nhttps://github.com/attl4s/freeMetsrvLoader\n\n#cybersecurity #infosec #pentesting #redteam\n\n\u200b\u200bPowershell String Cleaner\n\nSimple script to deobfuscate Powershell formatting strings.\n\nhttps://github.com/dr4k0nia/tooling-playground/tree/main/PowershellStringCleaner\n\n#cybersecurity #infosec\n\n\u200b\u200bUSBvalve\n\nI'm sure that, like me, you were asked to put your USB drive in an unknown device...and then the doubt:\n\nwhat happened to my poor dongle, behind the scene? Stealing my files? Encrypting them? Or just installing a malware? With USBvalve you can spot this out in seconds: built on super cheap off-the-shelf hardware you can quickly test any USB file system activity and understand what is going on before it's too late!\n\nhttps://github.com/cecio/USBvalve\n\n#cybersecurity #infosec\n\n\u200b\u200bPoastal\n\nPoastal is an email #OSINT tool that provides valuable information on any email address. With Poastal, you can easily input an email address and it will quickly answer several questions, providing you with crucial information.\n\nhttps://github.com/jakecreps/poastal\n\n#cybersecurity #infosec\n\n\u200b\u200bMacStealer \n\nWi-Fi Client Isolation Bypass.\n\nThis repo contains MacStealer. It can test Wi-Fi networks for client isolation bypasses (CVE-2022-47522). Our attack can intercept (steal) traffic toward other clients at the MAC layer, even if clients are prevented from communicating with each other. \n\nhttps://github.com/vanhoefm/macstealer\n\n#cybersecurity #infosec\n\n\u200b\u200bmulef\n\nThis tool performs #OSINT by finding #LinkedIn employees on GitHub. It has two modes: one for searching keywords on the GitHub profiles of the users you're searching for, and the other for scraping the location of the employee from LinkedIn, searching for the name of the employee, and then checking if their location on GitHub matches the one on LinkedIn.\n\nhttps://github.com/mux0x/mulef\n\n#cybersecurity #infosec\n\n\u200b\u200bhacking-writeups\n\nHelpful shell commands and lots of writeups from machines solved on Hack the Box and also walkthroughs from CTF competitions.\n\nhttps://github.com/BitFlippa27/hacking-writeups/tree/main/htb/ctf/cyber-apocalypse-2023/web\n\n#cybersecurity #infosec #pentesting #redteam\n\n\u200b\u200bHardHat C2\n\nA cross-platform, collaborative, Command &amp; Control framework written in C#, designed for red teaming and ease of use.\n\nhttps://github.com/DragoQCC/HardHatC2\n\n#cybersecurity #infosec #pentesting #redteam\n\nhttps://t.me/dilagrafie\nhttps://t.me/HackerFactory", "creation_timestamp": "2023-04-14T20:19:59.000000Z"}