{"uuid": "ae592e2f-528b-4262-bac4-a2caa78a3ef9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-41349", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/179", "content": "Devbox\n\nInstant, easy, and predictable shells and containers\n\nDevbox is a command-line tool that lets you easily create isolated shells and containers. You start by defining the list of packages required by your development environment, and devbox uses that definition to create an isolated environment just for your application.\n\nIn practice, Devbox works similar to a package manager like yarn \u2013 except the packages it manages are at the operating-system level (the sort of thing you would normally install with brew or apt-get).\n\nhttps://github.com/jetpack-io/devbox\n\nUnbekannt Framework\n\nA Hacking and Pentesting Tool for Linux and Windows.\n\nWindows:\n\u25ab\ufe0f pinger - ping an IP with specific port\n\u25ab\ufe0f lookup - see rough geolocation of an IP &amp; see the IP of a domain\n\u25ab\ufe0f putty - connect via ssh to a server official site\n\u25ab\ufe0f box - TCP chat\n\u25ab\ufe0f scanner - scan an IP of available ports\n\u25ab\ufe0f lanc - IP puller, IP grabber for PSN/Xbox/PC Resolver. Find, track and locate gamertags official site\n\u25ab\ufe0f database - a list of 30 free DDos site\n\u25ab\ufe0f mail - mail spammer\n\u25ab\ufe0f moba - Enhanced terminal for Windows with X11 server, tabbed SSH client, network tools official site\n\u25ab\ufe0f pcps - IP puller, IP grabber for PSN/Xbox/PC Resolver. Find, track and locate gamertags official site\n\nLinux:\n\u25ab\ufe0f pinger - ping an IP with specific port\n\u25ab\ufe0f lookup - see rough geolocation of an IP &amp; see the IP of a domain\n\u25ab\ufe0f database - a list of 30 free DDos site\n\u25ab\ufe0f mail - mail spammer\n\u25ab\ufe0f beacon - create fake access points\n\u25ab\ufe0f evil - Evil-Win Windows Reverse TCP Shell for Hacking and Pentesting\n\u25ab\ufe0f deauther - deauth specific BSSID/CHANNEL\n\nhttps://github.com/i-am-unbekannt/unbekannt-framework\n\nRedcloud\n\nA powerful and user-friendly toolbox for deploying a fully featured Red Team Infrastructure using Docker. Harness the cloud's speed for your tools. Deploys in minutes. Use and manage it with its polished web interface.\n\nIdeal for your penetration tests, shooting ranges, red teaming and bug bounties!\n\nSelf-host your attack infrastructure painlessly, deploy your very own live, scalable and resilient offensive infrastructure in a matter of minutes.\n\nFeatures:\n\u25ab\ufe0f Deploy Redcloud locally or remotely using the built-in SSH functions, and even docker-machine.\n\u25ab\ufe0f Deploy Metasploit, Empire, GoPhish, vulnerable targets, a fully stacked Kali, and many more with a few clicks.\n\u25ab\ufe0f Monitor and manage your infrastructure with a beautiful web interface.\n\u25ab\ufe0f Deploy redirections, socks or Tor proxy for all your tools.\n\u25ab\ufe0f Painless network management and volume sharing.\n\u25ab\ufe0f User and password management.\n\u25ab\ufe0f Web terminal\n\u25ab\ufe0f Overall very comfy \ud83d\udc23\n\nhttps://github.com/khast3x/Redcloud\n\nCHIPSEC \n\nA framework for analyzing the security of PC platforms including hardware, system firmware (BIOS/UEFI), and platform components. It includes a security test suite, tools for accessing various low level interfaces, and forensic capabilities. \n\nIt can be run on Windows, Linux, Mac OS X and UEFI shell. Instructions for installing and using CHIPSEC can be found in the manual.\n\nhttps://github.com/chipsec/chipsec\n\nBrowser-password-stealer\n\nThis python program gets all the saved passwords, credit cards and bookmarks from chromium based browsers supports chromium 80 and above!\n\nSupported browsers:\n\u25ab\ufe0f Chrome\n\u25ab\ufe0f Brave\n\u25ab\ufe0f Edge (Chromium)\n\nhttps://github.com/henry-richard7/Browser-password-stealer\n\nCVE-2021-41349\n\nMicrosoft Exchange Server Spoofing Vulnerability Exploit!\n\nhttps://github.com/0xrobiul/CVE-2021-41349\n\n#cve #exploit\n\n2/3", "creation_timestamp": "2022-12-17T10:25:27.000000Z"}