{"uuid": "d4f43d07-e8ed-43c6-a119-dbde10cfad33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-39238", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/8785", "content": "Tools - Hackers Factory \n\nSUDO_KILLER: identify and exploit sudo rules\u2019 misconfigurations and vulnerabilities within sudo\n\nhttps://github.com/TH3xACE/SUDO_KILLER\n\n\u00a0\u00a0\u00a0 ./sudo_killer.sh -c -e -r report.txt -p /tmp\n\nhttpx commands cheat sheet \n\nhttps://github.com/Ignitetechnologies/Mindmap/tree/main/httpx\n\nHunting for Unauthenticated n-days in Asus Routers \n\nhttps://github.com/ShielderSec/poc/tree/main/CVE-2023-39238\n\nIt's a bash script to help bypass HTTP 403 errors using path &amp; header fuzzing, HTTP method &amp; protocol version testing, and more. \n\nhttps://github.com/nazmul-ethi/Bypass-Four03\n\nGolang Function Recovery. java\n\nhttps://github.com/advanced-threat-research/GhidraScripts/blob/main/GolangFunctionRecovery.java\n\nDocker container for running CobaltStrike 4.10\n\nhttps://github.com/ZSECURE/zDocker-cobaltstrike\n\nGitHub - RootUp/SmuggleSheild: Basic protection against HTML smuggling attempts.\n\nhttps://github.com/RootUp/SmuggleSheild\n\nSome good tools for Bug Bounty Hunting\n\nhttps://github.com/Ignitetechnologies/Mindmap/blob/main/Tools/Bug%20Bounty%20Tools%20HD.png\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-09-22T21:41:16.000000Z"}