{"uuid": "d6e4d927-615a-4cfb-a74e-de3b17586e87", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-1609", "type": "published-proof-of-concept", "source": "https://t.me/crackcodes/829", "content": "Updates On Hackbyte Forum:-\n\n\ud83d\udcccSlient-Doc-Pdf-Exploit-Builder-Fud-Malware-Cve\n\ud83d\udcccZheTian Powerful Anti Anti-Virus Trojan horse generator\n\ud83d\udcccgpu poisoning; hide the payload inside the gpu memory.\n\ud83d\udcccJNPF_Chinese_Government_Contractor Leak\n\ud83d\udcccShodan Search Script\n\ud83d\udcccCloud7 Bot\n\ud83d\udcccFacebook 700m Leak (2021)\n\ud83d\udcccWordpress Mass Exploit : Augmented Reality\n\ud83d\udcccRed Rabbit Framework\n\ud83d\udcccZombie Bot from Darkweb\n\ud83d\udcccPoC for CVE-2022-26809, analisys and considerations are shown in the github.io\n\ud83d\udcccInvicti Professional Edition 6.6.0.36485\n\ud83d\udcccxRay_Web_Vulnerability_Scanner_Advanced_v1_8_5_x64_Full_Activated\n\ud83d\udcccReflex AV Bypass\n\ud83d\udcccPoC exploit for WinRing0\n\ud83d\udcccCVE-2022-1609 WordPress Weblizar Backdoor\n\ud83d\udcccPwnbolt\n\ud83d\udcccU-Boat\n\ud83d\udcccKernel Exploits\n\ud83d\udcccIos15_exploits_POC: my iOS applications for iOS 15.1\n\ud83d\udcccSosedi.by Leak\n\ud83d\udcccShein Leak\n\ud83d\udccckyivstar.ua Leak\n\ud83d\udcccstink: Stealer in just 2 lines with sending to Telegram\n\ud83d\udcccSnapChat Leak\n\ud83d\udccchijagger: Checks all maintainers of all NPM and Pypi packages for hijackable packages through domain re-registration\n\ud83d\udcccSysmonQuiet Reflective DLL\n\ud83d\udccccgaty - Hooking the GDT Installing a Call Gate\n\ud83d\udccchttp redirector\n\ud83d\udcccLink - Link is a general RL framework to find reflected XSS vulnerabilities in a black-box and fully automatic manner\n\ud83d\udcccParagon\n\ud83d\udccc3snake - Dump sshd and sudo credential related strings\n\ud83d\udcccCrackerJack - Web GUI for #Hashcat developed in #Python.\n\ud83d\udccchaxx - Untethered + Unsandboxed code execution haxx as root on iOS 14 \u2013 iOS 14.8.1.\n\ud83d\udcccPE-infector - Crossplatform tool for inject shellcode into .exe binaries (x86 and 64).\n\ud83d\udcccBOF-Nim\n\ud83d\udcccPostDump\n\ud83d\udcccbear.tax Crypto Database full dump source +API codes\n\ud83d\udcccMobiFriends 2.6M Leak\n\ud83d\udcccElector.co.il Leak\n\ud83d\udcccChisel Strike\n\ud83d\udcccxhunter: Remote Administrator Tool [ RAT For Android ] No Port Forwarding\n\ud83d\udcccNotes and IoCs of fresh malware\n\ud83d\udccc29Million Wordpress + TOP Macro password 2525 list 2022 HQ\n\n\ud83d\udc49\ud83c\udffb\ud83d\udc49\ud83c\udffb https://bit.ly/3yRyah3 \ud83d\udc48\ud83c\udffb\ud83d\udc48\ud83c\udffb", "creation_timestamp": "2022-07-12T10:52:54.000000Z"}