{"vulnerability": "CVE-2021-30357", "sightings": [{"uuid": "72da196e-6154-4aa5-980e-f3a3fca62894", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-30357", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3089", "content": "Tools \ud83d\udd27 \ud83d\udd28 - Hackers Factory \n\n\u200b\u200bWebPalm\n\nA powerful command-line tool for website mapping and web scraping. With its recursive approach, it can generate a complete tree of all webpages and their links on a website. It can also extract data from the body of each page using regular expressions, making it an ideal tool for web scraping and data extraction.\n\nhttps://github.com/Malwarize/webpalm\n\n#infosec #pentesting #bugbounty\n\n\u200b\u200bGoogle Calendar RAT\n\nA PoC of Command&amp;Control (C2) over Google Calendar Events, This tool has been developed for those circumstances where it is difficult to create an entire red teaming infrastructure.\n\nhttps://github.com/MrSaighnal/GCR-Google-Calendar-RAT\n\n#infosec #pentesting #redteam\n\n\u200b\u200bCodegate 2023 Qualifiers statement\n\nFor those who are not aware, this weekend Kalmarunionen participated in the Codegate 2023 qualifier CTF. This is a very competitive qualifier, where the top 9 teams are allowed to attend the offline finals in Seoul, South Korea, in the fall, where they will compete for a share of a &gt;$50k prize pool.\n\nhttps://github.com/kalmarunionenctf/codegate-statement\n\n#CTF #cybersecurity #infosec\n\n\u200b\u200bWin32 app isolation\n\nTools and documentation for Win32 app isolation.\n\nhttps://github.com/microsoft/win32-app-isolation\n\n#cybersecurity #infosec\n\n\u200b\u200bnuclei_gpt\n\nChatGPT+Langchain+Nuclei Chat automates Nuclei template generation.\n\nhttps://github.com/sf197/nuclei_gpt\n\n#cybersecurity #infosec #bugbounty\n\n\u200b\u200bCVE-2021-30357\n\nProof-of-Concept for privileged file read through CheckPoint SNX VPN Linux Client.\n\nhttps://github.com/joaovarelas/CVE-2021-30357_CheckPoint_SNX_VPN_PoC\n\n#cve #cybersecurity #infosec\n\n\u200b\u200bWinDiff\n\nWeb-based tool that allows browsing and comparing symbol and type information of Microsoft Windows binaries across different versions of the operating system. The binary database is automatically updated to include information from the latest Windows updates.\n\nhttps://github.com/ergrelet/windiff\n\n#reverse #cybersecurity #infosec\n\n\u200b\u200bIIS Short Name Scanner\n\nLatest version of scanners for IIS short filename (8.3) disclosure vulnerability.\n\nhttps://github.com/irsdl/IIS-ShortName-Scanner\n\n#cybersecurity #infosec #pentesting\n\n\u200b\u200bSpartacus \n\nDLL/COM Hijacking Toolkit.\n\nhttps://github.com/Accenture/Spartacus\n\n#infosec #pentesting #redteam\n\nhttps://t.me/dilagrafie", "creation_timestamp": "2023-06-22T22:39:42.000000Z"}, {"uuid": "f26d8aa5-f63a-4b99-ba94-8b4a27e32683", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-30357", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/8521", "content": "#exploit\n1. RCE vulnerability in math.js\nhttps://jwlss.pw/mathjs\n\n2. CVE-2021-30357:\nCheckPoint SNX VPN Linux Client - privileged file read\nhttps://github.com/joaovarelas/CVE-2021-30357_CheckPoint_SNX_VPN_PoC", "creation_timestamp": "2023-06-20T11:01:01.000000Z"}]}