{"vulnerability": "CVE-2024-0044", "sightings": [{"uuid": "73b953cf-fc20-49ef-88b5-edd4b3aa00de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0044", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8149", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-0044: a \\\"run-as any app\\\" high-severity vulnerability affecting Android versions 12 and 13\nURL\uff1ahttps://github.com/hunter24x24/cve_2024_0044\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-08-01T20:18:50.000000Z"}, {"uuid": "e5900b29-b9aa-404c-9d44-d3b8a068d631", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0044", "type": "seen", "source": "https://gist.github.com/purwowd/0b956df66457ec0030e7298df10039c4", "content": "", "creation_timestamp": "2026-02-06T06:06:11.000000Z"}, {"uuid": "1d3c3ba9-8cbd-48a0-bd3f-f358649aa2de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0044", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8296", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-0044\nURL\uff1ahttps://github.com/MrW0l05zyn/cve-2024-0044\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-08-19T02:53:17.000000Z"}, {"uuid": "4f9d34c1-e6b0-4fd6-b3ac-47f448b12288", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0044", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7953", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-0044: uma vulnerabilidade de alta gravidade do tipo \\\"executar como qualquer aplicativo\\\" que afeta as vers\u00f5es 12 e 13 do Android\nURL\uff1ahttps://github.com/007CRIPTOGRAFIA/c-CVE-2024-0044\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-07-11T18:50:05.000000Z"}, {"uuid": "9880bf73-e0e9-4d0e-b3ff-7d3f4a293d4c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0044", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7850", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1a\u5229\u7528 CVE-2024-0044 Android \u6743\u9650\u63d0\u5347\u4e0b\u8f7d\u4efb\u610f\u76ee\u6807App\u6c99\u7bb1\u6587\u4ef6\u3002\nURL\uff1ahttps://github.com/Re13orn/CVE-2024-0044-EXP\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-07-03T10:34:12.000000Z"}, {"uuid": "0305f98b-9410-4500-a240-05c407b60565", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0044", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7959", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1a\u6743\u9650\u63d0\u5347\n\u63cf\u8ff0\uff1a\u5229\u7528 CVE-2024-0044 Android \u6743\u9650\u63d0\u5347\u4e0b\u8f7d\u4efb\u610f\u76ee\u6807App\u6c99\u7bb1\u6587\u4ef6\u3002\nURL\uff1ahttps://github.com/314love/shiwu\n\n\u6807\u7b7e\uff1a#\u6743\u9650\u63d0\u5347", "creation_timestamp": "2024-07-12T15:02:55.000000Z"}, {"uuid": "b45d10ff-edae-4c5c-8253-a3af04bf93f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0044", "type": "published-proof-of-concept", "source": "https://t.me/cKure/13090", "content": "\u25a0\u25a0\u25a0\u25a0\u25a0 Extracting WhatsApp Database (or any app data) from Android 12/13 using CVE-2024-0044.\n\nhttps://tinyhack.com/2024/06/07/extracting-whatsapp-database-or-any-app-data-from-android-12-13-using-cve-2024-0044/", "creation_timestamp": "2024-06-08T08:11:05.000000Z"}, {"uuid": "06bdaeeb-e258-4d53-890d-531133566de3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0044", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7700", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-0044:  a \\\"run-as any app\\\" high-severity vulnerability affecting Android versions 12 and 13\nURL\uff1ahttps://github.com/pl4int3xt/cve_2024_0044\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-06-18T13:31:27.000000Z"}, {"uuid": "09fd4948-7df4-4dba-be9a-0157f342e826", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0044", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/9361", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-0044: a \\\"run-as any app\\\" high-severity vulnerability affecting Android versions 12 and 13\nURL\uff1ahttps://github.com/Dit-Developers/CVE-2024-0044-\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-12-09T19:07:46.000000Z"}, {"uuid": "8cf1e32d-1274-461b-83aa-96fe4bb7becd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0044", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7985", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1a\u5229\u7528CVE-2024-0044 \u5728Android12\u300113 \u4e0b\u63d0\u6743\nURL\uff1ahttps://github.com/Kai2er/CVE-2024-0044-EXP\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-07-15T08:49:02.000000Z"}, {"uuid": "314afc41-d46b-4b1b-a758-65a28177ab13", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0044", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8017", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1a\u6743\u9650\u63d0\u5347\n\u63cf\u8ff0\uff1a\u5229\u7528 CVE-2024-0044 Android \u6743\u9650\u63d0\u5347\u4e0b\u8f7d\u4efb\u610f\u76ee\u6807App\u6c99\u7bb1\u6587\u4ef6\u3002\nURL\uff1ahttps://github.com/wwqking/Hospital-appointment-registration-system\n\n\u6807\u7b7e\uff1a#\u6743\u9650\u63d0\u5347", "creation_timestamp": "2024-07-18T10:25:45.000000Z"}, {"uuid": "310796d6-1901-4c9e-a660-c5ccd0b91654", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0044", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7698", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aExfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely\nURL\uff1ahttps://github.com/scs-labrat/android_autorooter\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-06-18T09:25:57.000000Z"}, {"uuid": "acc2f9fb-2680-4150-b298-69cbf24c3d01", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0044", "type": "seen", "source": "https://t.me/cKure/13165", "content": "\u26a0\ufe0f CVE-2024-0044 (Android LPE) impacting Android 12 and 13.\n\nSource: https://www.linkedin.com/posts/lukasstefanko_whatsapp-vulnerability-activity-7208453738829598720-5Px4", "creation_timestamp": "2024-06-18T20:40:50.000000Z"}, {"uuid": "4651596c-f8b6-4cb6-866d-053bc6ac9e48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0044", "type": "seen", "source": "Telegram/8nmsnhQW6bZohzNW4cubwqV8S73C4Vi1GCLVoMyDNTe2x58", "content": "", "creation_timestamp": "2025-11-13T09:00:04.000000Z"}, {"uuid": "4ddf0fab-6ca7-46aa-833f-f9e1d87c8ac4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0044", "type": "published-proof-of-concept", "source": "Telegram/LS4cwd6hLXn_C-RNDzcl3_gAOBSF2J2EYgJAZxt5toXrMk0", "content": "", "creation_timestamp": "2026-01-10T15:00:08.000000Z"}, {"uuid": "adc3822f-5600-49fe-8fc2-0624c1e0459b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0044", "type": "published-proof-of-concept", "source": "https://t.me/orderofsixangles/2408", "content": "Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability #AndroidHacking #CVE20240044 #DataExfiltration #MobileHacker #Vulnerability https://www.mobile-hacker.com/2024/06/17/exfiltrate-sensitive-user-data-from-apps-on-android-12-and-13-using-cve-2024-0044-vulnerability/", "creation_timestamp": "2024-08-07T09:37:33.000000Z"}, {"uuid": "1f8a21d2-76b7-4d1a-8bd0-69ff84c3a8d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0044", "type": "published-proof-of-concept", "source": "Telegram/rgVWXG_JF3lBzF944Q1uZEdqOiMVLUPqZjS8co3vkMC7j4o", "content": "", "creation_timestamp": "2025-10-10T09:00:05.000000Z"}, {"uuid": "6e22cae9-968e-4095-abaa-199173e4bcea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0044", "type": "published-proof-of-concept", "source": "https://t.me/Kelvinseccommunity/519", "content": "#tools\n#Offensive_security\n1. EDR/XDR/AV Killer\nhttps://github.com/EvilBytecode/EDR-XDR-AV-Killer\n2. Android 12/13 Autorooter\n(CVE-2024-0044)\nhttps://github.com/scs-labrat/android_autorooter", "creation_timestamp": "2024-06-19T19:05:04.000000Z"}, {"uuid": "0734c2e3-a803-449f-8512-ca01a1ba7115", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0044", "type": "published-proof-of-concept", "source": "Telegram/5-VZxPPnrQupytye-jOudQ-_EnuoU9LSvmJU1Q2imrVU", "content": "", "creation_timestamp": "2024-06-22T03:58:53.000000Z"}, {"uuid": "af36e8fe-d6f6-42cc-9218-268dc2706158", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0044", "type": "published-proof-of-concept", "source": "https://t.me/Teamx1945x/8412", "content": "CVE-2024-0044\n\nHole in Android 12 and 13. The vulnerability allows an attacker to perform a \u201crun as any application\u201d attack, which leads to local privilege escalation without user intervention\n\nexploit", "creation_timestamp": "2024-06-21T22:45:23.000000Z"}, {"uuid": "72d93c1f-521f-48f6-b9b3-717cfda82594", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0044", "type": "seen", "source": "https://t.me/Safety_all_cyber/347", "content": "CVE-2024-0044\n\nHole in Android 12 and 13. The vulnerability allows an attacker to perform a \u201crun as any application\u201d attack, which leads to local privilege escalation without user intervention\n\nexploit", "creation_timestamp": "2024-09-02T21:18:10.000000Z"}, {"uuid": "32af58ce-bbcc-4a8f-aeaf-b9da8a636541", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0044", "type": "published-proof-of-concept", "source": "https://t.me/TheDarkWebInformer/1124", "content": "\ud83d\udea8POC RELEASED\ud83d\udea8CVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13\ud83d\udc47\n\n\"CVE-2024-0044, identified in the createSessionInternal function of the PackageInstallerService[.]java file, is a high-severity vulnerability affecting Android versions 12 and 13.\n\nThis vulnerability allows an attacker to perform a \"run-as any app\" attack, leading to local escalation of privilege without requiring user interaction. The issue arises due to improper input validation within the createSessionInternal function.\n\nAn attacker can exploit this by manipulating the session creation process, potentially gaining unauthorized access to sensitive data and performing unauthorized actions on the affected device\u200b\"\n\nhttps://github.com/pl4int3xt/cve_2024_0044\n\nhttps://x.com/DarkWebInformer/status/1803484475298377961", "creation_timestamp": "2024-06-19T19:48:36.000000Z"}, {"uuid": "68daeaed-088f-498d-b3d8-a845d7e8742c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0044", "type": "published-proof-of-concept", "source": "Telegram/ilE2GamJ8-iqsvsndCZ5n5qfh8qS-F639FDpoRMLVbHya6Za", "content": "", "creation_timestamp": "2024-06-19T21:45:39.000000Z"}, {"uuid": "ad573da5-083a-42cc-b413-9a1e6bf4fc22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0044", "type": "published-proof-of-concept", "source": "Telegram/SgJfUz9uLXqwLUzxRCV3C8rkrxC_29IIZwB1qPIksvmgW05q", "content": "", "creation_timestamp": "2024-08-04T08:06:57.000000Z"}, {"uuid": "d9032f7d-d939-4fad-b1c2-dac77633f747", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0044", "type": "published-proof-of-concept", "source": "https://t.me/Cyberwise_tools/124", "content": "CVE-2024-0044: a \"run-as any app\"\n high-severity vulnerability affecting Android versions 12 and 13 \ud83e\udd76    \n\nhttps://github.com/pl4int3xt/cve_2024_0044", "creation_timestamp": "2024-10-19T19:50:43.000000Z"}, {"uuid": "61d3a28b-b872-42c0-8cae-cd62a5ef678c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0044", "type": "seen", "source": "https://t.me/CyberDilara/229", "content": "Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability\n\n#Hacking #infosec #mobile #CVE", "creation_timestamp": "2024-06-22T12:25:24.000000Z"}, {"uuid": "882f600a-9210-42f1-973d-ef6f6d677fed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0044", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/385", "content": "Tools - Hackers Factory \n\nGitHub - R3DRUN3/sploitcraft: \ud83c\udff4\u200d\u2620\ufe0f Hacking Guides, Demos and Proof-of-Concepts \ud83e\udd77\n\nhttps://github.com/R3DRUN3/sploitcraft\n\npython-scripts/google_dorker.py at main \u00b7 networkdavit/python-scripts \u00b7 GitHub\n\nhttps://github.com/networkdavit/python-scripts/blob/main/google_dorker.py\n\nGitHub - ultrasecurity/Storm-Breaker: Social engineering tool [Access Webcam &amp; Microphone &amp; Location Finder] With {Py,JS,PHP}\n\nhttps://github.com/ultrasecurity/Storm-Breaker\n\nGitHub - jcldf/ultimate-hardware-hacking-gear-guide-: Unlock Exclusive Insights!  Download FREE E-Zine Now \u27a1\ufe0f Over 170 Pages of Essential Content! Elevate your hardware hacking game with insider tips and the latest trends.\n\nhttps://github.com/jcldf/ultimate-hardware-hacking-gear-guide-\n\nGitHub - scs-labrat/android_autorooter: Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely\n\nhttps://github.com/scs-labrat/android_autorooter\n\nGitHub - OvidijusParsiunas/deep-chat: Fully customizable AI chatbot component for your website\n\nhttps://github.com/OvidijusParsiunas/deep-chat\n\nGitHub - orhun/flawz: A Terminal UI for browsing security vulnerabilities (CVEs)\n\nhttps://github.com/orhun/flawz\n\nGitHub - rashadphz/farfalle: \ud83d\udd0d AI search engine - self-host with local or cloud LLMs\n\nhttps://github.com/rashadphz/farfalle\n\nGitHub - AnonCatalyst/Ominis-OSINT: This Python application is an OSINT (Open Source Intelligence) tool called \"Ominis OSINT - Web Hunter.\" It performs online information gathering by querying Google for search results related to a user-inputted query.\n\nhttps://github.com/AnonCatalyst/Ominis-OSINT\n\nGitHub - Lissy93/dashy: \ud83d\ude80 A self-hostable personal dashboard built for you. Includes status-checking, widgets, themes, icon packs, a UI editor and tons more!\n\nhttps://github.com/Lissy93/dashy\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-07-13T07:10:44.000000Z"}, {"uuid": "8f7d272e-a599-4341-8e96-857118aedd0d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0044", "type": "published-proof-of-concept", "source": "Telegram/u5ehNHGqLpJYKBDSu-RgTdCFkanZb6EF7UqAdxdNFKr7wjU", "content": "", "creation_timestamp": "2024-06-20T18:51:30.000000Z"}, {"uuid": "ea88541a-c360-4a5d-8f63-1488601fd6a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0044", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/334", "content": "Tools - Hackers Factory\n\nA signal handler race condition in OpenSSH's server (sshd)\n\nhttps://github.com/zgzhang/cve-2024-6387-poc\n\nPrivilege Escalation Enumeration Script for Windows\n\nhttps://github.com/itm4n/PrivescCheck\n\nTwo new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration &amp; Fiber injection capability POC tool) PhantomThread (An evolved callstack-masking implementation)\n\nhttps://github.com/JanielDary/ImmoralFiber\n\nStatic deobfuscator for Themida/WinLicense/Code Virtualizer's mutation-based obfuscation.\n\nhttps://github.com/ergrelet/themida-unmutate\n\nExample code samples from our ScriptBlock Smuggling Blog post\n\nhttps://github.com/BC-SECURITY/ScriptBlock-Smuggling\n\nRusty Hypervisor - Windows UEFI Blue Pill Type-1 Hypervisor in Rust (Codename: Illusion)\n\nhttps://github.com/memN0ps/illusion-rs\n\nThis Burp Suite extension allows you to copy HTTP requests without including cookies or tokens. It removes sensitive information related to authentication, session management, and CSRF protection from the requests, making it easier to share or analyze them without exposing sensitive data.\n\nhttps://github.com/haticeerturk/requestCleaner\n\nGitHub - pl4int3xt/cve_2024_0044: CVE-2024-0044: a &quot;run-as any app&quot; high-severity vulnerability affecting Android versions 12 and 13 -\n\nhttps://github.com/pl4int3xt/cve_2024_0044\n\nZyxel NAS326 firmware &lt; V5.21(AAZF.17)C0 - Command Injection CVE-2024-29973\n\nhttps://github.com/momika233/CVE-2024-29973\n\nSudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing advanced automated reconnaissance (framework). This tool can also be used for OSINT (Open-source intelligence) activities.\n\nhttps://github.com/screetsec/Sudomy\n\n#CyberDilara\nhttps://t.me/CyberDilara\n\n#CyberBulletin\nhttps://t.me/CyberBulletin", "creation_timestamp": "2024-07-04T12:32:32.000000Z"}, {"uuid": "6ca63af0-d395-4378-a19b-a753baf204ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0044", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/8207", "content": "Tools - Hackers Factory \n\nGitHub - R3DRUN3/sploitcraft: \ud83c\udff4\u200d\u2620\ufe0f Hacking Guides, Demos and Proof-of-Concepts \ud83e\udd77\n\nhttps://github.com/R3DRUN3/sploitcraft\n\npython-scripts/google_dorker.py at main \u00b7 networkdavit/python-scripts \u00b7 GitHub\n\nhttps://github.com/networkdavit/python-scripts/blob/main/google_dorker.py\n\nGitHub - ultrasecurity/Storm-Breaker: Social engineering tool [Access Webcam &amp; Microphone &amp; Location Finder] With {Py,JS,PHP}\n\nhttps://github.com/ultrasecurity/Storm-Breaker\n\nGitHub - jcldf/ultimate-hardware-hacking-gear-guide-: Unlock Exclusive Insights!  Download FREE E-Zine Now \u27a1\ufe0f Over 170 Pages of Essential Content! Elevate your hardware hacking game with insider tips and the latest trends.\n\nhttps://github.com/jcldf/ultimate-hardware-hacking-gear-guide-\n\nGitHub - scs-labrat/android_autorooter: Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely\n\nhttps://github.com/scs-labrat/android_autorooter\n\nGitHub - OvidijusParsiunas/deep-chat: Fully customizable AI chatbot component for your website\n\nhttps://github.com/OvidijusParsiunas/deep-chat\n\nGitHub - orhun/flawz: A Terminal UI for browsing security vulnerabilities (CVEs)\n\nhttps://github.com/orhun/flawz\n\nGitHub - rashadphz/farfalle: \ud83d\udd0d AI search engine - self-host with local or cloud LLMs\n\nhttps://github.com/rashadphz/farfalle\n\nGitHub - AnonCatalyst/Ominis-OSINT: This Python application is an OSINT (Open Source Intelligence) tool called \"Ominis OSINT - Web Hunter.\" It performs online information gathering by querying Google for search results related to a user-inputted query.\n\nhttps://github.com/AnonCatalyst/Ominis-OSINT\n\nGitHub - Lissy93/dashy: \ud83d\ude80 A self-hostable personal dashboard built for you. Includes status-checking, widgets, themes, icon packs, a UI editor and tons more!\n\nhttps://github.com/Lissy93/dashy\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-07-13T05:51:35.000000Z"}, {"uuid": "896ea026-44ff-440a-86c5-7b329b48a2e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0044", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/8143", "content": "Tools - Hackers Factory\n\nA signal handler race condition in OpenSSH's server (sshd)\n\nhttps://github.com/zgzhang/cve-2024-6387-poc\n\nPrivilege Escalation Enumeration Script for Windows\n\nhttps://github.com/itm4n/PrivescCheck\n\nTwo new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration &amp; Fiber injection capability POC tool) PhantomThread (An evolved callstack-masking implementation)\n\nhttps://github.com/JanielDary/ImmoralFiber\n\nStatic deobfuscator for Themida/WinLicense/Code Virtualizer's mutation-based obfuscation.\n\nhttps://github.com/ergrelet/themida-unmutate\n\nExample code samples from our ScriptBlock Smuggling Blog post\n\nhttps://github.com/BC-SECURITY/ScriptBlock-Smuggling\n\nRusty Hypervisor - Windows UEFI Blue Pill Type-1 Hypervisor in Rust (Codename: Illusion)\n\nhttps://github.com/memN0ps/illusion-rs\n\nThis Burp Suite extension allows you to copy HTTP requests without including cookies or tokens. It removes sensitive information related to authentication, session management, and CSRF protection from the requests, making it easier to share or analyze them without exposing sensitive data.\n\nhttps://github.com/haticeerturk/requestCleaner\n\nGitHub - pl4int3xt/cve_2024_0044: CVE-2024-0044: a &quot;run-as any app&quot; high-severity vulnerability affecting Android versions 12 and 13 -\n\nhttps://github.com/pl4int3xt/cve_2024_0044\n\nZyxel NAS326 firmware &lt; V5.21(AAZF.17)C0 - Command Injection CVE-2024-29973\n\nhttps://github.com/momika233/CVE-2024-29973\n\nSudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing advanced automated reconnaissance (framework). This tool can also be used for OSINT (Open-source intelligence) activities.\n\nhttps://github.com/screetsec/Sudomy\n\n#CyberDilara\nhttps://t.me/CyberDilara\n\n#CyberBulletin\nhttps://t.me/CyberBulletin", "creation_timestamp": "2024-07-04T09:43:38.000000Z"}, {"uuid": "36552c27-5f07-4ba3-926c-21eaf54882d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0044", "type": "seen", "source": "https://t.me/dilagrafie/3348", "content": "Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability\n\n#Hacking #infosec #mobile #CVE", "creation_timestamp": "2024-06-22T12:28:25.000000Z"}, {"uuid": "05ce3bca-b0d6-4304-a5c3-9b669eb4284c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0044", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3404", "content": "Tools - Hackers Factory \n\nGitHub - R3DRUN3/sploitcraft: \ud83c\udff4\u200d\u2620\ufe0f Hacking Guides, Demos and Proof-of-Concepts \ud83e\udd77\n\nhttps://github.com/R3DRUN3/sploitcraft\n\npython-scripts/google_dorker.py at main \u00b7 networkdavit/python-scripts \u00b7 GitHub\n\nhttps://github.com/networkdavit/python-scripts/blob/main/google_dorker.py\n\nGitHub - ultrasecurity/Storm-Breaker: Social engineering tool [Access Webcam &amp; Microphone &amp; Location Finder] With {Py,JS,PHP}\n\nhttps://github.com/ultrasecurity/Storm-Breaker\n\nGitHub - jcldf/ultimate-hardware-hacking-gear-guide-: Unlock Exclusive Insights!  Download FREE E-Zine Now \u27a1\ufe0f Over 170 Pages of Essential Content! Elevate your hardware hacking game with insider tips and the latest trends.\n\nhttps://github.com/jcldf/ultimate-hardware-hacking-gear-guide-\n\nGitHub - scs-labrat/android_autorooter: Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely\n\nhttps://github.com/scs-labrat/android_autorooter\n\nGitHub - OvidijusParsiunas/deep-chat: Fully customizable AI chatbot component for your website\n\nhttps://github.com/OvidijusParsiunas/deep-chat\n\nGitHub - orhun/flawz: A Terminal UI for browsing security vulnerabilities (CVEs)\n\nhttps://github.com/orhun/flawz\n\nGitHub - rashadphz/farfalle: \ud83d\udd0d AI search engine - self-host with local or cloud LLMs\n\nhttps://github.com/rashadphz/farfalle\n\nGitHub - AnonCatalyst/Ominis-OSINT: This Python application is an OSINT (Open Source Intelligence) tool called \"Ominis OSINT - Web Hunter.\" It performs online information gathering by querying Google for search results related to a user-inputted query.\n\nhttps://github.com/AnonCatalyst/Ominis-OSINT\n\nGitHub - Lissy93/dashy: \ud83d\ude80 A self-hostable personal dashboard built for you. Includes status-checking, widgets, themes, icon packs, a UI editor and tons more!\n\nhttps://github.com/Lissy93/dashy\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-07-13T05:50:22.000000Z"}, {"uuid": "832a4fca-4276-491c-8f5e-70072363020a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0044", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3380", "content": "Tools - Hackers Factory\n\nA signal handler race condition in OpenSSH's server (sshd)\n\nhttps://github.com/zgzhang/cve-2024-6387-poc\n\nPrivilege Escalation Enumeration Script for Windows\n\nhttps://github.com/itm4n/PrivescCheck\n\nTwo new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration &amp; Fiber injection capability POC tool) PhantomThread (An evolved callstack-masking implementation)\n\nhttps://github.com/JanielDary/ImmoralFiber\n\nStatic deobfuscator for Themida/WinLicense/Code Virtualizer's mutation-based obfuscation.\n\nhttps://github.com/ergrelet/themida-unmutate\n\nExample code samples from our ScriptBlock Smuggling Blog post\n\nhttps://github.com/BC-SECURITY/ScriptBlock-Smuggling\n\nRusty Hypervisor - Windows UEFI Blue Pill Type-1 Hypervisor in Rust (Codename: Illusion)\n\nhttps://github.com/memN0ps/illusion-rs\n\nThis Burp Suite extension allows you to copy HTTP requests without including cookies or tokens. It removes sensitive information related to authentication, session management, and CSRF protection from the requests, making it easier to share or analyze them without exposing sensitive data.\n\nhttps://github.com/haticeerturk/requestCleaner\n\nGitHub - pl4int3xt/cve_2024_0044: CVE-2024-0044: a &quot;run-as any app&quot; high-severity vulnerability affecting Android versions 12 and 13 -\n\nhttps://github.com/pl4int3xt/cve_2024_0044\n\nZyxel NAS326 firmware &lt; V5.21(AAZF.17)C0 - Command Injection CVE-2024-29973\n\nhttps://github.com/momika233/CVE-2024-29973\n\nSudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing advanced automated reconnaissance (framework). This tool can also be used for OSINT (Open-source intelligence) activities.\n\nhttps://github.com/screetsec/Sudomy\n\n#CyberDilara\nhttps://t.me/CyberDilara\n\n#CyberBulletin\nhttps://t.me/CyberBulletin", "creation_timestamp": "2024-07-04T09:37:27.000000Z"}, {"uuid": "aab3e417-51b2-4de5-a19e-6a01613ada24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0044", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/6861", "content": "Tools - Hackers Factory\n\nA signal handler race condition in OpenSSH's server (sshd)\n\nhttps://github.com/zgzhang/cve-2024-6387-poc\n\nPrivilege Escalation Enumeration Script for Windows\n\nhttps://github.com/itm4n/PrivescCheck\n\nTwo new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration &amp; Fiber injection capability POC tool) PhantomThread (An evolved callstack-masking implementation)\n\nhttps://github.com/JanielDary/ImmoralFiber\n\nStatic deobfuscator for Themida/WinLicense/Code Virtualizer's mutation-based obfuscation.\n\nhttps://github.com/ergrelet/themida-unmutate\n\nExample code samples from our ScriptBlock Smuggling Blog post\n\nhttps://github.com/BC-SECURITY/ScriptBlock-Smuggling\n\nRusty Hypervisor - Windows UEFI Blue Pill Type-1 Hypervisor in Rust (Codename: Illusion)\n\nhttps://github.com/memN0ps/illusion-rs\n\nThis Burp Suite extension allows you to copy HTTP requests without including cookies or tokens. It removes sensitive information related to authentication, session management, and CSRF protection from the requests, making it easier to share or analyze them without exposing sensitive data.\n\nhttps://github.com/haticeerturk/requestCleaner\n\nGitHub - pl4int3xt/cve_2024_0044: CVE-2024-0044: a &quot;run-as any app&quot; high-severity vulnerability affecting Android versions 12 and 13 -\n\nhttps://github.com/pl4int3xt/cve_2024_0044\n\nZyxel NAS326 firmware &lt; V5.21(AAZF.17)C0 - Command Injection CVE-2024-29973\n\nhttps://github.com/momika233/CVE-2024-29973\n\nSudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing advanced automated reconnaissance (framework). This tool can also be used for OSINT (Open-source intelligence) activities.\n\nhttps://github.com/screetsec/Sudomy\n\n#CyberDilara\nhttps://t.me/CyberDilara\n\n#CyberBulletin\nhttps://t.me/CyberBulletin", "creation_timestamp": "2024-07-04T09:43:38.000000Z"}, {"uuid": "d664b687-9a42-42d3-9139-c827cf32820b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0044", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/6916", "content": "Tools - Hackers Factory \n\nGitHub - R3DRUN3/sploitcraft: \ud83c\udff4\u200d\u2620\ufe0f Hacking Guides, Demos and Proof-of-Concepts \ud83e\udd77\n\nhttps://github.com/R3DRUN3/sploitcraft\n\npython-scripts/google_dorker.py at main \u00b7 networkdavit/python-scripts \u00b7 GitHub\n\nhttps://github.com/networkdavit/python-scripts/blob/main/google_dorker.py\n\nGitHub - ultrasecurity/Storm-Breaker: Social engineering tool [Access Webcam &amp; Microphone &amp; Location Finder] With {Py,JS,PHP}\n\nhttps://github.com/ultrasecurity/Storm-Breaker\n\nGitHub - jcldf/ultimate-hardware-hacking-gear-guide-: Unlock Exclusive Insights!  Download FREE E-Zine Now \u27a1\ufe0f Over 170 Pages of Essential Content! Elevate your hardware hacking game with insider tips and the latest trends.\n\nhttps://github.com/jcldf/ultimate-hardware-hacking-gear-guide-\n\nGitHub - scs-labrat/android_autorooter: Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely\n\nhttps://github.com/scs-labrat/android_autorooter\n\nGitHub - OvidijusParsiunas/deep-chat: Fully customizable AI chatbot component for your website\n\nhttps://github.com/OvidijusParsiunas/deep-chat\n\nGitHub - orhun/flawz: A Terminal UI for browsing security vulnerabilities (CVEs)\n\nhttps://github.com/orhun/flawz\n\nGitHub - rashadphz/farfalle: \ud83d\udd0d AI search engine - self-host with local or cloud LLMs\n\nhttps://github.com/rashadphz/farfalle\n\nGitHub - AnonCatalyst/Ominis-OSINT: This Python application is an OSINT (Open Source Intelligence) tool called \"Ominis OSINT - Web Hunter.\" It performs online information gathering by querying Google for search results related to a user-inputted query.\n\nhttps://github.com/AnonCatalyst/Ominis-OSINT\n\nGitHub - Lissy93/dashy: \ud83d\ude80 A self-hostable personal dashboard built for you. Includes status-checking, widgets, themes, icon packs, a UI editor and tons more!\n\nhttps://github.com/Lissy93/dashy\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-07-13T05:51:35.000000Z"}, {"uuid": "469cb54f-9797-4b0a-b034-8db84dcad2d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0044", "type": "seen", "source": "https://t.me/ctinow/204940", "content": "https://ift.tt/M9zUCT8\nCVE-2024-0044", "creation_timestamp": "2024-03-11T18:26:49.000000Z"}, {"uuid": "cb819aae-6872-443a-86e3-beaf9901e1da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0044", "type": "published-proof-of-concept", "source": "https://t.me/GhostClanInt/25264", "content": "Tools - Hackers Factory \n\nGitHub - R3DRUN3/sploitcraft: \ud83c\udff4\u200d\u2620\ufe0f Hacking Guides, Demos and Proof-of-Concepts \ud83e\udd77\n\nhttps://github.com/R3DRUN3/sploitcraft\n\npython-scripts/google_dorker.py at main \u00b7 networkdavit/python-scripts \u00b7 GitHub\n\nhttps://github.com/networkdavit/python-scripts/blob/main/google_dorker.py\n\nGitHub - ultrasecurity/Storm-Breaker: Social engineering tool [Access Webcam &amp; Microphone &amp; Location Finder] With {Py,JS,PHP}\n\nhttps://github.com/ultrasecurity/Storm-Breaker\n\nGitHub - jcldf/ultimate-hardware-hacking-gear-guide-: Unlock Exclusive Insights!  Download FREE E-Zine Now \u27a1\ufe0f Over 170 Pages of Essential Content! Elevate your hardware hacking game with insider tips and the latest trends.\n\nhttps://github.com/jcldf/ultimate-hardware-hacking-gear-guide-\n\nGitHub - scs-labrat/android_autorooter: Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely\n\nhttps://github.com/scs-labrat/android_autorooter\n\nGitHub - OvidijusParsiunas/deep-chat: Fully customizable AI chatbot component for your website\n\nhttps://github.com/OvidijusParsiunas/deep-chat\n\nGitHub - orhun/flawz: A Terminal UI for browsing security vulnerabilities (CVEs)\n\nhttps://github.com/orhun/flawz\n\nGitHub - rashadphz/farfalle: \ud83d\udd0d AI search engine - self-host with local or cloud LLMs\n\nhttps://github.com/rashadphz/farfalle\n\nGitHub - AnonCatalyst/Ominis-OSINT: This Python application is an OSINT (Open Source Intelligence) tool called \"Ominis OSINT - Web Hunter.\" It performs online information gathering by querying Google for search results related to a user-inputted query.\n\nhttps://github.com/AnonCatalyst/Ominis-OSINT\n\nGitHub - Lissy93/dashy: \ud83d\ude80 A self-hostable personal dashboard built for you. Includes status-checking, widgets, themes, icon packs, a UI editor and tons more!\n\nhttps://github.com/Lissy93/dashy\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-07-13T21:10:48.000000Z"}, {"uuid": "0695ce80-02fd-47a8-89ea-9c17d9266445", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0044", "type": "seen", "source": "https://t.me/ctinow/204927", "content": "https://ift.tt/M9zUCT8\nCVE-2024-0044", "creation_timestamp": "2024-03-11T18:26:36.000000Z"}, {"uuid": "3a94dcfb-2b76-43fd-92c1-69049e35a9f2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0044", "type": "published-proof-of-concept", "source": "https://t.me/Kelvinseccommunity/613", "content": "#tools\n#Offensive_security\n1. EDR/XDR/AV Killer\nhttps://github.com/EvilBytecode/EDR-XDR-AV-Killer\n2. Android 12/13 Autorooter\n(CVE-2024-0044)\nhttps://github.com/scs-labrat/android_autorooter", "creation_timestamp": "2024-06-19T19:05:04.000000Z"}, {"uuid": "64718e39-c46f-4691-9ff2-7f01661b0153", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0044", "type": "published-proof-of-concept", "source": "https://t.me/GhostClanInt/25207", "content": "Tools - Hackers Factory\n\nA signal handler race condition in OpenSSH's server (sshd)\n\nhttps://github.com/zgzhang/cve-2024-6387-poc\n\nPrivilege Escalation Enumeration Script for Windows\n\nhttps://github.com/itm4n/PrivescCheck\n\nTwo new offensive techniques using Windows Fibers: PoisonFiber (The first remote enumeration &amp; Fiber injection capability POC tool) PhantomThread (An evolved callstack-masking implementation)\n\nhttps://github.com/JanielDary/ImmoralFiber\n\nStatic deobfuscator for Themida/WinLicense/Code Virtualizer's mutation-based obfuscation.\n\nhttps://github.com/ergrelet/themida-unmutate\n\nExample code samples from our ScriptBlock Smuggling Blog post\n\nhttps://github.com/BC-SECURITY/ScriptBlock-Smuggling\n\nRusty Hypervisor - Windows UEFI Blue Pill Type-1 Hypervisor in Rust (Codename: Illusion)\n\nhttps://github.com/memN0ps/illusion-rs\n\nThis Burp Suite extension allows you to copy HTTP requests without including cookies or tokens. It removes sensitive information related to authentication, session management, and CSRF protection from the requests, making it easier to share or analyze them without exposing sensitive data.\n\nhttps://github.com/haticeerturk/requestCleaner\n\nGitHub - pl4int3xt/cve_2024_0044: CVE-2024-0044: a &quot;run-as any app&quot; high-severity vulnerability affecting Android versions 12 and 13 -\n\nhttps://github.com/pl4int3xt/cve_2024_0044\n\nZyxel NAS326 firmware &lt; V5.21(AAZF.17)C0 - Command Injection CVE-2024-29973\n\nhttps://github.com/momika233/CVE-2024-29973\n\nSudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing advanced automated reconnaissance (framework). This tool can also be used for OSINT (Open-source intelligence) activities.\n\nhttps://github.com/screetsec/Sudomy\n\n#CyberDilara\nhttps://t.me/CyberDilara\n\n#CyberBulletin\nhttps://t.me/CyberBulletin", "creation_timestamp": "2024-07-04T09:50:35.000000Z"}, {"uuid": "16c7ba45-ea20-4125-bf8a-49befc98cda5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0044", "type": "published-proof-of-concept", "source": "https://t.me/androidMalware/2172", "content": "Bypassing the \"run-as\" debuggability check on Android via newline injection (CVE-2024-0044)\nAttack scenario: A local attacker with ADB shell access to an Android 12 or 13 device with Developer Mode enabled can exploit the vulnerability to run code in the context of any non-system-UID app. From there, the attacker can do anything the app can, like access its private data files or read the credentials it\u2019s stored in AccountManager\nhttps://rtx.meta.security/exploitation/2024/03/04/Android-run-as-forgery.html", "creation_timestamp": "2024-04-11T06:00:32.000000Z"}, {"uuid": "c8dbf3cf-c84b-4207-b5e8-12fef8fe7be5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0044", "type": "published-proof-of-concept", "source": "https://t.me/androidMalware/2254", "content": "Exfiltrate WhatsApp chat, or internal data of any Android app, running on Android 12 or 13 by exploiting CVE-2024-0044 vulnerability [video]\nhttps://www.mobile-hacker.com/2024/06/17/exfiltrate-sensitive-user-data-from-apps-on-android-12-and-13-using-cve-2024-0044-vulnerability/", "creation_timestamp": "2024-08-01T10:33:54.000000Z"}, {"uuid": "2ffa63b6-4c46-4db7-a35e-dd8803f696d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0044", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/2698", "content": "https://github.com/pl4int3xt/cve_2024_0044\n\nCVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13\n#github #poc", "creation_timestamp": "2024-06-22T14:23:06.000000Z"}, {"uuid": "5bc475e4-17f0-4a41-b235-fe360e11461c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0044", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/2683", "content": "https://github.com/scs-labrat/android_autorooter\n\nExfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability remotely\n#github #exploit", "creation_timestamp": "2024-06-19T07:39:38.000000Z"}, {"uuid": "86c42b80-1f54-42c1-a7a7-2c70189c7f53", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0044", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/10699", "content": "#exploit\n#Mobile_Security\nExtracting WhatsApp Database (or any app data) from Android 12/13 using CVE-2024-0044\nhttps://tinyhack.com/2024/06/07/extracting-whatsapp-database-or-any-app-data-from-android-12-13-using-cve-2024-0044", "creation_timestamp": "2024-06-18T19:06:04.000000Z"}, {"uuid": "483ed540-3cd9-4f65-95b3-9a1c68d49406", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0044", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/10705", "content": "#tools\n#Offensive_security\n1. EDR/XDR/AV Killer\nhttps://github.com/EvilBytecode/EDR-XDR-AV-Killer\n2. Android 12/13 Autorooter\n(CVE-2024-0044)\nhttps://github.com/scs-labrat/android_autorooter\n]-&gt; PoC: https://github.com/pl4int3xt/cve_2024_0044", "creation_timestamp": "2024-06-21T18:15:45.000000Z"}, {"uuid": "31cfa426-0e17-4cb9-8e29-f98a2eded01b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0044", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/1066", "content": "Tools - Hackers Factory \n\nMemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR \n\nhttps://github.com/evild3ad/MemProcFS-Analyzer\n\nTeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.\n\nhttps://github.com/PeterGabaldon/CVE-2024-7479_CVE-2024-7481\n\nGet PROXY List that gets updated everyday \n\nhttps://github.com/TheSpeedX/PROXY-List\n\nPrying Deep - An OSINT tool to collect intelligence on the dark web\n\nhttps://github.com/iudicium/pryingdeep\n\nA tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where we scanned 20k+ public AMIs. \n\nhttps://github.com/saw-your-packet/CloudShovel\n\nCVE-2024-45519\n\nhttps://github.com/p33d/CVE-2024-45519\n\nCVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13 \n\nhttps://github.com/pl4int3xt/cve_2024_0044\n\nGoogle &amp; Shodan Dorks for WebCam\n\nhttps://github.com/ExploitXpErtz/WebCam-Google-Shodan-Dorks\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-14T06:00:43.000000Z"}, {"uuid": "e091f1f0-61db-4a05-8b92-6259cbb88be1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-0044", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3793", "content": "Tools - Hackers Factory \n\nMemProcFS-Analyzer - Automated Forensic Analysis of Windows Memory Dumps for DFIR \n\nhttps://github.com/evild3ad/MemProcFS-Analyzer\n\nTeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.\n\nhttps://github.com/PeterGabaldon/CVE-2024-7479_CVE-2024-7481\n\nGet PROXY List that gets updated everyday \n\nhttps://github.com/TheSpeedX/PROXY-List\n\nPrying Deep - An OSINT tool to collect intelligence on the dark web\n\nhttps://github.com/iudicium/pryingdeep\n\nA tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where we scanned 20k+ public AMIs. \n\nhttps://github.com/saw-your-packet/CloudShovel\n\nCVE-2024-45519\n\nhttps://github.com/p33d/CVE-2024-45519\n\nCVE-2024-0044: a \"run-as any app\" high-severity vulnerability affecting Android versions 12 and 13 \n\nhttps://github.com/pl4int3xt/cve_2024_0044\n\nGoogle &amp; Shodan Dorks for WebCam\n\nhttps://github.com/ExploitXpErtz/WebCam-Google-Shodan-Dorks\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-10-14T06:01:06.000000Z"}]}