{"uuid": "d7eef646-2be0-43be-adf8-3d7591983784", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-50868", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/6752", "content": "Tools - Hackers Factory\n\nThis project generates DNS zonefiles with custom NSEC3 parameters to reproduce and evaluate the attacks in CVE-2023-50868. \n\nhttps://github.com/Goethe-Universitat-Cybersecurity/NSEC3-Encloser-Attack\n\nGitHub - kgdn/buffet: Web-based virtual machine manager - BSc. Computer Systems dissertation project (Heriot-Watt University)\n\nhttps://github.com/kgdn/buffet\n\nA full Mod_Security guide to use local software like clam-av, chkrootkit, fail2ban, rkhunter for Nginx &amp; Apache \n\nhttps://github.com/VolkanSah/ModSecurity-Webserver-Protection-Guide\n\nMac RDP Client: Kerberos and Protected Users Guide\nhttps://awakecoding.com/posts/mac-rdp-client-kerberos-and-protected-users-guide/\n\n#exploit\n1. CVE-2023-46817:\nphpFox &lt;=4.8.13 (redirect) PHP Object Injection\nhttps://karmainsecurity.com/pocs/CVE-2023-46817.php\n\n2. Magento CE RCE Exploit\nhttps://github.com/Hackhoven/Magento-RCE\n\n#tools #Offensive_security\n\n1. Tools for analyzing EDR agents\nhttps://github.com/outflanknl/edr-internals\n\n2. Benevolent Shellcode Loader\nhttps://github.com/jakobfriedl/BenevolentLoader\n\n#exploit\n1. CVE-2024-30850, CVE-2024-31839:\nCHAOS RAT v5.01 web panel RCE\nhttps://github.com/chebuya/CVE-2024-30850-chaos-rat-rce-poc\n\n2. CVE-2024-28995:\nSolarWinds Serv-U directory transversal\nhttps://github.com/rapid7/metasploit-framework/pull/19255\n\nhttps://attackerkb.com/topics/2k7UrkHyl3/cve-2024-28995/rapid7-analysis\n\n#reversing\n1. TempleOS Reverse Engineering\nhttps://starkeblog.com/bootsector/templeos/2024/06/13/templeos-reverse-engineering-part-i.html\n2. Thecus NAS Firmware Decryption\nhttps://starkeblog.com/cryptography/firmware/2024/06/11/thecus-nas-firmware-decrypt.html\n\nhttps://github.com/nstarke/thecus-firmware-decrypt\n\nHijack clicks on and within links, probably for client-side routing \n\n#Research\n\"Hyperlink Hijacking: Exploiting Erroneous URL Links to Phantom Domains\", 2024.\n\nhttps://github.com/mapbox/link-hijacker\n\n#exploit\n1. CVE-2022-41034:\nVSCode ipynb RCE\nhttps://packetstormsecurity.com/files/179029/VSCode-ipynb-Remote-Code-Execution.html\n\n2. CVE-2024-27801:\nUaF in NSXPC on all Apple platforms\nhttps://github.com/wangtielei/POCs/tree/main/CVE-2024-27801\n+ UAF in AGX (iOS &lt;13):\nhttps://github.com/wangtielei/POCs/tree/main/No_CVE\n\n#HackersFactory", "creation_timestamp": "2024-06-18T09:34:50.000000Z"}