{"vulnerability": "CVE-2024-30088", "sightings": [{"uuid": "90c6071a-b597-40bb-9eb8-140cb62be8e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30088", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2024-10-15T21:10:02.000000Z"}, {"uuid": "1b5f776d-7717-4d7b-8297-0d5901a29597", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30088", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3le4rrii2le2j", "content": "", "creation_timestamp": "2024-12-25T10:45:52.958488Z"}, {"uuid": "5ce6a34e-bb74-4cf2-a12f-77aa39566189", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30088", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:46.000000Z"}, {"uuid": "31726164-8170-4619-959f-f6233e6c0159", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30088", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:11:02.000000Z"}, {"uuid": "084ba3af-f7cd-47a1-8e29-8d71559c2f30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30088", "type": "seen", "source": "https://bsky.app/profile/0xdf.bsky.social/post/3miostoyyos2o", "content": "", "creation_timestamp": "2026-04-04T17:59:53.794145Z"}, {"uuid": "c10b4de0-255d-4224-ac1b-a942bb2b014e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30088", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:11:00.000000Z"}, {"uuid": "3beced90-0595-4f7d-a4e6-d8c07664cdec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30088", "type": "seen", "source": "https://bsky.app/profile/xyla.shitpost.trade.ap.brid.gy/post/3lq3z6zkishi2", "content": "", "creation_timestamp": "2025-05-26T20:28:32.627115Z"}, {"uuid": "8e711df7-dca3-4f27-87bc-618f24bf1d8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30088", "type": "seen", "source": "https://bsky.app/profile/gamesandconsoles.bsky.social/post/3lsehwehmiq2x", "content": "", "creation_timestamp": "2025-06-24T16:03:38.790847Z"}, {"uuid": "887d0dfd-a37e-43c1-994c-41a0c5a3bc8f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30088", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:02.000000Z"}, {"uuid": "23a3cd33-de7c-4e56-a665-b0af2c6c6f8a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30088", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/local/cve_2024_30088_authz_basep.rb", "content": "", "creation_timestamp": "2024-09-17T12:32:43.000000Z"}, {"uuid": "61be9ff9-4012-4a8a-878b-9d546076a20f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2024-30088", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/425f8459-7ade-48f4-9d2e-8b5d809e3e44", "content": "", "creation_timestamp": "2026-02-02T12:26:26.234191Z"}, {"uuid": "91070ecb-8627-4492-91ef-e3a6763a2040", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30088", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8091", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aQuesta repository contiene una replica (tentativo di replica) scritto in Python per CVE-2024-30088.\nURL\uff1ahttps://github.com/Admin9961/CVE-2024-30088\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-07-27T10:43:35.000000Z"}, {"uuid": "c1ec221d-129e-4afb-9aa3-759682a725bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30088", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7986", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aKernel exploit for Xbox SystemOS using CVE-2024-30088\nURL\uff1ahttps://github.com/exploits-forsale/collateral-damage\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-07-15T08:53:31.000000Z"}, {"uuid": "b2ffe98f-4f29-4354-8a47-4c79af3a7e0a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30088", "type": "published-proof-of-concept", "source": "Telegram/LZnB2uRGjvSMX1a86_gYteJhuOo14W3NiFk2b0mfWdXAigg", "content": "", "creation_timestamp": "2026-04-17T09:00:04.000000Z"}, {"uuid": "64ec3a45-74d5-4d8f-8858-7e5da79dfa07", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30088", "type": "published-proof-of-concept", "source": "https://t.me/BlackHat0Hackers/3051", "content": "Windows LPE Exploit\nhttps://github.com/tykawaii98/CVE-2024-30088", "creation_timestamp": "2024-08-24T16:23:44.000000Z"}, {"uuid": "3d68d1c5-872a-4010-8774-3da96ecbdb91", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30088", "type": "seen", "source": "https://t.me/itsec_news/4525", "content": "\u200b\u26a1\ufe0fCheck Point \u0438 Veeam \u043d\u0435 \u0443\u0441\u0442\u043e\u044f\u043b\u0438: \u043e\u0431\u0437\u043e\u0440 \u0442\u0440\u0435\u043d\u0434\u043e\u0432\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0437\u0430 \u0438\u044e\u043d\u044c\n\n\ud83d\udcac\u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f Positive Technologies \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043b\u0430 \u0441\u043f\u0438\u0441\u043e\u043a \u0434\u0435\u0432\u044f\u0442\u0438 \u043d\u0430\u0438\u0431\u043e\u043b\u0435\u0435 \u043e\u043f\u0430\u0441\u043d\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439, \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u044b\u0445 \u0432 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430\u0445 Microsoft, VMware, Linux, VPN-\u0448\u043b\u044e\u0437\u0435 \u043e\u0442 Check Point Software Technologies \u0438 \u0432 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u043c \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0438 Veeam Backup Enterprise Manager. \u042d\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u043f\u043e \u043c\u043d\u0435\u043d\u0438\u044e \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u043e\u0432, \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u044e\u0442 \u043d\u0430\u0438\u0431\u043e\u043b\u044c\u0448\u0443\u044e \u0443\u0433\u0440\u043e\u0437\u0443 \u0434\u043b\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0439 \u0438 \u0442\u0440\u0435\u0431\u0443\u044e\u0442 \u043d\u0435\u043c\u0435\u0434\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u0438\u043b\u0438 \u043f\u0440\u0438\u043d\u044f\u0442\u0438\u044f \u043a\u043e\u043c\u043f\u0435\u043d\u0441\u0438\u0440\u0443\u044e\u0449\u0438\u0445 \u043c\u0435\u0440.\n\n\u0422\u0440\u0435\u043d\u0434\u043e\u0432\u044b\u043c\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u043c\u0438 \u0441\u0447\u0438\u0442\u0430\u044e\u0442\u0441\u044f \u0442\u0435 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442\u0441\u044f \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c\u0438 \u0438\u043b\u0438 \u043c\u043e\u0433\u0443\u0442 \u0431\u044b\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u044b \u0432 \u0431\u043b\u0438\u0436\u0430\u0439\u0448\u0435\u0435 \u0432\u0440\u0435\u043c\u044f. \u0414\u043b\u044f \u0438\u0445 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f \u044d\u043a\u0441\u043f\u0435\u0440\u0442\u044b Positive Technologies \u0430\u043d\u0430\u043b\u0438\u0437\u0438\u0440\u0443\u044e\u0442 \u0434\u0430\u043d\u043d\u044b\u0435 \u0438\u0437 \u0440\u0430\u0437\u043b\u0438\u0447\u043d\u044b\u0445 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u043e\u0432: \u0431\u0430\u0437\u044b \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0438 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u043e\u0432, \u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0432\u0435\u043d\u0434\u043e\u0440\u043e\u0432, \u0441\u043e\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0435 \u0441\u0435\u0442\u0438, \u0431\u043b\u043e\u0433\u0438 \u0438 \u0442\u0435\u043b\u0435\u0433\u0440\u0430\u043c-\u043a\u0430\u043d\u0430\u043b\u044b, \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u044b\u0435 \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u0438 \u043a\u043e\u0434\u0430 \u0438 \u0434\u0440\u0443\u0433\u0438\u0435.\n\n\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 Windows\n\u041d\u0430\u0438\u0431\u043e\u043b\u0435\u0435 \u0437\u043d\u0430\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u043c\u0438 \u044f\u0432\u043b\u044f\u044e\u0442\u0441\u044f \u0442\u0440\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u043d\u044b\u0435 \u0432 Windows. \u041e\u043d\u0438 \u043c\u043e\u0433\u0443\u0442 \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u044c \u043e\u043a\u043e\u043b\u043e \u043c\u0438\u043b\u043b\u0438\u0430\u0440\u0434\u0430 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 \u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043c\u0430\u043a\u0441\u0438\u043c\u0430\u043b\u044c\u043d\u044b\u0435 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0435, \u0447\u0442\u043e \u043e\u0442\u043a\u0440\u044b\u0432\u0430\u0435\u0442 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u0434\u043b\u044f \u0434\u0430\u043b\u044c\u043d\u0435\u0439\u0448\u0435\u0433\u043e \u0440\u0430\u0437\u0432\u0438\u0442\u0438\u044f \u0430\u0442\u0430\u043a\u0438.\n\n1. CVE-2024-26229: \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0435 \u0434\u043b\u044f \u0445\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u0430\u0432\u0442\u043e\u043d\u043e\u043c\u043d\u044b\u0445 \u0444\u0430\u0439\u043b\u043e\u0432 Client-Side Caching (CSC) Windows. \u041e\u0448\u0438\u0431\u043a\u0430 \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435\u043c \u0431\u0443\u0444\u0435\u0440\u0430, \u0447\u0442\u043e \u043f\u0440\u0438\u0432\u043e\u0434\u0438\u0442 \u043a \u0437\u043b\u043e\u0432\u0440\u0435\u0434\u043d\u043e\u0439 \u043f\u0435\u0440\u0435\u0437\u0430\u043f\u0438\u0441\u0438 \u043f\u0430\u043c\u044f\u0442\u0438 \u0432 \u043a\u0443\u0447\u0435 (\u043e\u0442\u043d\u0435\u0441\u0435\u043d\u0430 \u0432 \u043a\u0430\u0442\u0435\u0433\u043e\u0440\u0438\u044e CWE-122 ). ). \u042d\u0442\u043e \u043f\u0440\u043e\u0438\u0441\u0445\u043e\u0434\u0438\u0442 \u0438\u0437-\u0437\u0430 \u043d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u043e\u0439 \u0440\u0430\u0431\u043e\u0442\u044b \u0441 \u043f\u0430\u043c\u044f\u0442\u044c\u044e \u0432 \u0441\u043b\u0443\u0436\u0431\u0435 \u043a\u044d\u0448\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f CSC. CVSS-\u043e\u0446\u0435\u043d\u043a\u0430: 7,8.\n\n2. CVE-2024-26169: \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u0441\u043b\u0443\u0436\u0431\u0435 \u043e\u0442\u043f\u0440\u0430\u0432\u043a\u0438 \u0441\u043e\u043e\u0431\u0449\u0435\u043d\u0438\u0439 \u043e\u0431 \u043e\u0448\u0438\u0431\u043a\u0430\u0445 (Windows Error Reporting). \u041e\u043d\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 \u0432 \u0441\u043b\u0443\u0436\u0431\u0435 \u0440\u0435\u0433\u0438\u0441\u0442\u0440\u0430\u0446\u0438\u0438 \u043e\u0448\u0438\u0431\u043e\u043a Windows \u0438 \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u0430 \u0432 \u043a\u0430\u0442\u0435\u0433\u043e\u0440\u0438\u044e CWE-269 . \u042d\u0442\u043e\u0442 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u043a \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0441\u0432\u044f\u0437\u0430\u043d \u0441 \u0442\u0435\u043c, \u0447\u0442\u043e \u0441\u043b\u0443\u0436\u0431\u0430 \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e \u043d\u0430\u0437\u043d\u0430\u0447\u0430\u0435\u0442, \u0438\u0437\u043c\u0435\u043d\u044f\u0435\u0442, \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u0442 \u0438\u043b\u0438 \u043f\u0440\u043e\u0432\u0435\u0440\u044f\u0435\u0442 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f, \u0438\u0437-\u0437\u0430 \u0447\u0435\u0433\u043e \u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u043e\u0432 \u043f\u043e\u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u0435\u0433\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c. CVSS-\u043e\u0446\u0435\u043d\u043a\u0430: 7,8.\n\n3. CVE-2024-30088: \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u044f\u0434\u0440\u0430 Windows, \u0432\u044b\u0437\u0432\u0430\u043d\u043d\u0430\u044f \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u043e\u043c \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0432 \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u043f\u043e\u0434\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u044b NtQueryInformationToken. \u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0432\u043e\u0437\u043d\u0438\u043a\u0430\u0435\u0442 \u0438\u0437-\u0437\u0430 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u044f \u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e\u0439 \u0431\u043b\u043e\u043a\u0438\u0440\u043e\u0432\u043a\u0438 \u043f\u0440\u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0438 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0439 \u043d\u0430\u0434 \u043e\u0431\u044a\u0435\u043a\u0442\u043e\u043c. CVSS-\u043e\u0446\u0435\u043d\u043a\u0430: 7,0.\n\n\u0414\u043b\u044f \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u043f\u0435\u0440\u0435\u0447\u0438\u0441\u043b\u0435\u043d\u043d\u044b\u0445 \u0432\u044b\u0448\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 Microsoft \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u0441\u043e\u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0443\u044e\u0449\u0438\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438: CVE-2024-26229 , CVE-2024-26169 , CVE-2024-30088 .\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 Linux \u0438 VMware\n\u0415\u0449\u0435 \u043e\u0434\u043d\u0430 \u0437\u043d\u0430\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u044b\u043b\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 \u0432 \u044f\u0434\u0440\u0435 Linux, \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044e\u0449\u0430\u044f \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u043b\u0443\u0442\u043e\u0440\u0430 \u043c\u0438\u043b\u043b\u0438\u043e\u043d\u043e\u0432 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432.\n\n4. CVE-2024-1086: \u041e\u0448\u0438\u0431\u043a\u0430 \u0432 \u043f\u043e\u0434\u0441\u0438\u0441\u0442\u0435\u043c\u0435 \u043c\u0435\u0436\u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u044d\u043a\u0440\u0430\u043d\u0430 netfilter \u044f\u0434\u0440\u0430 Linux \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u0434\u043e \u0443\u0440\u043e\u0432\u043d\u044f root. \u042d\u0442\u043e \u043c\u043e\u0436\u0435\u0442 \u043f\u0440\u0438\u0432\u0435\u0441\u0442\u0438 \u043a \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u044b\u043c \u043f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f\u043c \u0434\u043b\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0441\u0438\u0441\u0442\u0435\u043c\u044b. CVSS-\u043e\u0446\u0435\u043d\u043a\u0430: 7,8. \u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u043e\u0432\u0430\u043d\u043e \u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u044c \u0438\u043d\u0441\u0442\u0440\u0443\u043a\u0446\u0438\u0438 \u043d\u0430 \u043e\u0444\u0438\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0439 \u0441\u0442\u0440\u0430\u043d\u0438\u0446\u0435 kernel.org .\nVMware \u0442\u0430\u043a\u0436\u0435 \u043e\u043a\u0430\u0437\u0430\u043b\u0441\u044f \u043f\u043e\u0434 \u0443\u0434\u0430\u0440\u043e\u043c.\n\n5 \u0438 6. CVE-2024-37080 \u0438 CVE-2024-37079: \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 VMware vCenter, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0435 \u0441 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u044b\u043c \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435\u043c \u043a\u043e\u0434\u0430. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u0435 VMware vCenter \u0438 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043f\u043e\u043b\u043d\u044b\u0439 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c \u043d\u0430\u0434 \u0441\u0438\u0441\u0442\u0435\u043c\u043e\u0439 \u0441 \u0446\u0435\u043b\u044c\u044e \u0434\u0430\u043b\u044c\u043d\u0435\u0439\u0448\u0435\u0433\u043e \u0440\u0430\u0437\u0432\u0438\u0442\u0438\u044f \u0430\u0442\u0430\u043a\u0438. \u042d\u0442\u0438 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0432\u044b\u0437\u0432\u0430\u043d\u044b \u043e\u0448\u0438\u0431\u043a\u043e\u0439 \u0440\u0430\u0431\u043e\u0442\u044b \u0441 \u043f\u0430\u043c\u044f\u0442\u044c\u044e \u0432 \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0430 \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0432\u044b\u0437\u043e\u0432\u0430 \u043f\u0440\u043e\u0446\u0435\u0434\u0443\u0440 DCE (RPC). CVSS-\u043e\u0446\u0435\u043d\u043a\u0430: 9,8. \u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u0441\u043a\u0430\u0447\u0430\u0442\u044c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043d\u0430 \u043e\u0444\u0438\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0439 \u0441\u0442\u0440\u0430\u043d\u0438\u0446\u0435 VMware.\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 PHP \u0438 VPN-\u0448\u043b\u044e\u0437\u0435 Check Point\n\u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u044b \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u044f\u0437\u044b\u043a\u0435 PHP \u0438 VPN-\u0448\u043b\u044e\u0437\u0430\u0445 Check Point Software Technologies.\n\n7. CVE-2024-4577: \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u044f\u0437\u044b\u043a\u0435 PHP \u043f\u0440\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0438 Apache \u0438 PHP CGI \u0432 Windows. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u044b\u0439 \u043a\u043e\u0434 (remote code execution, RCE) \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0435. \u0412 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u0435 \u043e\u043d \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043f\u043e\u043b\u043d\u044b\u0439 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c \u043d\u0430\u0434 \u043d\u0435\u0439 \u0441 \u0446\u0435\u043b\u044c\u044e \u0434\u0430\u043b\u044c\u043d\u0435\u0439\u0448\u0435\u0433\u043e \u0440\u0430\u0437\u0432\u0438\u0442\u0438\u044f \u0430\u0442\u0430\u043a\u0438.\n\n\ud83d\udd14 ITsec NEWS", "creation_timestamp": "2024-07-11T09:12:24.000000Z"}, {"uuid": "8003e33e-894e-4eb0-87d1-4c5652aff87a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30088", "type": "published-proof-of-concept", "source": "Telegram/cPtN8zT2SnIpst_mCQq3aWBw8_Qfv87fHZTqq98UoI4vu1g", "content": "", "creation_timestamp": "2025-10-06T09:00:04.000000Z"}, {"uuid": "5f0451b0-bea3-4ee7-b6e4-ae929e0e33d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30088", "type": "seen", "source": "https://t.me/ics_cert/933", "content": "\u0645\u062d\u0642\u0642\u0627\u0646 Trend Micro \u06af\u0632\u0627\u0631\u0634 \u062c\u062f\u06cc\u062f\u06cc \u0645\u0646\u062a\u0634\u0631 \u06a9\u0631\u062f\u0647\u200c\u0627\u0646\u062f \u06a9\u0647 \u0628\u0647 \u0627\u0641\u0632\u0627\u06cc\u0634 \u0641\u0639\u0627\u0644\u06cc\u062a APT34 (\u0645\u0639\u0631\u0648\u0641 \u0628\u0647 OilRig) \u0645\u0631\u062a\u0628\u0637 \u0628\u0627 \u0631\u0627\u0647\u200c\u0627\u0646\u062f\u0627\u0632\u06cc \u06a9\u0645\u067e\u06cc\u0646\u200c\u0647\u0627\u06cc \u062c\u062f\u06cc\u062f \u0628\u0627 \u0647\u062f\u0641 \u0633\u0627\u0632\u0645\u0627\u0646\u200c\u0647\u0627\u06cc \u062f\u0648\u0644\u062a\u06cc \u0648 \u062a\u0623\u0633\u06cc\u0633\u0627\u062a CII \u062f\u0631 \u0627\u0645\u0627\u0631\u0627\u062a \u0645\u062a\u062d\u062f\u0647 \u0639\u0631\u0628\u06cc \u0648 \u0645\u0646\u0637\u0642\u0647 \u062e\u0644\u06cc\u062c \u0641\u0627\u0631\u0633 \u0627\u0634\u0627\u0631\u0647 \u06a9\u0631\u062f\u0647\u200c\u0627\u0646\u062f.\n\n\u062f\u0631 \u062d\u0645\u0644\u0627\u062a \u0645\u0634\u0627\u0647\u062f\u0647 \u0634\u062f\u0647\u060c OilRig \u0627\u0632 \u06cc\u06a9 \u062f\u0631\u0628 \u067e\u0634\u062a\u06cc \u062c\u062f\u06cc\u062f \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u06a9\u0631\u062f \u06a9\u0647 \u0633\u0631\u0648\u0631\u0647\u0627\u06cc Microsoft Exchange \u0631\u0627 \u0628\u0631\u0627\u06cc \u0633\u0631\u0642\u062a \u0627\u0639\u062a\u0628\u0627\u0631\u0646\u0627\u0645\u0647 \u0647\u0627 \u0647\u062f\u0641 \u0642\u0631\u0627\u0631 \u0645\u06cc \u062f\u0627\u062f \u0648 \u0647\u0645\u0686\u0646\u06cc\u0646 \u0627\u0632 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc CVE-2024-30088 \u0628\u0631\u0627\u06cc \u0627\u0641\u0632\u0627\u06cc\u0634 \u0627\u0645\u062a\u06cc\u0627\u0632\u0627\u062a \u062e\u0648\u062f \u062f\u0631 \u062f\u0633\u062a\u06af\u0627\u0647 \u0647\u0627\u06cc \u062f\u0631 \u0645\u0639\u0631\u0636 \u062e\u0637\u0631 \u0633\u0648\u0621 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u06a9\u0631\u062f.\n\nTrend Micro \u0639\u0644\u0627\u0648\u0647 \u0628\u0631 \u062a\u062c\u0632\u06cc\u0647 \u0648 \u062a\u062d\u0644\u06cc\u0644 \u0627\u06cc\u0646 \u0641\u0639\u0627\u0644\u06cc\u062a\u060c \u0627\u062a\u0635\u0627\u0644\u0627\u062a \u06cc\u0627 \u06af\u0632\u0627\u0631\u0634 \u062c\u062f\u06cc\u062f\u06cc \u0631\u0627 \u06a9\u0647 \u06cc\u06a9\u06cc \u062f\u06cc\u06af\u0631 \u0627\u0632 \u06af\u0631\u0648\u0647\u200c\u0647\u0627\u06cc APT \u0627\u06cc\u0631\u0627\u0646\u06cc \u062f\u0631\u06af\u06cc\u0631 \u062f\u0631 \u062d\u0645\u0644\u0627\u062a \u0628\u0627\u062c\u200c\u0627\u0641\u0632\u0627\u0631 \u0631\u0627 \u067e\u0631\u0686\u0645\u200c\u06af\u0630\u0627\u0631\u06cc \u0645\u06cc\u200c\u06a9\u0631\u062f\u060c \u0631\u062f\u06cc\u0627\u0628\u06cc \u06a9\u0631\u062f.\n\n\u062d\u0645\u0644\u0627\u062a\u06cc \u06a9\u0647 Trend Micro \u0645\u0634\u0627\u0647\u062f\u0647 \u06a9\u0631\u062f\u0647 \u0627\u0633\u062a \u0628\u0627 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u06cc\u06a9 \u0648\u0628 \u0633\u0631\u0648\u0631 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631 \u0628\u0631\u0627\u06cc \u0628\u0627\u0631\u06af\u0630\u0627\u0631\u06cc \u06cc\u06a9 \u067e\u0648\u0633\u062a\u0647 \u0648\u0628 \u0634\u0631\u0648\u0639 \u0645\u06cc \u0634\u0648\u062f \u0648 \u0628\u0647 \u0645\u0647\u0627\u062c\u0645\u0627\u0646 \u0627\u062c\u0627\u0632\u0647 \u0645\u06cc \u062f\u0647\u062f \u06a9\u062f\u0647\u0627\u06cc \u0631\u0627\u0647 \u062f\u0648\u0631 \u0648 \u062f\u0633\u062a\u0648\u0631\u0627\u062a PowerShell \u0631\u0627 \u0627\u062c\u0631\u0627 \u06a9\u0646\u0646\u062f.\n\n\u067e\u0633 \u0627\u0632 \u0641\u0639\u0627\u0644 \u0634\u062f\u0646\u060c OilRig \u0627\u0632 \u067e\u0648\u0633\u062a\u0647 \u0647\u0627\u06cc \u0648\u0628 \u0628\u0631\u0627\u06cc \u0627\u0633\u062a\u0642\u0631\u0627\u0631 \u0627\u0628\u0632\u0627\u0631\u0647\u0627\u06cc \u0627\u0636\u0627\u0641\u06cc\u060c \u0627\u0632 \u062c\u0645\u0644\u0647 \u0645\u0624\u0644\u0641\u0647 \u0627\u06cc \u06a9\u0647 \u0628\u0631\u0627\u06cc \u0633\u0648\u0621 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0648\u06cc\u0646\u062f\u0648\u0632 CVE-2024-30088 \u0637\u0631\u0627\u062d\u06cc \u0634\u062f\u0647 \u0627\u0633\u062a\u060c \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0645\u06cc \u06a9\u0646\u062f.\n\nCVE-2024-30088 \u06cc\u06a9 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc EoP \u0628\u0627 \u0634\u062f\u062a \u0628\u0627\u0644\u0627 \u0627\u0633\u062a \u06a9\u0647 \u062a\u0648\u0633\u0637 \u0645\u0627\u06cc\u06a9\u0631\u0648\u0633\u0627\u0641\u062a \u062f\u0631 \u0698\u0648\u0626\u0646 2024 \u0648\u0635\u0644\u0647 \u0634\u062f.\n\n\u0627\u06cc\u0646 \u0628\u0647 \u0645\u0647\u0627\u062c\u0645\u0627\u0646 \u0627\u062c\u0627\u0632\u0647 \u0645\u06cc \u062f\u0647\u062f \u062a\u0627 \u0627\u0645\u062a\u06cc\u0627\u0632\u0627\u062a SYSTEM \u0631\u0627 \u0627\u0641\u0632\u0627\u06cc\u0634 \u062f\u0647\u0646\u062f \u0648 \u0628\u0647 \u0622\u0646\u0647\u0627 \u06a9\u0646\u062a\u0631\u0644 \u0642\u0627\u0628\u0644 \u062a\u0648\u062c\u0647\u06cc \u0628\u0631 \u0631\u0648\u06cc \u062f\u0633\u062a\u06af\u0627\u0647 \u0647\u0627\u06cc \u062f\u0631 \u0645\u0639\u0631\u0636 \u062e\u0637\u0631 \u0628\u062f\u0647\u062f.\n\n\u0645\u0627\u06cc\u06a9\u0631\u0648\u0633\u0627\u0641\u062a \u0648\u062c\u0648\u062f \u06cc\u06a9 PoC \u0628\u0631\u0627\u06cc CVE-2024-30088 \u0631\u0627 \u062a\u0623\u06cc\u06cc\u062f \u06a9\u0631\u062f\u0647 \u0627\u0633\u062a\u060c \u0627\u0645\u0627 \u0647\u0646\u0648\u0632 \u0622\u0646 \u0631\u0627 \u0628\u0647\u200c\u0639\u0646\u0648\u0627\u0646 \u0645\u0648\u0631\u062f \u0628\u0647\u0631\u0647\u200c\u0628\u0631\u062f\u0627\u0631\u06cc \u0641\u0639\u0627\u0644 \u0639\u0644\u0627\u0645\u062a\u200c\u06af\u0630\u0627\u0631\u06cc \u0646\u06a9\u0631\u062f\u0647 \u0627\u0633\u062a. CISA \u0647\u0645\u0686\u0646\u06cc\u0646 \u062f\u0631 \u06a9\u0627\u062a\u0627\u0644\u0648\u06af \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0647\u0627\u06cc \u0642\u0627\u0628\u0644 \u0628\u0647\u0631\u0647 \u0628\u0631\u062f\u0627\u0631\u06cc \u0634\u0646\u0627\u062e\u062a\u0647 \u0634\u062f\u0647 \u062e\u0648\u062f \u0628\u0647 \u0622\u0646 \u0627\u0634\u0627\u0631\u0647 \u0627\u06cc \u0646\u0645\u06cc \u06a9\u0646\u062f.\n\n\u062f\u0631 \u0645\u0631\u062d\u0644\u0647 \u0628\u0639\u062f\u060c OilRig \u06cc\u06a9 DLL \u0641\u06cc\u0644\u062a\u0631 \u0631\u0645\u0632 \u0639\u0628\u0648\u0631 \u0631\u0627 \u062b\u0628\u062a \u0645\u06cc \u06a9\u0646\u062f \u062a\u0627 \u0627\u0639\u062a\u0628\u0627\u0631 \u0645\u062a\u0646 \u0648\u0627\u0636\u062d \u0631\u0627 \u062f\u0631 \u0637\u0648\u0644 \u062a\u063a\u06cc\u06cc\u0631 \u0631\u0645\u0632 \u0639\u0628\u0648\u0631 \u0631\u0647\u06af\u06cc\u0631\u06cc \u06a9\u0646\u062f\u060c \u0648 \u0633\u067e\u0633 \u0627\u0628\u0632\u0627\u0631 \u0645\u062f\u06cc\u0631\u06cc\u062a \u0627\u0632 \u0631\u0627\u0647 \u062f\u0648\u0631 ngrok \u0631\u0627 \u0628\u0631\u0627\u06cc \u0627\u0631\u062a\u0628\u0627\u0637 \u0645\u062e\u0641\u06cc \u0627\u0632 \u0637\u0631\u06cc\u0642 \u062a\u0648\u0646\u0644 \u0647\u0627\u06cc \u0627\u0645\u0646 \u062f\u0627\u0646\u0644\u0648\u062f \u0648 \u0646\u0635\u0628 \u0645\u06cc \u06a9\u0646\u062f.\n\n\u06cc\u06a9\u06cc \u062f\u06cc\u06af\u0631 \u0627\u0632 \u062a\u0627\u06a9\u062a\u06cc\u06a9\u200c\u0647\u0627\u06cc \u0645\u0647\u0627\u062c\u0645 \u062c\u062f\u06cc\u062f \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0633\u0631\u0648\u0631\u0647\u0627\u06cc \u0645\u0627\u06cc\u06a9\u0631\u0648\u0633\u0627\u0641\u062a \u0627\u06a9\u0633\u0686\u0646\u062c \u0628\u0631\u0627\u06cc \u0633\u0631\u0642\u062a \u0627\u0639\u062a\u0628\u0627\u0631 \u0648 \u0627\u0633\u062a\u062e\u0631\u0627\u062c \u062f\u0627\u062f\u0647\u200c\u0647\u0627\u06cc \u062d\u0633\u0627\u0633 \u0627\u0632 \u0637\u0631\u06cc\u0642 \u062a\u0631\u0627\u0641\u06cc\u06a9 \u0627\u06cc\u0645\u06cc\u0644 \u0642\u0627\u0646\u0648\u0646\u06cc \u0627\u0633\u062a \u06a9\u0647 \u062a\u0634\u062e\u06cc\u0635 \u0622\u0646 \u062f\u0634\u0648\u0627\u0631 \u0627\u0633\u062a.\n\n\u0627\u0633\u062a\u062e\u0631\u0627\u062c \u0628\u0627 \u062f\u0631\u0628 \u067e\u0634\u062a\u06cc \u062c\u062f\u06cc\u062f\u06cc \u0628\u0647 \u0646\u0627\u0645 StealHook \u0622\u0633\u0627\u0646 \u062a\u0631 \u0645\u06cc \u0634\u0648\u062f. \n\n\u0628\u0627 \u0627\u06cc\u0646 \u062d\u0627\u0644\u060c Trend Micro \u0645\u0639\u062a\u0642\u062f \u0627\u0633\u062a \u06a9\u0647 \u0632\u06cc\u0631\u0633\u0627\u062e\u062a \u0647\u0627\u06cc \u062f\u0648\u0644\u062a\u06cc \u0627\u063a\u0644\u0628 \u0628\u0647 \u0639\u0646\u0648\u0627\u0646 \u06cc\u06a9 \u0646\u0642\u0637\u0647 \u0645\u0631\u062c\u0639 \u0628\u0631\u0627\u06cc \u0642\u0627\u0646\u0648\u0646\u06cc \u062c\u0644\u0648\u0647 \u062f\u0627\u062f\u0646 \u0631\u0648\u0646\u062f \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0645\u06cc \u0634\u0648\u062f.\n\n\u0647\u062f\u0641 \u0627\u0635\u0644\u06cc \u0627\u06cc\u0646 \u0645\u0631\u062d\u0644\u0647 \u0631\u0647\u06af\u06cc\u0631\u06cc \u0631\u0645\u0632\u0647\u0627\u06cc \u0639\u0628\u0648\u0631 \u0633\u0631\u0642\u062a \u0634\u062f\u0647 \u0648 \u0627\u0646\u062a\u0642\u0627\u0644 \u0622\u0646\u0647\u0627 \u0628\u0647 \u0645\u0647\u0627\u062c\u0645\u0627\u0646 \u062f\u0631 \u0642\u0627\u0644\u0628 \u067e\u06cc\u0648\u0633\u062a \u0627\u06cc\u0645\u06cc\u0644 \u0627\u0633\u062a.\n\n\u0639\u0644\u0627\u0648\u0647 \u0628\u0631 \u0627\u06cc\u0646\u060c \u0645\u0647\u0627\u062c\u0645\u0627\u0646 \u0627\u0632 \u0627\u0639\u062a\u0628\u0627\u0631\u0646\u0627\u0645\u0647 \u0647\u0627 \u0628\u0631\u0627\u06cc \u0627\u0631\u0633\u0627\u0644 \u0627\u06cc\u0646 \u0627\u06cc\u0645\u06cc\u0644 \u0647\u0627 \u0627\u0632 \u0637\u0631\u06cc\u0642 \u0633\u0631\u0648\u0631\u0647\u0627\u06cc \u062f\u0648\u0644\u062a\u06cc Exchange \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0645\u06cc \u06a9\u0646\u0646\u062f.\n\n\u0628\u0627 \u0628\u0627\u0632\u06af\u0634\u062a \u0628\u0647 \u062a\u0635\u0627\u062f\u0641\u0627\u062a\u060c TrendMicro \u0647\u0645\u0686\u0646\u06cc\u0646 \u0645\u0639\u062a\u0642\u062f \u0627\u0633\u062a \u06a9\u0647 \u0634\u0628\u0627\u0647\u062a\u200c\u0647\u0627\u06cc\u06cc \u0628\u06cc\u0646 \u06a9\u062f StealHook \u0648 \u062f\u0631\u0647\u0627\u06cc \u067e\u0634\u062a\u06cc OilRig \u06a9\u0647 \u062f\u0631 \u06a9\u0645\u067e\u06cc\u0646\u200c\u0647\u0627\u06cc \u06af\u0630\u0634\u062a\u0647 \u0627\u0632 \u062c\u0645\u0644\u0647 Karkoff \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0645\u06cc\u200c\u0634\u062f\u0646\u062f\u060c \u0648\u062c\u0648\u062f \u062f\u0627\u0631\u062f\u060c \u0628\u0646\u0627\u0628\u0631\u0627\u06cc\u0646 \u0628\u0647 \u0646\u0638\u0631 \u0645\u06cc\u200c\u0631\u0633\u062f \u0622\u062e\u0631\u06cc\u0646 \u0628\u062f\u0627\u0641\u0632\u0627\u0631\u06cc \u06a9\u0647 \u062f\u06cc\u062f\u0647 \u0634\u062f\u0647\u060c \u0628\u0647\u200c\u0631\u0648\u0632\u0631\u0633\u0627\u0646\u06cc \u0628\u062f\u0627\u0641\u0632\u0627\u0631\u0647\u0627\u06cc \u0642\u0628\u0644\u06cc \u0628\u0627\u0634\u062f \u062a\u0627 \u06cc\u06a9 \u062a\u0648\u0633\u0639\u0647 \u062c\u062f\u06cc\u062f.\n\n\u0639\u0644\u0627\u0648\u0647 \u0628\u0631 \u0627\u06cc\u0646\u060c \u0627\u06cc\u0646 \u0627\u0648\u0644\u06cc\u0646 \u0628\u0627\u0631 \u0646\u06cc\u0633\u062a \u06a9\u0647 OilRig \u0627\u0632 \u0633\u0631\u0648\u0631\u0647\u0627\u06cc Microsoft Exchange \u0628\u0647 \u0639\u0646\u0648\u0627\u0646 \u06cc\u06a9 \u062c\u0632\u0621 \u0641\u0639\u0627\u0644 \u062f\u0631 \u062d\u0645\u0644\u0627\u062a \u062e\u0648\u062f \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0645\u06cc \u06a9\u0646\u062f.\n\n\u062a\u0642\u0631\u06cc\u0628\u0627\u064b \u06cc\u06a9 \u0633\u0627\u0644 \u067e\u06cc\u0634\u060c\u00a0Symantec \u0642\u0628\u0644\u0627\u064b \u0645\u0634\u0627\u0647\u062f\u0647 \u06a9\u0631\u062f\u0647 \u0628\u0648\u062f \u06a9\u0647 APT34 \u06cc\u06a9 \u062f\u0631\u067e\u0634\u062a\u06cc PowerExchange \u0631\u0627 \u0631\u0648\u06cc \u0633\u0631\u0648\u0631\u0647\u0627\u06cc Exchange \u062f\u0631\u0648\u0646 \u0645\u062d\u0644 \u0646\u0635\u0628 \u0645\u06cc\u200c\u06a9\u0646\u062f \u06a9\u0647 \u0642\u0627\u062f\u0631 \u0628\u0647 \u062f\u0631\u06cc\u0627\u0641\u062a \u0648 \u0627\u062c\u0631\u0627\u06cc \u062f\u0633\u062a\u0648\u0631\u0627\u062a \u0627\u0632 \u0637\u0631\u06cc\u0642 \u0627\u06cc\u0645\u06cc\u0644 \u0647\u0633\u062a\u0646\u062f.\n\n\u0628\u0627 \u0627\u06cc\u0646 \u062d\u0627\u0644\u060c \u0627\u06cc\u0646 \u06af\u0631\u0648\u0647 \u0647\u0646\u0648\u0632 \u062f\u0631 \u0645\u0646\u0637\u0642\u0647 \u062e\u0627\u0648\u0631\u0645\u06cc\u0627\u0646\u0647 \u0641\u0639\u0627\u0644 \u0627\u0633\u062a \u0648 \u0627\u0631\u062a\u0628\u0627\u0637 \u0622\u0646 \u0628\u0627 FOX Kitten\u060c \u0627\u06af\u0631\u0686\u0647 \u062f\u0631 \u062d\u0627\u0644 \u062d\u0627\u0636\u0631 \u06a9\u0627\u0645\u0644\u0627\u064b \u0645\u0634\u062e\u0635 \u0646\u06cc\u0633\u062a\u060c \u0645\u06cc \u062a\u0648\u0627\u0646\u062f \u062f\u0631 \u0622\u06cc\u0646\u062f\u0647 \u0628\u0647 \u0627\u0636\u0627\u0641\u0647 \u0634\u062f\u0646 \u0628\u0627\u062c \u0627\u0641\u0632\u0627\u0631 \u0628\u0647 \u0632\u0631\u0627\u062f\u062e\u0627\u0646\u0647 \u0622\u0646 \u06a9\u0645\u06a9 \u06a9\u0646\u062f.\n\ud83c\udfaf \u062f\u0631 \u062c\u0631\u06cc\u0627\u0646 \u0646\u0628\u0636 \u0627\u0645\u0646\u06cc\u062a \u0633\u0627\u06cc\u0628\u0631\u06cc \u0635\u0646\u0639\u062a\u06cc \u0628\u0627\u0634\u06cc\u062f:\n\n\ud83c\udfed\u0648\u0628\u0633\u0627\u06cc\u062a \u0648 \u06a9\u0627\u0646\u0627\u0644 \u062a\u062e\u0635\u0635\u06cc \u0627\u0645\u0646\u06cc\u062a \u0632\u06cc\u0631\u0633\u0627\u062e\u062a\u0647\u0627\u06cc \u0627\u062a\u0648\u0645\u0627\u0633\u06cc\u0648\u0646 \u0648 \u06a9\u0646\u062a\u0631\u0644 \u0635\u0646\u0639\u062a\u06cc\n\ud83d\udc6e\ud83c\udffd\u200d\u2640\ufe0f\u0647\u0631\u06af\u0648\u0646\u0647 \u0627\u0646\u062a\u0634\u0627\u0631 \u0648 \u0630\u06a9\u0631 \u0645\u0637\u0627\u0644\u0628 \u0628\u062f\u0648\u0646 \u0630\u06a9\u0631 \u062f\u0642\u06cc\u0642 \u0645\u0646\u0628\u0639 \u0648 \u0622\u062f\u0631\u0633 \u0644\u06cc\u0646\u06a9 \u0622\u0646 \u0645\u0645\u0646\u0648\u0639 \u0627\u0633\u062a. \n\u0627\u062f\u0645\u06cc\u0646:\n\u200fhttps://t.me/pedram_kiani\n\u06a9\u0627\u0646\u0627\u0644 \u062a\u0644\u06af\u0631\u0627\u0645:\nhttps://t.me/ics_cert\n\u06af\u0631\u0648\u0647 \u0648\u0627\u062a\u0633 \u0622\u067e :\nhttps://chat.whatsapp.com/FpB620AWEeSKvd8U6cFh33", "creation_timestamp": "2024-10-24T14:54:54.000000Z"}, {"uuid": "3d44fc95-3714-4ae4-8b16-051f4ae12042", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30088", "type": "seen", "source": "https://t.me/CyberBulletin/1830", "content": "\u26a1\ufe0fCVE-2024-30088 Under Attack: OilRig Targets Windows Kernel Vulnerability.\n\n#CyberBulletin", "creation_timestamp": "2024-12-26T04:50:40.000000Z"}, {"uuid": "9bcf670e-e89d-468e-8ee0-e223d1bb477d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30088", "type": "published-proof-of-concept", "source": "https://t.me/Kelvinseccommunity/529", "content": "#exploit\n1. CVE-2024-22729:\nNetis MW5360 RCE\nhttps://packetstormsecurity.com/files/179200/Netis-MW5360-Remote-Command-Execution.html\n\n2. CVE-2024-30088:\nWindows Kernel\u00a0EoP\nhttps://github.com/tykawaii98/CVE-2024-30088", "creation_timestamp": "2024-06-26T09:50:07.000000Z"}, {"uuid": "4bc6e48e-24ab-4f68-916d-3dcd0cb2fb2a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30088", "type": "published-proof-of-concept", "source": "https://t.me/HackingInsights/3755", "content": "\u200aPoC Exploit Published for Windows Kernel Elevation of Privilege Vulnerability (CVE-2024-30088)\n\nhttps://securityonline.info/poc-exploit-published-for-windows-kernel-elevation-of-privilege-vulnerability-cve-2024-30088/", "creation_timestamp": "2024-06-27T04:28:28.000000Z"}, {"uuid": "ab726bed-fda1-495a-bafb-8d1c55115a27", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30088", "type": "exploited", "source": "https://t.me/ViralCyber/9512", "content": "\ud83d\udd34 \u0633\u0648\u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0647\u06a9\u0631\u200c\u0647\u0627\u06cc \u0627\u06cc\u0631\u0627\u0646\u06cc OilRig \u0627\u0632 \u0631\u0648\u0632 \u0635\u0641\u0631 \u06a9\u0631\u0646\u0644 \u0648\u06cc\u0646\u062f\u0648\u0632 \u0628\u0631\u0627\u06cc \u062d\u0645\u0644\u0647 \u0628\u0647 \u0633\u0627\u0632\u0645\u0627\u0646\u200c\u0647\u0627\n\n\u06af\u0631\u0648\u0647 \u0647\u06a9\u0631 \u0645\u0644\u06cc-\u062f\u0648\u0644\u062a\u06cc \u0627\u06cc\u0631\u0627\u0646\u06cc OilRig \u06a9\u0647 \u0628\u0627 \u0646\u0627\u0645 APT34 \u0646\u06cc\u0632 \u0634\u0646\u0627\u062e\u062a\u0647 \u0645\u06cc\u200c\u0634\u0648\u062f\u060c \u0641\u0639\u0627\u0644\u06cc\u062a\u200c\u0647\u0627\u06cc \u062c\u0627\u0633\u0648\u0633\u06cc \u0633\u0627\u06cc\u0628\u0631\u06cc \u062e\u0648\u062f \u0631\u0627 \u062a\u0634\u062f\u06cc\u062f \u06a9\u0631\u062f\u0647 \u0648 \u0632\u06cc\u0631\u0633\u0627\u062e\u062a\u200c\u0647\u0627\u06cc \u062d\u06cc\u0627\u062a\u06cc \u0648 \u0646\u0647\u0627\u062f\u0647\u0627\u06cc \u062f\u0648\u0644\u062a\u06cc \u0627\u0645\u0627\u0631\u0627\u062a \u0645\u062a\u062d\u062f\u0647 \u0639\u0631\u0628\u06cc \u0648 \u0645\u0646\u0637\u0642\u0647 \u0648\u0633\u06cc\u0639\u06cc \u0627\u0632 \u062e\u0644\u06cc\u062c\u200c\u0641\u0627\u0631\u0633 \u0647\u062f\u0641 \u0642\u0631\u0627\u0631 \u062f\u0627\u062f\u0647 \u0627\u0633\u062a.\n\n\u0645\u062d\u0642\u0642\u0627\u0646 Picus Labs \u06cc\u06a9 \u06a9\u0645\u067e\u06cc\u0646 \u067e\u06cc\u0686\u06cc\u062f\u0647 \u062c\u062f\u06cc\u062f \u0631\u0627 \u06a9\u0634\u0641 \u06a9\u0631\u062f\u0647 \u0648 \u0627\u062f\u0639\u0627 \u0646\u0645\u0648\u062f\u0646\u062f \u06a9\u0647 \u0627\u0632 \u06cc\u06a9 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0646\u0627\u0634\u0646\u0627\u062e\u062a\u0647 \u0648\u06cc\u0646\u062f\u0648\u0632 \u06a9\u0631\u0646\u0644 \u0628\u0631\u0627\u06cc \u0627\u0641\u0632\u0627\u06cc\u0634 \u0627\u062e\u062a\u06cc\u0627\u0631\u0627\u062a \u0648 \u0627\u0633\u062a\u0642\u0631\u0627\u0631 \u0628\u062f\u0627\u0641\u0632\u0627\u0631\u200c\u0647\u0627\u06cc \u067e\u06cc\u0634\u0631\u0641\u062a\u0647 \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0645\u06cc\u200c\u06a9\u0646\u062f.\n\n\u0627\u0633\u0627\u0633 \u0622\u062e\u0631\u06cc\u0646 \u062d\u0645\u0644\u0647 OilRig\u060c \u0628\u0647\u0631\u0647\u200c\u0628\u0631\u062f\u0627\u0631\u06cc \u0627\u0632 CVE-2024-30088\u060c \u06a9\u0647 \u06cc\u06a9 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0627\u0641\u0632\u0627\u06cc\u0634 \u0627\u062e\u062a\u06cc\u0627\u0631 \u0628\u0627 \u0634\u062f\u062a \u0628\u0627\u0644\u0627 \u0645\u06cc\u200c\u0628\u0627\u0634\u062f \u0627\u0633\u062a \u06a9\u0647 \u0628\u0631 \u0647\u0633\u062a\u0647 \u0648\u06cc\u0646\u062f\u0648\u0632 \u062a\u0627\u062b\u06cc\u0631 \u0645\u06cc\u200c\u06af\u0630\u0627\u0631\u062f. \u0627\u06cc\u0646 \u0646\u0642\u0635 \u0628\u0647 \u0645\u0647\u0627\u062c\u0645\u0627\u0646 \u0627\u062c\u0627\u0632\u0647 \u0645\u06cc\u200c\u062f\u0647\u062f \u062a\u0627 \u0627\u062e\u062a\u06cc\u0627\u0631\u0627\u062a \u062e\u0648\u062f \u0631\u0627 \u0628\u0647 \u0633\u0637\u062d SYSTEM \u0628\u0631\u0633\u0627\u0646\u0646\u062f \u0648 \u0628\u0647 \u0622\u0646\u0647\u0627 \u06a9\u0646\u062a\u0631\u0644 \u06af\u0633\u062a\u0631\u062f\u0647\u200c\u0627\u06cc \u0628\u0631 \u0631\u0648\u06cc \u062f\u0633\u062a\u06af\u0627\u0647\u200c\u0647\u0627\u06cc \u062f\u0631 \u0645\u0639\u0631\u0636 \u062e\u0637\u0631 \u0645\u06cc\u200c\u062f\u0647\u0646\u062f.\n\u200c \n\u0638\u0627\u0647\u0631\u0627 OilRig \u0628\u0647 \u0637\u0648\u0631 \u0641\u0639\u0627\u0644 \u0627\u0632 \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u062f\u0631 \u0639\u0631\u0635\u0647 \u0633\u0627\u06cc\u0628\u0631\u06cc \u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0645\u06cc\u200c\u06a9\u0646\u062f.\n\n#Cybersecurity #Cyber_Attack #OilRig #Iran #Zero_Day #Kernel #Windows #Backdoor #STEALHOOK #Ngrok #APT34 #\u0627\u0645\u0646\u06cc\u062a_\u0633\u0627\u06cc\u0628\u0631\u06cc #\u062d\u0645\u0644\u0647_\u0633\u0627\u06cc\u0628\u0631\u06cc #\u0627\u06cc\u0631\u0627\u0646 #\u0631\u0648\u0632_\u0635\u0641\u0631 #\u06a9\u0631\u0646\u0644 #\u0648\u06cc\u0646\u062f\u0648\u0632\n\n\u0645\u0637\u0627\u0644\u0639\u0647 \u06a9\u0627\u0645\u0644 \u062e\u0628\u0631 \ud83d\udc49\n\n\ud83c\udd94 @Takianco\n\ud83c\uddee\ud83c\uddf7", "creation_timestamp": "2024-12-27T10:57:03.000000Z"}, {"uuid": "2955b659-9385-49ac-977a-e4a025326201", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30088", "type": "exploited", "source": "https://t.me/ViralCyber/6971", "content": "\ud83d\udd34 \u0633\u0648\u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0627\u0632 \u0646\u0642\u0635 \u0647\u0633\u062a\u0647 \u0648\u06cc\u0646\u062f\u0648\u0632 \u062f\u0631 \u06a9\u0645\u067e\u06cc\u0646 \u062c\u062f\u06cc\u062f \u062c\u0627\u0633\u0648\u0633\u06cc \u06af\u0631\u0648\u0647 \u0627\u06cc\u0631\u0627\u0646\u06cc OilRig\n\n\u06af\u0631\u0648\u0647 \u0647\u06a9\u0631\u06cc \u062a\u062d\u062a \u062d\u0645\u0627\u06cc\u062a \u062f\u0648\u0644\u062a \u062c\u0645\u0647\u0648\u0631\u06cc \u0627\u0633\u0644\u0627\u0645\u06cc \u0627\u06cc\u0631\u0627\u0646\u060c APT34\u060c \u0628\u0627 \u0646\u0627\u0645 \u0645\u0633\u062a\u0639\u0627\u0631 OilRig\u060c \u0627\u062e\u06cc\u0631\u0627 \u0641\u0639\u0627\u0644\u06cc\u062a\u200c\u0647\u0627\u06cc \u062e\u0648\u062f \u0631\u0627 \u0628\u0627 \u062d\u0645\u0644\u0647 \u0628\u0647 \u062f\u0648\u0644\u062a \u0648 \u0646\u0647\u0627\u062f\u0647\u0627\u06cc \u0632\u06cc\u0631\u0633\u0627\u062e\u062a\u06cc \u062d\u06cc\u0627\u062a\u06cc \u062f\u0631 \u0627\u0645\u0627\u0631\u0627\u062a \u0645\u062a\u062d\u062f\u0647 \u0639\u0631\u0628\u06cc \u0648 \u0645\u0646\u0637\u0642\u0647 \u062e\u0644\u06cc\u062c\u200c\u0641\u0627\u0631\u0633\u060c \u0627\u0641\u0632\u0627\u06cc\u0634 \u062f\u0627\u062f\u0647 \u0627\u0633\u062a.\n\n\u0637\u0628\u0642 \u0627\u062f\u0639\u0627\u06cc \u0645\u062d\u0642\u0642\u0627\u0646 Trend Micro\u060c \u06af\u0631\u0648\u0647 OilRig \u06cc\u06a9 backdoor \u062c\u062f\u06cc\u062f \u0631\u0627 \u0628\u0647\u200c\u06a9\u0627\u0631 \u06af\u0631\u0641\u062a\u0647 \u0648 \u0633\u0631\u0648\u0631\u0647\u0627\u06cc Microsoft Exchange \u0631\u0627 \u0628\u0631\u0627\u06cc \u0633\u0631\u0642\u062a \u0627\u0637\u0644\u0627\u0639\u0627\u062a \u062d\u0633\u0627\u0633 \u06a9\u0627\u0631\u0628\u0631\u06cc \u0647\u062f\u0641 \u0642\u0631\u0627\u0631 \u062f\u0627\u062f\u0647 \u0627\u0633\u062a \u0648 \u0647\u0645\u0686\u0646\u06cc\u0646 \u0627\u0632 \u0646\u0642\u0635 \u0648\u06cc\u0646\u062f\u0648\u0632 CVE-2024-30088 \u0628\u0631\u0627\u06cc \u0627\u0641\u0632\u0627\u06cc\u0634 \u0627\u062e\u062a\u06cc\u0627\u0631\u0627\u062a \u062f\u0631 \u062f\u0633\u062a\u06af\u0627\u0647\u200c\u0647\u0627\u06cc \u062f\u0631 \u0645\u0639\u0631\u0636 \u062e\u0637\u0631 \u0633\u0648\u0627\u0633\u062a\u0641\u0627\u062f\u0647 \u0646\u0645\u0648\u062f\u0646\u062f.\n\n\u0627\u06cc\u0646 \u0634\u0631\u06a9\u062a \u0647\u0645\u0686\u0646\u06cc\u0646 \u0628\u06cc\u0646 OilRig \u0648 FOX Kitten (\u062f\u06cc\u06af\u0631 \u06af\u0631\u0648\u0647 APT \u0627\u06cc\u0631\u0627\u0646\u06cc) \u0627\u0633\u062a \u06a9\u0647 \u062f\u0631 \u062d\u0645\u0644\u0627\u062a \u0628\u0627\u062c\u200c\u0627\u0641\u0632\u0627\u0631 \u0645\u0634\u0627\u0631\u06a9\u062a \u062f\u0627\u0631\u062f\u060c \u0637\u0628\u0642 \u0627\u062f\u0639\u0627\u0647\u0627\u06cc \u062e\u0648\u062f\u060c \u0627\u0631\u062a\u0628\u0627\u0637\u0627\u062a\u06cc \u0631\u0627 \u06a9\u0634\u0641 \u06a9\u0631\u062f\u0647 \u0627\u0633\u062a.\n\n\u0627\u06cc\u0646 \u062d\u0645\u0644\u0627\u062a \u0628\u0627 \u0628\u0647\u0631\u0647\u200c\u0628\u0631\u062f\u0627\u0631\u06cc \u0627\u0632 \u06cc\u06a9 \u0648\u0628 \u0633\u0631\u0648\u0631 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631 \u0628\u0631\u0627\u06cc \u0622\u067e\u0644\u0648\u062f \u06cc\u06a9 web shell \u0622\u063a\u0627\u0632 \u0645\u06cc\u200c\u0634\u0648\u062f \u0648 \u0628\u0647 \u0645\u0647\u0627\u062c\u0645\u0627\u0646 \u062a\u0648\u0627\u0646\u0627\u06cc\u06cc \u0627\u062c\u0631\u0627\u06cc \u06a9\u062f\u0647\u0627\u06cc \u0631\u0627\u0647 \u062f\u0648\u0631 \u0648 \u062f\u0633\u062a\u0648\u0631\u0627\u062a PowerShell \u0631\u0627 \u0645\u06cc\u200c\u062f\u0647\u062f.\n\n#Cybersecurity #Cyber_Attack #OilRig #Iran #Fox_Kitten #backdoor #ngrok #StealHook #APT34 #Malware #\u0627\u0645\u0646\u06cc\u062a_\u0633\u0627\u06cc\u0628\u0631\u06cc #\u062d\u0645\u0644\u0647_\u0633\u0627\u06cc\u0628\u0631\u06cc #\u0627\u06cc\u0631\u0627\u0646 #\u0628\u062f\u0627\u0641\u0632\u0627\u0631 #\u0627\u0648\u06cc\u0644_\u0631\u06cc\u06af\n\n\u0645\u0637\u0627\u0644\u0639\u0647 \u06a9\u0627\u0645\u0644 \u062e\u0628\u0631 \ud83d\udc49\n\n\ud83c\udd94 @Takianco\n\ud83c\uddee\ud83c\uddf7", "creation_timestamp": "2024-10-14T22:54:28.000000Z"}, {"uuid": "00f20ad1-2e83-4f0b-9ca4-cb0a631e555a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30088", "type": "seen", "source": "Telegram/lxqobsrtlBJz5tJVA4wabo2DqNgKZlX-32pZLeF2unzyk5A", "content": "", "creation_timestamp": "2024-08-06T23:48:46.000000Z"}, {"uuid": "0794f65a-4f93-4858-8e74-4001749621e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30088", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/686", "content": "Tools - Hackers Factory \n\nTools from the DEFCON 32 talk \"SHIM me what you got - Manipulating Shim and Office for Code Injection\"\n\nhttps://github.com/deepinstinct/ShimMe\n\nGitHub - exploits-forsale/collateral-damage: Kernel exploit for Xbox SystemOS using CVE-2024-30088\n\nhttps://github.com/exploits-forsale/collateral-damage\n\nAPKscan: Scan for secrets, endpoints, API keys, tokens, credentials in Android apps\n\nhttps://github.com/LucasFaudman/apkscan\n\n3 ways to get Remote Code Execution in Kafka UI\n\nhttps://github.blog/2024-07-22-3-ways-to-get-remote-code-execution-in-kafka-ui/\n\nGitHub - mqst/gouge: Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burp Suite\n\nhttps://github.com/mqst/gouge\n\nGitHub - two06/CerealKiller: .NET deserialization hunter\n\nhttps://github.com/two06/CerealKiller\n\nGitHub - securelayer7/CVE-2024-38856_Scanner: Apache OFBiz RCE Scanner &amp; Exploit (CVE-2024-38856)\n\nhttps://github.com/securelayer7/CVE-2024-38856_Scanner\n\nA technique to unbind and rebind 445/tcp on Windows without loading a driver, loading a module into LSASS, or rebooting the target machine. Implemented to ease the burden of SMB-based NTLM relays while operating over C2. Technical analysis of the technique is dicussed in more detail during the Relay Your Heart Away: An OPSEC Concious Approach to 445 Takeover presentation at x33fcon.\n\nhttps://github.com/zyn3rgy/smbtakeover\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-08-16T02:26:24.000000Z"}, {"uuid": "f82e2b0b-c191-4d39-9dc5-530cdd53687d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30088", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/759", "content": "Tools  - Hackers Factory \n\nTookie-osint has a simple-to-use UI and is really straightforward. The main idea of Tookie-osint is to discover usernames that are requested from an input.\n\nhttps://github.com/Alfredredbird/tookie-osint\n\n#CyberDilara\n\nGPU poisoning; hide the payload inside the gpu memory.\n\nhttps://github.com/H1d3r/GPU_ShellCode\n\nThis is a simple obfuscator for WireGuard. It is designed to make it harder to detect WireGuard traffic by making it look like something else.\n\nhttps://github.com/ClusterM/wg-obfuscator\n\nSploitScan is a powerful and user-friendly tool designed to streamline the process of identifying exploits for known vulnerabilities and their respective exploitation probability.\n\nhttps://github.com/xaitax/SploitScan\n\nA shellcode runner write in Rust use\n\nhttps://github.com/b1tg/rs-shellcode\n\nKernel exploit for Xbox SystemOS using CVE-2024-30088\n\nhttps://github.com/exploits-forsale/collateral-damage\n\nZip Slip Vulnerability in .a Static Library Files.  Since the implemented measure can be bypassed, the vulnerability allows an attacker to extract files to any desired location within the server running #MobSF.\n\nhttps://github.com/MobSF/Mobile-Security-Framework-MobSF/security/advisories/GHSA-4hh3-vj32-gr6j\n\nPython script to monitor your target continuously for new subdomains.\n\nhttps://github.com/faiyazahmad07/monitor_subdomains\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-08-27T05:29:59.000000Z"}, {"uuid": "dd1b9252-5309-48a4-9d2f-66b89fc48266", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30088", "type": "published-proof-of-concept", "source": "https://t.me/CyberDilara/449", "content": "Tools - Hackers Factory \n\nGitHub - a13xp0p0v/kernel-hardening-checker: A tool for checking the security hardening options of the Linux kernel\n\nhttps://github.com/a13xp0p0v/kernel-hardening-checker\n\nELMERIKH/TelecordC2: Advanced Telegram x Discord C2, great for data Exfitration and Network evasion\n\nhttps://github.com/ELMERIKH/TelecordC2\n\nOSCP Example Cheat Sheet \n\ngithub.com/xsudoxx/OSCP\n\n(Old) List of Awesome Red Teaming Resources\n\nhttps://github.com/yeyintminthuhtut/Awesome-Red-Teaming\n\n(exploits-forsale)Collateral Damage :\u00a0 Kernel exploit for Xbox SystemOS using CVE-2024-30088\n\nhttps://github.com/exploits-forsale/collateral-damage\n\nAwesome-Red-Team-Operation\n\nhttps://github.com/CyberSecurityUP/Awesome-Red-Team-Operations\n\nWith NoConsolation you can now custom load all the dependencies from the PE you are going to execute, ensuring no image load events!\n\nhttps://github.com/fortra/No-Consolation\n\nAll-in-one OSINT tool for analysing any website\n\nhttps://github.com/Lissy93/web-check\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-07-22T04:20:16.000000Z"}, {"uuid": "f5fee7a2-30af-4fe1-83a6-1b8b60ddafec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30088", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/8613", "content": "Tools - Hackers Factory \n\nTools from the DEFCON 32 talk \"SHIM me what you got - Manipulating Shim and Office for Code Injection\"\n\nhttps://github.com/deepinstinct/ShimMe\n\nGitHub - exploits-forsale/collateral-damage: Kernel exploit for Xbox SystemOS using CVE-2024-30088\n\nhttps://github.com/exploits-forsale/collateral-damage\n\nAPKscan: Scan for secrets, endpoints, API keys, tokens, credentials in Android apps\n\nhttps://github.com/LucasFaudman/apkscan\n\n3 ways to get Remote Code Execution in Kafka UI\n\nhttps://github.blog/2024-07-22-3-ways-to-get-remote-code-execution-in-kafka-ui/\n\nGitHub - mqst/gouge: Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burp Suite\n\nhttps://github.com/mqst/gouge\n\nGitHub - two06/CerealKiller: .NET deserialization hunter\n\nhttps://github.com/two06/CerealKiller\n\nGitHub - securelayer7/CVE-2024-38856_Scanner: Apache OFBiz RCE Scanner &amp; Exploit (CVE-2024-38856)\n\nhttps://github.com/securelayer7/CVE-2024-38856_Scanner\n\nA technique to unbind and rebind 445/tcp on Windows without loading a driver, loading a module into LSASS, or rebooting the target machine. Implemented to ease the burden of SMB-based NTLM relays while operating over C2. Technical analysis of the technique is dicussed in more detail during the Relay Your Heart Away: An OPSEC Concious Approach to 445 Takeover presentation at x33fcon.\n\nhttps://github.com/zyn3rgy/smbtakeover\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-08-16T02:26:29.000000Z"}, {"uuid": "40868315-8315-4ce4-9b4d-d36684812da1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30088", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/8676", "content": "Tools  - Hackers Factory \n\nTookie-osint has a simple-to-use UI and is really straightforward. The main idea of Tookie-osint is to discover usernames that are requested from an input.\n\nhttps://github.com/Alfredredbird/tookie-osint\n\n#CyberDilara\n\nGPU poisoning; hide the payload inside the gpu memory.\n\nhttps://github.com/H1d3r/GPU_ShellCode\n\nThis is a simple obfuscator for WireGuard. It is designed to make it harder to detect WireGuard traffic by making it look like something else.\n\nhttps://github.com/ClusterM/wg-obfuscator\n\nSploitScan is a powerful and user-friendly tool designed to streamline the process of identifying exploits for known vulnerabilities and their respective exploitation probability.\n\nhttps://github.com/xaitax/SploitScan\n\nA shellcode runner write in Rust use\n\nhttps://github.com/b1tg/rs-shellcode\n\nKernel exploit for Xbox SystemOS using CVE-2024-30088\n\nhttps://github.com/exploits-forsale/collateral-damage\n\nZip Slip Vulnerability in .a Static Library Files.  Since the implemented measure can be bypassed, the vulnerability allows an attacker to extract files to any desired location within the server running #MobSF.\n\nhttps://github.com/MobSF/Mobile-Security-Framework-MobSF/security/advisories/GHSA-4hh3-vj32-gr6j\n\nPython script to monitor your target continuously for new subdomains.\n\nhttps://github.com/faiyazahmad07/monitor_subdomains\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-08-27T09:08:21.000000Z"}, {"uuid": "aef58e54-5bfc-4759-b6c6-c65e34039b03", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30088", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/8299", "content": "Tools - Hackers Factory \n\nGitHub - a13xp0p0v/kernel-hardening-checker: A tool for checking the security hardening options of the Linux kernel\n\nhttps://github.com/a13xp0p0v/kernel-hardening-checker\n\nELMERIKH/TelecordC2: Advanced Telegram x Discord C2, great for data Exfitration and Network evasion\n\nhttps://github.com/ELMERIKH/TelecordC2\n\nOSCP Example Cheat Sheet \n\ngithub.com/xsudoxx/OSCP\n\n(Old) List of Awesome Red Teaming Resources\n\nhttps://github.com/yeyintminthuhtut/Awesome-Red-Teaming\n\n(exploits-forsale)Collateral Damage :\u00a0 Kernel exploit for Xbox SystemOS using CVE-2024-30088\n\nhttps://github.com/exploits-forsale/collateral-damage\n\nAwesome-Red-Team-Operation\n\nhttps://github.com/CyberSecurityUP/Awesome-Red-Team-Operations\n\nWith NoConsolation you can now custom load all the dependencies from the PE you are going to execute, ensuring no image load events!\n\nhttps://github.com/fortra/No-Consolation\n\nAll-in-one OSINT tool for analysing any website\n\nhttps://github.com/Lissy93/web-check\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-07-22T11:27:29.000000Z"}, {"uuid": "1b41540f-ed04-429d-9c3e-a77ca9bc4715", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30088", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3674", "content": "Tools - Hackers Factory \n\nTools from the DEFCON 32 talk \"SHIM me what you got - Manipulating Shim and Office for Code Injection\"\n\nhttps://github.com/deepinstinct/ShimMe\n\nGitHub - exploits-forsale/collateral-damage: Kernel exploit for Xbox SystemOS using CVE-2024-30088\n\nhttps://github.com/exploits-forsale/collateral-damage\n\nAPKscan: Scan for secrets, endpoints, API keys, tokens, credentials in Android apps\n\nhttps://github.com/LucasFaudman/apkscan\n\n3 ways to get Remote Code Execution in Kafka UI\n\nhttps://github.blog/2024-07-22-3-ways-to-get-remote-code-execution-in-kafka-ui/\n\nGitHub - mqst/gouge: Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burp Suite\n\nhttps://github.com/mqst/gouge\n\nGitHub - two06/CerealKiller: .NET deserialization hunter\n\nhttps://github.com/two06/CerealKiller\n\nGitHub - securelayer7/CVE-2024-38856_Scanner: Apache OFBiz RCE Scanner &amp; Exploit (CVE-2024-38856)\n\nhttps://github.com/securelayer7/CVE-2024-38856_Scanner\n\nA technique to unbind and rebind 445/tcp on Windows without loading a driver, loading a module into LSASS, or rebooting the target machine. Implemented to ease the burden of SMB-based NTLM relays while operating over C2. Technical analysis of the technique is dicussed in more detail during the Relay Your Heart Away: An OPSEC Concious Approach to 445 Takeover presentation at x33fcon.\n\nhttps://github.com/zyn3rgy/smbtakeover\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-08-16T02:26:37.000000Z"}, {"uuid": "ba2ede98-df2c-43b7-981d-cd66074a46a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30088", "type": "exploited", "source": "https://t.me/InfoSecInsider/23552", "content": "Tools  - Hackers Factory \n\nTookie-osint has a simple-to-use UI and is really straightforward. The main idea of Tookie-osint is to discover usernames that are requested from an input.\n\nhttps://github.com/Alfredredbird/tookie-osint\n\n#CyberDilara\n\nGPU poisoning; hide the payload inside the gpu memory.\n\nhttps://github.com/H1d3r/GPU_ShellCode\n\nThis is a simple obfuscator for WireGuard. It is designed to make it harder to detect WireGuard traffic by making it look like something else.\n\nhttps://github.com/ClusterM/wg-obfuscator\n\nSploitScan is a powerful and user-friendly tool designed to streamline the process of identifying exploits for known vulnerabilities and their respective exploitation probability.\n\nhttps://github.com/xaitax/SploitScan\n\nA shellcode runner write in Rust use\n\nhttps://github.com/b1tg/rs-shellcode\n\nKernel exploit for Xbox SystemOS using CVE-2024-30088\n\nhttps://github.com/exploits-forsale/collateral-damage\n\nZip Slip Vulnerability in .a Static Library Files.  Since the implemented measure can be bypassed, the vulnerability allows an attacker to extract files to any desired location within the server running #MobSF.\n\nhttps://github.com/MobSF/Mobile-Security-Framework-MobSF/security/advisories/GHSA-4hh3-vj32-gr6j\n\nPython script to monitor your target continuously for new subdomains.\n\nhttps://github.com/faiyazahmad07/monitor_subdomains\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-08-27T05:30:34.000000Z"}, {"uuid": "b3fae2a6-a428-42a8-8317-7c33c2b70357", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30088", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3693", "content": "Tools  - Hackers Factory \n\nTookie-osint has a simple-to-use UI and is really straightforward. The main idea of Tookie-osint is to discover usernames that are requested from an input.\n\nhttps://github.com/Alfredredbird/tookie-osint\n\n#CyberDilara\n\nGPU poisoning; hide the payload inside the gpu memory.\n\nhttps://github.com/H1d3r/GPU_ShellCode\n\nThis is a simple obfuscator for WireGuard. It is designed to make it harder to detect WireGuard traffic by making it look like something else.\n\nhttps://github.com/ClusterM/wg-obfuscator\n\nSploitScan is a powerful and user-friendly tool designed to streamline the process of identifying exploits for known vulnerabilities and their respective exploitation probability.\n\nhttps://github.com/xaitax/SploitScan\n\nA shellcode runner write in Rust use\n\nhttps://github.com/b1tg/rs-shellcode\n\nKernel exploit for Xbox SystemOS using CVE-2024-30088\n\nhttps://github.com/exploits-forsale/collateral-damage\n\nZip Slip Vulnerability in .a Static Library Files.  Since the implemented measure can be bypassed, the vulnerability allows an attacker to extract files to any desired location within the server running #MobSF.\n\nhttps://github.com/MobSF/Mobile-Security-Framework-MobSF/security/advisories/GHSA-4hh3-vj32-gr6j\n\nPython script to monitor your target continuously for new subdomains.\n\nhttps://github.com/faiyazahmad07/monitor_subdomains\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-08-27T06:59:30.000000Z"}, {"uuid": "58534307-7eaa-43a7-82d0-a5c25a57e265", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30088", "type": "published-proof-of-concept", "source": "https://t.me/dilagrafie/3471", "content": "Tools - Hackers Factory \n\nGitHub - a13xp0p0v/kernel-hardening-checker: A tool for checking the security hardening options of the Linux kernel\n\nhttps://github.com/a13xp0p0v/kernel-hardening-checker\n\nELMERIKH/TelecordC2: Advanced Telegram x Discord C2, great for data Exfitration and Network evasion\n\nhttps://github.com/ELMERIKH/TelecordC2\n\nOSCP Example Cheat Sheet \n\ngithub.com/xsudoxx/OSCP\n\n(Old) List of Awesome Red Teaming Resources\n\nhttps://github.com/yeyintminthuhtut/Awesome-Red-Teaming\n\n(exploits-forsale)Collateral Damage :  Kernel exploit for Xbox SystemOS using CVE-2024-30088\n\nhttps://github.com/exploits-forsale/collateral-damage\n\nAwesome-Red-Team-Operation\n\nhttps://github.com/CyberSecurityUP/Awesome-Red-Team-Operations\n\nWith NoConsolation you can now custom load all the dependencies from the PE you are going to execute, ensuring no image load events!\n\nhttps://github.com/fortra/No-Consolation\n\nAll-in-one OSINT tool for analysing any website\n\nhttps://github.com/Lissy93/web-check\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-07-22T05:10:02.000000Z"}, {"uuid": "6221e0d5-916f-458f-b627-ad4040d4965d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30088", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/7349", "content": "Tools  - Hackers Factory \n\nTookie-osint has a simple-to-use UI and is really straightforward. The main idea of Tookie-osint is to discover usernames that are requested from an input.\n\nhttps://github.com/Alfredredbird/tookie-osint\n\n#CyberDilara\n\nGPU poisoning; hide the payload inside the gpu memory.\n\nhttps://github.com/H1d3r/GPU_ShellCode\n\nThis is a simple obfuscator for WireGuard. It is designed to make it harder to detect WireGuard traffic by making it look like something else.\n\nhttps://github.com/ClusterM/wg-obfuscator\n\nSploitScan is a powerful and user-friendly tool designed to streamline the process of identifying exploits for known vulnerabilities and their respective exploitation probability.\n\nhttps://github.com/xaitax/SploitScan\n\nA shellcode runner write in Rust use\n\nhttps://github.com/b1tg/rs-shellcode\n\nKernel exploit for Xbox SystemOS using CVE-2024-30088\n\nhttps://github.com/exploits-forsale/collateral-damage\n\nZip Slip Vulnerability in .a Static Library Files.  Since the implemented measure can be bypassed, the vulnerability allows an attacker to extract files to any desired location within the server running #MobSF.\n\nhttps://github.com/MobSF/Mobile-Security-Framework-MobSF/security/advisories/GHSA-4hh3-vj32-gr6j\n\nPython script to monitor your target continuously for new subdomains.\n\nhttps://github.com/faiyazahmad07/monitor_subdomains\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-08-27T09:08:21.000000Z"}, {"uuid": "2db66481-8b5d-4cfc-a8b8-79555045f944", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30088", "type": "published-proof-of-concept", "source": "Telegram/LsyZOcFmR3tiS2HA0dd4YVSmWj9mqKAdtbxDKk6MGzq8VQQ", "content": "", "creation_timestamp": "2024-08-02T00:41:17.000000Z"}, {"uuid": "8871a0a0-d2b4-432b-9842-36722ba90a3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30088", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/7291", "content": "Tools - Hackers Factory \n\nTools from the DEFCON 32 talk \"SHIM me what you got - Manipulating Shim and Office for Code Injection\"\n\nhttps://github.com/deepinstinct/ShimMe\n\nGitHub - exploits-forsale/collateral-damage: Kernel exploit for Xbox SystemOS using CVE-2024-30088\n\nhttps://github.com/exploits-forsale/collateral-damage\n\nAPKscan: Scan for secrets, endpoints, API keys, tokens, credentials in Android apps\n\nhttps://github.com/LucasFaudman/apkscan\n\n3 ways to get Remote Code Execution in Kafka UI\n\nhttps://github.blog/2024-07-22-3-ways-to-get-remote-code-execution-in-kafka-ui/\n\nGitHub - mqst/gouge: Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burp Suite\n\nhttps://github.com/mqst/gouge\n\nGitHub - two06/CerealKiller: .NET deserialization hunter\n\nhttps://github.com/two06/CerealKiller\n\nGitHub - securelayer7/CVE-2024-38856_Scanner: Apache OFBiz RCE Scanner &amp; Exploit (CVE-2024-38856)\n\nhttps://github.com/securelayer7/CVE-2024-38856_Scanner\n\nA technique to unbind and rebind 445/tcp on Windows without loading a driver, loading a module into LSASS, or rebooting the target machine. Implemented to ease the burden of SMB-based NTLM relays while operating over C2. Technical analysis of the technique is dicussed in more detail during the Relay Your Heart Away: An OPSEC Concious Approach to 445 Takeover presentation at x33fcon.\n\nhttps://github.com/zyn3rgy/smbtakeover\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-08-16T02:26:29.000000Z"}, {"uuid": "d350f221-f7f6-4506-84fe-d25a5e578c32", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30088", "type": "published-proof-of-concept", "source": "https://t.me/GrayHatsHack/6999", "content": "Tools - Hackers Factory \n\nGitHub - a13xp0p0v/kernel-hardening-checker: A tool for checking the security hardening options of the Linux kernel\n\nhttps://github.com/a13xp0p0v/kernel-hardening-checker\n\nELMERIKH/TelecordC2: Advanced Telegram x Discord C2, great for data Exfitration and Network evasion\n\nhttps://github.com/ELMERIKH/TelecordC2\n\nOSCP Example Cheat Sheet \n\ngithub.com/xsudoxx/OSCP\n\n(Old) List of Awesome Red Teaming Resources\n\nhttps://github.com/yeyintminthuhtut/Awesome-Red-Teaming\n\n(exploits-forsale)Collateral Damage :\u00a0 Kernel exploit for Xbox SystemOS using CVE-2024-30088\n\nhttps://github.com/exploits-forsale/collateral-damage\n\nAwesome-Red-Team-Operation\n\nhttps://github.com/CyberSecurityUP/Awesome-Red-Team-Operations\n\nWith NoConsolation you can now custom load all the dependencies from the PE you are going to execute, ensuring no image load events!\n\nhttps://github.com/fortra/No-Consolation\n\nAll-in-one OSINT tool for analysing any website\n\nhttps://github.com/Lissy93/web-check\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-07-22T11:27:29.000000Z"}, {"uuid": "f3e1f784-6ee7-4806-b299-375d2c7bc98b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30088", "type": "exploited", "source": "https://t.me/true_secator/5960", "content": "\u0421\u043b\u0435\u0434\u0443\u044f \u0432\u044b\u0448\u0435\u0438\u0437\u043b\u043e\u0436\u0435\u043d\u043d\u044b\u043c \u0443\u043c\u043e\u0437\u0430\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u044f\u043c \u0413\u0440\u0438\u0431\u043e\u0432, \u041f\u043e\u0437\u0438\u0442\u0438\u0432\u044b \u043f\u0440\u043e\u0448\u0435\u0440\u0441\u0442\u0438\u043b\u0438 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044e \u043e\u0431 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044f\u0445 \u0438\u0437 \u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u0435\u0439 \u0432\u0435\u043d\u0434\u043e\u0440\u043e\u0432, \u0441\u043e\u0446\u0441\u0435\u0442\u0435\u0439, \u0431\u043b\u043e\u0433\u043e\u0432, \u0422\u0413-\u043a\u0430\u043d\u0430\u043b\u043e\u0432, \u0431\u0430\u0437 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u043e\u0432, \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u044b\u0445 \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u0435\u0432 \u043a\u043e\u0434\u0430, \u0432\u044b\u0434\u0435\u043b\u0438\u0432 \u043d\u0430\u0438\u0431\u043e\u043b\u0435\u0435 \u0442\u0440\u0435\u043d\u0434\u043e\u0432\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0438\u044e\u043d\u044f.\n\n\u041f\u043e \u0441\u0443\u0442\u0438 \u044d\u0442\u043e \u0441\u0430\u043c\u044b\u0435 \u043e\u043f\u0430\u0441\u043d\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043b\u0438\u0431\u043e \u0443\u0436\u0435 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u044e\u0442\u0441\u044f \u0432\u0436\u0438\u0432\u0443\u044e, \u043b\u0438\u0431\u043e \u043c\u043e\u0433\u0443\u0442 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c\u0441\u044f \u0432 \u0431\u043b\u0438\u0436\u0430\u0439\u0448\u0435\u0435 \u0432\u0440\u0435\u043c\u044f.\n\n\u0412 \u044d\u0442\u043e\u043c \u043c\u0435\u0441\u044f\u0446\u0435 \u0442\u0430\u043a\u0438\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u043e\u043a\u0430\u0437\u0430\u043b\u043e\u0441\u044c \u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e \u043c\u043d\u043e\u0433\u043e \u2014 \u0434\u0435\u0432\u044f\u0442\u044c:\n\n- \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 Microsoft Windows, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u044b\u0435 \u0441 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u0435\u043c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439: \u0432 \u0441\u043b\u0443\u0436\u0431\u0435 CSC (CVE-2024-26229), \u0441\u043b\u0443\u0436\u0431\u0435 Error Reporting (CVE-2024-26169) \u0438 \u044f\u0434\u0440\u0435 \u041e\u0421 (CVE-2024-30088);\n\n- \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0430\u044f \u043a \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044e \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u043e\u0433\u043e \u043a\u043e\u0434\u0430, \u0432 \u0441\u043a\u0440\u0438\u043f\u0442\u043e\u0432\u043e\u043c \u044f\u0437\u044b\u043a\u0435 PHP \u043d\u0430 \u0443\u0437\u043b\u0430\u0445 \u043f\u043e\u0434 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435\u043c Windows (CVE-2024-4577);\n\n- \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0430\u044f \u043a \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044e \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439, \u0432 \u044f\u0434\u0440\u0435 Linux (CVE-2024-1086);\n\n- \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u0435\u043c \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438, \u0432 Check Point Quantum Security Gateways (CVE-2024-24919);\n\n- \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 VMware vCenter, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0438\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 (CVE-2024-37079, CVE-2024-37080);\n\n- \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 Veeam Backup &amp; Replication, \u043f\u0440\u0438\u0432\u043e\u0434\u044f\u0449\u0430\u044f \u043a \u043e\u0431\u0445\u043e\u0434\u0443 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 (CVE-2024-29849).\n\n\u041f\u043e\u0434\u0440\u043e\u0431\u043d\u043e \u043f\u043e \u043a\u0430\u0436\u0434\u043e\u0439 \u0441 \u0443\u043a\u0430\u0437\u0430\u043d\u0438\u0435\u043c \u043f\u0440\u0438\u0437\u043d\u0430\u043a\u043e\u0432 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438, \u043a\u043e\u043b\u0438\u0447\u0435\u0441\u0442\u0432\u0443 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0445 \u0436\u0435\u0440\u0442\u0432, \u043d\u0430\u043b\u0438\u0447\u0438\u044f \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u0445 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u043e\u0432, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0441\u043f\u043e\u0441\u043e\u0431\u043e\u0432 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f \u0438 \u043a\u043e\u043c\u043f\u0435\u043d\u0441\u0438\u0440\u0443\u044e\u0449\u0438\u0445 \u043c\u0435\u0440 - \u0432 \u0431\u043b\u043e\u0433\u0435\u00a0Positive Technologies.", "creation_timestamp": "2024-07-11T18:50:01.000000Z"}, {"uuid": "fc098096-b09f-4fb3-aa7e-799aa24bc2fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30088", "type": "published-proof-of-concept", "source": "https://t.me/cybersecs/2884", "content": "https://github.com/tykawaii98/CVE-2024-30088 Windows LPE CVE-2024-30088. \u0410\u0432\u0438\u0440\u044c \u043f\u0430\u043b\u0438\u0442, \u043d\u043e \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442.", "creation_timestamp": "2024-06-26T17:09:16.000000Z"}, {"uuid": "bde6c2bd-bba3-4daa-b980-6a621385df22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30088", "type": "seen", "source": "https://t.me/true_secator/6317", "content": "\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 Trend Micro \u0432\u044b\u043a\u0430\u0442\u0438\u043b\u0438 \u043d\u043e\u0432\u044b\u0439 \u043e\u0442\u0447\u0435\u0442, \u043e\u0442\u043c\u0435\u0447\u0430\u044f \u0430\u043a\u0442\u0438\u0432\u0438\u0437\u0430\u0446\u0438\u044e \u0434\u0435\u044f\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u0438 \u0438\u0440\u0430\u043d\u0441\u043a\u043e\u0439 APT34 (aka OilRig), \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u043e\u0439 \u0441 \u0437\u0430\u043f\u0443\u0441\u043a\u043e\u043c \u043d\u043e\u0432\u044b\u0445 \u043a\u0430\u043c\u043f\u0430\u043d\u0438\u0438, \u043d\u0430\u0446\u0435\u043b\u0435\u043d\u043d\u044b\u0445 \u043d\u0430 \u0433\u043e\u0441\u0443\u0447\u0440\u0435\u0436\u0434\u0435\u043d\u0438\u044f \u0438 \u043e\u0431\u044a\u0435\u043a\u0442\u044b \u041a\u0418\u0418 \u0432 \u041e\u0410\u042d \u0438 \u0440\u0435\u0433\u0438\u043e\u043d\u0435 \u041f\u0435\u0440\u0441\u0438\u0434\u0441\u043a\u043e\u0433\u043e \u0437\u0430\u043b\u0438\u0432\u0430.\n\n\u0412 \u0445\u043e\u0434\u0435 \u0437\u0430\u043c\u0435\u0447\u0435\u043d\u043d\u044b\u0445 \u0430\u0442\u0430\u043a OilRig \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430 \u043d\u043e\u0432\u044b\u0439 \u0431\u044d\u043a\u0434\u043e\u0440, \u043d\u0430\u0446\u0435\u043b\u0435\u043d\u043d\u044b\u0439 \u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u044b Microsoft Exchange \u0434\u043b\u044f \u043a\u0440\u0430\u0436\u0438 \u0443\u0447\u0435\u0442\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0437\u0430\u0434\u0435\u0439\u0441\u0442\u0432\u043e\u0432\u0430\u043b\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2024-30088 \u0434\u043b\u044f \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u0441\u0432\u043e\u0438\u0445 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u043d\u0430 \u0432\u0437\u043b\u043e\u043c\u0430\u043d\u043d\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u0445.\n\n\u041f\u043e\u043c\u0438\u043c\u043e \u0430\u043d\u0430\u043b\u0438\u0437\u0430 \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u0438, Trend Micro \u0442\u0430\u043a\u0436\u0435 \u043f\u0440\u043e\u0441\u043b\u0435\u0434\u0438\u043b\u0430 \u0437\u0430 \u0432\u0437\u0430\u0438\u043c\u043e\u0441\u0432\u044f\u0437\u044f\u043c\u0438\u0430\u0442\u0438\u043b\u0438 \u043d\u043e\u0432\u044b\u0439 \u043e\u0442\u0447\u0435\u0442, \u043e\u0442\u043c\u0435\u0447\u0430\u044f\u0434\u0440\u0443\u0433\u043e\u0439 \u0438\u0440\u0430\u043d\u0441\u043a\u043e\u0439 APT-\u0433\u0440\u0443\u043f\u043f\u043e\u0439, \u0443\u0447\u0430\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u0439 \u0432 \u0430\u0442\u0430\u043a\u0430\u0445 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c-\u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u0435\u0439.\n\n\u041d\u0430\u0431\u043b\u044e\u0434\u0430\u0435\u043c\u044b\u0435 Trend Micro \u0430\u0442\u0430\u043a\u0438 \u043d\u0430\u0447\u0438\u043d\u0430\u044e\u0442\u0441\u044f \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0433\u043e \u0432\u0435\u0431-\u0441\u0435\u0440\u0432\u0435\u0440\u0430 \u0434\u043b\u044f \u0437\u0430\u0433\u0440\u0443\u0437\u043a\u0438 \u0432\u0435\u0431-\u043e\u0431\u043e\u043b\u043e\u0447\u043a\u0438, \u0447\u0442\u043e \u0434\u0430\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0441\u0442\u044c \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u044b\u0439 \u043a\u043e\u0434 \u0438 \u043a\u043e\u043c\u0430\u043d\u0434\u044b PowerShell.\n\n\u041f\u043e\u0441\u043b\u0435 \u0430\u043a\u0442\u0438\u0432\u0430\u0446\u0438\u0438 OilRig \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 \u0432\u0435\u0431-\u043e\u0431\u043e\u043b\u043e\u0447\u043ab \u0434\u043b\u044f \u0440\u0430\u0437\u0432\u0435\u0440\u0442\u044b\u0432\u0430\u043d\u0438\u044f \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0445 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u043e\u0432, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442, \u043f\u0440\u0435\u0434\u043d\u0430\u0437\u043d\u0430\u0447\u0435\u043d\u043d\u044b\u0439 \u0434\u043b\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 Windows CVE-2024-30088.\n\nCVE-2024-30088 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0441\u043e\u0431\u043e\u0439 EoP-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432\u044b\u0441\u043e\u043a\u043e\u0433\u043e \u0443\u0440\u043e\u0432\u043d\u044f \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438, \u043a\u043e\u0442\u043e\u0440\u0443\u044e Microsoft \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0430 \u0432 \u0438\u044e\u043d\u0435 2024 \u0433\u043e\u0434\u0430.\n\n\u041e\u043d\u0430 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u043f\u043e\u0432\u044b\u0448\u0430\u0442\u044c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u0434\u043e SYSTEM, \u0447\u0442\u043e \u043e\u0442\u043a\u0440\u044b\u0432\u0430\u0435\u0442 \u0438\u043c \u0437\u043d\u0430\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c \u043d\u0430\u0434 \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c\u0438 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u043c\u0438.\n\nMicrosoft\u00a0\u043f\u0440\u0438\u0437\u043d\u0430\u043b\u0430\u00a0\u043d\u0430\u043b\u0438\u0447\u0438\u0435 PoC \u0434\u043b\u044f CVE-2024-30088, \u043d\u043e \u0434\u043e \u0441\u0438\u0445 \u043f\u043e\u0440 \u043d\u0435 \u043f\u043e\u043c\u0435\u0442\u0438\u043b\u0430 \u0435\u0435 \u043a\u0430\u043a \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u0443\u044e. CISA \u0442\u0430\u043a\u0436\u0435 \u043d\u0435 \u0443\u043f\u043e\u043c\u0438\u043d\u0430\u0435\u0442 \u0435\u0435 \u0432 \u0441\u0432\u043e\u0435\u043c \u043a\u0430\u0442\u0430\u043b\u043e\u0433\u0435 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u0445 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u044b\u0445 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439.\n\n\u0414\u0430\u043b\u0435\u0435 OilRig \u0440\u0435\u0433\u0438\u0441\u0442\u0440\u0438\u0440\u0443\u0435\u0442 DLL-\u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0443 \u0444\u0438\u043b\u044c\u0442\u0440\u0430 \u043f\u0430\u0440\u043e\u043b\u0435\u0439 \u0434\u043b\u044f \u043f\u0435\u0440\u0435\u0445\u0432\u0430\u0442\u0430 \u043e\u0442\u043a\u0440\u044b\u0442\u044b\u0445 \u0442\u0435\u043a\u0441\u0442\u043e\u0432\u044b\u0445 \u0443\u0447\u0435\u0442\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 \u0432\u043e \u0432\u0440\u0435\u043c\u044f \u0441\u043c\u0435\u043d\u044b \u043f\u0430\u0440\u043e\u043b\u044f, \u0430 \u0437\u0430\u0442\u0435\u043c \u0437\u0430\u0433\u0440\u0443\u0436\u0430\u0435\u0442 \u0438 \u0443\u0441\u0442\u0430\u043d\u0430\u0432\u043b\u0438\u0432\u0430\u0435\u0442 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e\u0433\u043e \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f ngrok \u0434\u043b\u044f \u0441\u043a\u0440\u044b\u0442\u043e\u0439 \u0441\u0432\u044f\u0437\u0438 \u0447\u0435\u0440\u0435\u0437 \u0437\u0430\u0449\u0438\u0449\u0435\u043d\u043d\u044b\u0435 \u0442\u0443\u043d\u043d\u0435\u043b\u0438.\n\n\u0414\u0440\u0443\u0433\u043e\u0439 \u043d\u043e\u0432\u043e\u0439 \u0442\u0430\u043a\u0442\u0438\u043a\u043e\u0439 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u043e\u0432 \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u0445 \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432 Microsoft Exchange \u0434\u043b\u044f \u043a\u0440\u0430\u0436\u0438 \u0443\u0447\u0435\u0442\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 \u0438 \u0438\u0437\u0432\u043b\u0435\u0447\u0435\u043d\u0438\u044f \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 \u0447\u0435\u0440\u0435\u0437 \u043b\u0435\u0433\u0438\u0442\u0438\u043c\u043d\u044b\u0439 \u0442\u0440\u0430\u0444\u0438\u043a \u044d\u043b\u0435\u043a\u0442\u0440\u043e\u043d\u043d\u043e\u0439 \u043f\u043e\u0447\u0442\u044b, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u0442\u0440\u0443\u0434\u043d\u043e \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u0442\u044c.\n\n\u042d\u043a\u0441\u0444\u0438\u043b\u044c\u0442\u0440\u0430\u0446\u0438\u044f \u0443\u043f\u0440\u043e\u0449\u0430\u0435\u0442\u0441\u044f \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e \u043d\u043e\u0432\u043e\u0433\u043e \u0431\u044d\u043a\u0434\u043e\u0440\u0430 \u043f\u043e\u0434 \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435\u043c StealHook. \n\n\u041f\u0440\u0438 \u044d\u0442\u043e\u043c Trend Micro \u043f\u043e\u043b\u0430\u0433\u0430\u0435\u0442, \u0447\u0442\u043e \u043f\u0440\u0430\u0432\u0438\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u0435\u043d\u043d\u0430\u044f \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430 \u0447\u0430\u0441\u0442\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442\u0441\u044f \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u043e\u043f\u043e\u0440\u043d\u043e\u0439 \u0442\u043e\u0447\u043a\u0438, \u0447\u0442\u043e\u0431\u044b \u043f\u0440\u043e\u0446\u0435\u0441\u0441 \u0432\u044b\u0433\u043b\u044f\u0434\u0435\u043b \u0437\u0430\u043a\u043e\u043d\u043d\u044b\u043c.\n\n\u0413\u043b\u0430\u0432\u043d\u0430\u044f \u0446\u0435\u043b\u044c \u044d\u0442\u043e\u0433\u043e \u044d\u0442\u0430\u043f\u0430 - \u043f\u0435\u0440\u0435\u0445\u0432\u0430\u0442\u0438\u0442\u044c \u0443\u043a\u0440\u0430\u0434\u0435\u043d\u043d\u044b\u0435 \u043f\u0430\u0440\u043e\u043b\u0438 \u0438 \u043f\u0435\u0440\u0435\u0434\u0430\u0442\u044c \u0438\u0445 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0432 \u0432\u0438\u0434\u0435 \u0432\u043b\u043e\u0436\u0435\u043d\u0438\u0439 \u044d\u043b\u0435\u043a\u0442\u0440\u043e\u043d\u043d\u043e\u0439 \u043f\u043e\u0447\u0442\u044b.\n\n\u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442 \u043a\u0440\u0435\u0434\u044b \u0434\u043b\u044f \u043f\u0435\u0440\u0435\u0441\u044b\u043b\u043a\u0438 \u044d\u0442\u0438\u0445 \u043f\u0438\u0441\u0435\u043c \u0447\u0435\u0440\u0435\u0437 \u043f\u0440\u0430\u0432\u0438\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u0435 \u0441\u0435\u0440\u0432\u0435\u0440\u044b Exchange.\n\n\u0412\u043e\u0437\u0432\u0440\u0430\u0449\u0430\u044f\u0441\u044c \u043a \u0441\u043e\u0432\u043f\u0430\u0434\u0435\u043d\u0438\u044f\u043c, TrendMicro \u043f\u043e\u043b\u0430\u0433\u0430\u0435\u0442 \u0442\u0430\u043a\u0436\u0435 \u043e \u043d\u0430\u043b\u0438\u0447\u0438\u0438 \u0441\u0445\u043e\u0434\u0441\u0442\u0432\u0430 \u043c\u0435\u0436\u0434\u0443 \u043a\u043e\u0434\u043e\u043c StealHook \u0438 \u0431\u044d\u043a\u0434\u043e\u0440\u0430\u043c\u0438 OilRig, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438\u0441\u044c \u0432 \u043f\u0440\u043e\u0448\u043b\u044b\u0445 \u043a\u0430\u043c\u043f\u0430\u043d\u0438\u044f\u0445, \u0432 \u0442\u043e\u043c \u0447\u0438\u0441\u043b\u0435 Karkoff, \u043f\u043e\u044d\u0442\u043e\u043c\u0443 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u044f\u044f \u0437\u0430\u043c\u0435\u0447\u0435\u043d\u043d\u0430\u044f \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u0430\u044f \u041f\u041e, \u043f\u043e-\u0432\u0438\u0434\u0438\u043c\u043e\u043c\u0443, \u0434\u043e\u0440\u0430\u0431\u043e\u0442\u043a\u0430 \u043f\u0440\u0435\u0434\u044b\u0434\u0443\u0449\u0438\u0445, \u043d\u0435\u0436\u0435\u043b\u0438 \u043d\u043e\u0432\u0430\u044f \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u043a\u0430.\n\n\u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, OilRig \u043d\u0435 \u043f\u0435\u0440\u0432\u044b\u0439 \u0440\u0430\u0437 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 \u0441\u0435\u0440\u0432\u0435\u0440\u044b Microsoft Exchange \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0433\u043e \u043a\u043e\u043c\u043f\u043e\u043d\u0435\u043d\u0442\u0430 \u0441\u0432\u043e\u0438\u0445 \u0430\u0442\u0430\u043a.\n\n\u041f\u043e\u0447\u0442\u0438 \u0433\u043e\u0434 \u043d\u0430\u0437\u0430\u0434\u00a0Symantec \u0443\u0436\u0435 \u043d\u0430\u0431\u043b\u044e\u0434\u0430\u043b\u0430, \u043a\u0430\u043a APT34 \u0443\u0441\u0442\u0430\u043d\u0430\u0432\u043b\u0438\u0432\u0430\u043b\u0430 \u0431\u044d\u043a\u0434\u043e\u0440 PowerExchange \u043d\u0430 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u0445 \u0441\u0435\u0440\u0432\u0435\u0440\u0430\u0445 Exchange, \u0441\u043f\u043e\u0441\u043e\u0431\u043d\u044b\u0445 \u043f\u043e\u043b\u0443\u0447\u0430\u0442\u044c \u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043a\u043e\u043c\u0430\u043d\u0434\u044b \u043f\u043e \u044d\u043b\u0435\u043a\u0442\u0440\u043e\u043d\u043d\u043e\u0439 \u043f\u043e\u0447\u0442\u0435.\n\n\u0422\u0435\u043c \u043d\u0435 \u043c\u0435\u043d\u0435\u0435, \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0430 \u043f\u043e-\u043f\u0440\u0435\u0436\u043d\u0435\u043c\u0443 \u0430\u043a\u0442\u0438\u0432\u043d\u0430 \u0432 \u0440\u0435\u0433\u0438\u043e\u043d\u0435 \u0411\u043b\u0438\u0436\u043d\u0435\u0433\u043e \u0412\u043e\u0441\u0442\u043e\u043a\u0430, \u0430 \u0435\u0435 \u0441\u0432\u044f\u0437\u044c \u0441 FOX Kitten, \u0445\u043e\u0442\u044f \u043d\u0430 \u0434\u0430\u043d\u043d\u044b\u0439 \u043c\u043e\u043c\u0435\u043d\u0442 \u0434\u043e \u043a\u043e\u043d\u0446\u0430 \u0438 \u043d\u0435\u043f\u043e\u043d\u044f\u0442\u043d\u0430, \u043d\u043e \u0432 \u043f\u0435\u0440\u0441\u043f\u0435\u043a\u0442\u0438\u0432\u0435 \u043c\u043e\u0436\u0435\u0442 \u0441\u043f\u043e\u0441\u043e\u0431\u0441\u0442\u0432\u043e\u0432\u0430\u0442\u044c \u0434\u043e\u0431\u0430\u0432\u043b\u0435\u043d\u0438\u044e ransomware \u0432 \u0435\u0435 \u0430\u0440\u0441\u0435\u043d\u0430\u043b.", "creation_timestamp": "2024-10-14T16:20:05.000000Z"}, {"uuid": "a856aff8-dead-4b37-9aea-737ea5d5689d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30088", "type": "exploited", "source": "https://t.me/Unik4tsG4ng/9791", "content": "Tools \n\nGitHub - a13xp0p0v/kernel-hardening-checker: A tool for checking the security hardening options of the Linux kernel\n\nhttps://github.com/a13xp0p0v/kernel-hardening-checker\n\nELMERIKH/TelecordC2: Advanced Telegram x Discord C2, great for data Exfitration and Network evasion\n\nhttps://github.com/ELMERIKH/TelecordC2\n\nOSCP Example Cheat Sheet \n\ngithub.com/xsudoxx/OSCP\n\n(Old) List of Awesome Red Teaming Resources\n\nhttps://github.com/yeyintminthuhtut/Awesome-Red-Teaming\n\n(exploits-forsale)Collateral Damage :  Kernel exploit for Xbox SystemOS using CVE-2024-30088\n\nhttps://github.com/exploits-forsale/collateral-damage\n\nAwesome-Red-Team-Operation\n\nhttps://github.com/CyberSecurityUP/Awesome-Red-Team-Operations\n\nWith NoConsolation you can now custom load all the dependencies from the PE you are going to execute, ensuring no image load events!\n\nhttps://github.com/fortra/No-Consolation\n\nAll-in-one OSINT tool for analysing any website\n\nhttps://github.com/Lissy93/web-check", "creation_timestamp": "2024-10-25T04:22:14.000000Z"}, {"uuid": "55ff5573-3069-4e71-abc4-6ff4a2f8e1c1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30088", "type": "published-proof-of-concept", "source": "https://t.me/HackerOne/3704", "content": "Windows LPE Exploit\nhttps://github.com/tykawaii98/CVE-2024-30088", "creation_timestamp": "2024-08-24T14:38:27.000000Z"}, {"uuid": "3e43de77-2c6d-4f7e-aa85-a5f5ff26e5bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30088", "type": "published-proof-of-concept", "source": "https://t.me/reverse_dungeon/3689", "content": "CVE-2024-30088: Windows LPE\n\nPATCHED: June 11, 2024\n\nhttps://github.com/tykawaii98/CVE-2024-30088\n\nP.S. \u041f\u0440\u043e\u0442\u0435\u0441\u0442\u0438\u043b \u043d\u0430 Win11, \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442\n\n#git #exploit #lpe #pentest #redteam", "creation_timestamp": "2024-06-28T01:04:37.000000Z"}, {"uuid": "7d85319c-46e8-4b79-b5a6-5110f0857efa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30088", "type": "published-proof-of-concept", "source": "https://t.me/Unik4tsG4ng/7190", "content": "Tools  - Hackers Factory \n\nTookie-osint has a simple-to-use UI and is really straightforward. The main idea of Tookie-osint is to discover usernames that are requested from an input.\n\nhttps://github.com/Alfredredbird/tookie-osint\n\n#CyberDilara\n\nGPU poisoning; hide the payload inside the gpu memory.\n\nhttps://github.com/H1d3r/GPU_ShellCode\n\nThis is a simple obfuscator for WireGuard. It is designed to make it harder to detect WireGuard traffic by making it look like something else.\n\nhttps://github.com/ClusterM/wg-obfuscator\n\nSploitScan is a powerful and user-friendly tool designed to streamline the process of identifying exploits for known vulnerabilities and their respective exploitation probability.\n\nhttps://github.com/xaitax/SploitScan\n\nA shellcode runner write in Rust use\n\nhttps://github.com/b1tg/rs-shellcode\n\nKernel exploit for Xbox SystemOS using CVE-2024-30088\n\nhttps://github.com/exploits-forsale/collateral-damage\n\nZip Slip Vulnerability in .a Static Library Files.  Since the implemented measure can be bypassed, the vulnerability allows an attacker to extract files to any desired location within the server running #MobSF.\n\nhttps://github.com/MobSF/Mobile-Security-Framework-MobSF/security/advisories/GHSA-4hh3-vj32-gr6j\n\nPython script to monitor your target continuously for new subdomains.\n\nhttps://github.com/faiyazahmad07/monitor_subdomains", "creation_timestamp": "2024-08-27T13:45:55.000000Z"}, {"uuid": "1be920c7-094d-4582-bf7d-3145f964eb56", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30088", "type": "exploited", "source": "https://t.me/thebugbountyhunter/8931", "content": "GitHub - exploits-forsale/collateral-damage: Kernel exploit for Xbox SystemOS using CVE-2024-30088\n\nhttps://github.com/exploits-forsale/collateral-damage", "creation_timestamp": "2024-07-16T11:00:26.000000Z"}, {"uuid": "ab2f1192-f64d-44f4-8eb9-89e5375159c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30088", "type": "exploited", "source": "https://t.me/thehackernews/5723", "content": "Iranian threat actor OilRig is exploiting a Windows Kernel #vulnerability (CVE-2024-30088) to gain SYSTEM privileges, enabling backdoor deployment and data theft. \n \nLearn how to protect your systems now https://thehackernews.com/2024/10/oilrig-exploits-windows-kernel-flaw-in.html", "creation_timestamp": "2024-10-13T11:42:43.000000Z"}, {"uuid": "da11975e-f7af-4ac9-918f-da78d0e88e57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30088", "type": "published-proof-of-concept", "source": "https://t.me/haccking/11160", "content": "CVE-2024-30088: Windows LPE\n\n#exploit #lpe #pentest #redteam\n\n\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u0435\u043c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0432 \u044f\u0434\u0440\u0435 Windows.\n\n\u0421\u0441\u044b\u043b\u043a\u0430 \u043d\u0430 exploit.\n\n\u0421\u0441\u044b\u043b\u043a\u0430 \u043d\u0430 \u0432\u0438\u0434\u0435\u043e.\n\nLH | \u041d\u043e\u0432\u043e\u0441\u0442\u0438 | \u041a\u0443\u0440\u0441\u044b | \u041c\u0435\u043c\u044b\n\n#\u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u044f\n#\u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438\n\nOnion Market \u2014 \u0430\u043d\u043e\u043d\u0438\u043c\u043d\u044b\u0439 \u04202\u0420-\u043e\u0431\u043c\u0435\u043d\u043d\u0438\u043a \u0434\u043b\u044f \u043b\u044e\u0434\u0435\u0439!", "creation_timestamp": "2024-08-24T10:12:25.000000Z"}, {"uuid": "c9de5042-7f84-482c-8e61-9a6113cd7576", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30088", "type": "exploited", "source": "https://t.me/CNArsenal/2803", "content": "https://github.com/exploits-forsale/collateral-damage\n\nKernel exploit for Xbox SystemOS using CVE-2024-30088\n#github  #exploit", "creation_timestamp": "2024-07-18T07:34:33.000000Z"}, {"uuid": "43767a97-14e8-401f-9dc5-763560e9826c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30088", "type": "exploited", "source": "https://t.me/CyberBulletin/26919", "content": "\u26a1\ufe0fCVE-2024-30088 Under Attack: OilRig Targets Windows Kernel Vulnerability.\n\n#CyberBulletin", "creation_timestamp": "2024-12-26T04:50:40.000000Z"}, {"uuid": "f8de633b-dee8-4aca-bf76-4023dde43a04", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30088", "type": "exploited", "source": "https://t.me/GhostClanInt/25334", "content": "Tools - Hackers Factory \n\nGitHub - a13xp0p0v/kernel-hardening-checker: A tool for checking the security hardening options of the Linux kernel\n\nhttps://github.com/a13xp0p0v/kernel-hardening-checker\n\nELMERIKH/TelecordC2: Advanced Telegram x Discord C2, great for data Exfitration and Network evasion\n\nhttps://github.com/ELMERIKH/TelecordC2\n\nOSCP Example Cheat Sheet \n\ngithub.com/xsudoxx/OSCP\n\n(Old) List of Awesome Red Teaming Resources\n\nhttps://github.com/yeyintminthuhtut/Awesome-Red-Teaming\n\n(exploits-forsale)Collateral Damage :  Kernel exploit for Xbox SystemOS using CVE-2024-30088\n\nhttps://github.com/exploits-forsale/collateral-damage\n\nAwesome-Red-Team-Operation\n\nhttps://github.com/CyberSecurityUP/Awesome-Red-Team-Operations\n\nWith NoConsolation you can now custom load all the dependencies from the PE you are going to execute, ensuring no image load events!\n\nhttps://github.com/fortra/No-Consolation\n\nAll-in-one OSINT tool for analysing any website\n\nhttps://github.com/Lissy93/web-check\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-07-22T08:46:57.000000Z"}, {"uuid": "1a95e298-62e9-469d-acd6-3ca2bd2e3731", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30088", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/2710", "content": "https://github.com/tykawaii98/CVE-2024-30088\n\nCVE-2024-30088\n#github #poc", "creation_timestamp": "2024-07-20T12:30:03.000000Z"}, {"uuid": "a04a42a2-f3c1-4a50-9f5a-59c9b4c1cbd0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30088", "type": "exploited", "source": "https://t.me/InfoSecInsider/82", "content": "Tools  - Hackers Factory \n\nTookie-osint has a simple-to-use UI and is really straightforward. The main idea of Tookie-osint is to discover usernames that are requested from an input.\n\nhttps://github.com/Alfredredbird/tookie-osint\n\n#CyberDilara\n\nGPU poisoning; hide the payload inside the gpu memory.\n\nhttps://github.com/H1d3r/GPU_ShellCode\n\nThis is a simple obfuscator for WireGuard. It is designed to make it harder to detect WireGuard traffic by making it look like something else.\n\nhttps://github.com/ClusterM/wg-obfuscator\n\nSploitScan is a powerful and user-friendly tool designed to streamline the process of identifying exploits for known vulnerabilities and their respective exploitation probability.\n\nhttps://github.com/xaitax/SploitScan\n\nA shellcode runner write in Rust use\n\nhttps://github.com/b1tg/rs-shellcode\n\nKernel exploit for Xbox SystemOS using CVE-2024-30088\n\nhttps://github.com/exploits-forsale/collateral-damage\n\nZip Slip Vulnerability in .a Static Library Files.  Since the implemented measure can be bypassed, the vulnerability allows an attacker to extract files to any desired location within the server running #MobSF.\n\nhttps://github.com/MobSF/Mobile-Security-Framework-MobSF/security/advisories/GHSA-4hh3-vj32-gr6j\n\nPython script to monitor your target continuously for new subdomains.\n\nhttps://github.com/faiyazahmad07/monitor_subdomains\n\n#CyberDilara\nhttps://t.me/CyberDilara", "creation_timestamp": "2024-08-27T05:30:34.000000Z"}, {"uuid": "e66fba95-e44d-4ae5-94b6-07195206d5f6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-30088", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/10741", "content": "#exploit\n1. CVE-2024-22729:\nNetis MW5360 RCE\nhttps://packetstormsecurity.com/files/179200/Netis-MW5360-Remote-Command-Execution.html\n\n2. CVE-2024-30088:\nWindows Kernel\u00a0EoP/TOCTOU LPE\nhttps://github.com/tykawaii98/CVE-2024-30088\n]-&gt; kernel exploit for Xbox SystemOS:\nhttps://github.com/exploits-forsale/collateral-damage", "creation_timestamp": "2024-09-19T17:03:59.000000Z"}]}