Peneter Tools – Telegram
Another Local Windows privilege escalation using a new potato technique ;)

The LocalPotato attack is a type of NTLM reflection attack that targets local authentication. This attack allows for arbitrary file read/write and elevation of privilege.

NOTE: This vulnerability has been fixed by Microsoft in the January 2023 Patch Tuesday with the CVE-2023-21746. If you run this exploit against a patched machine it won't work.

More technical details at --> https://www.localpotato.com/localpotato_html/LocalPotato.html

https://github.com/decoder-it/LocalPotato
#LPE
VLAN L2 Pivoting Instrument
https://github.com/c4s73r/HIVE
Weblogic CVE-2023-21839
Vulnerability in the Oracle WebLogic Server product of Oracle Fusion Middleware (component: Core). Supported versions that are affected are 12.2.1.3.0, 12.2.1.4.0 and 14.1.1.0.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via T3, IIOP to compromise Oracle WebLogic Server. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle WebLogic Server accessible data.
https://github.com/Scarehehe/Weblogic-CVE-2023-21839
powershell and bash noscript use api of chatgpt for bypassing chatgpt’s restrictions
CVE-2023-21716 (Microsoft Word RCE vuln) Python PoC

https://system32.ink/news-feed/p/266/
CVE-2023-23415
Internet Control Message Protocol (ICMP) Remote Code Execution Vulnerability
https://github.com/wh-gov/CVE-2023-23415
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23415/