Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-52940 PoC — AnyDesk 安全漏洞

Source
Associated Vulnerability
Title:AnyDesk 安全漏洞 (CVE-2024-52940)
Description:AnyDesk through 8.1.0 on Windows, when Allow Direct Connections is enabled, inadvertently exposes a public IP address within network traffic. The attacker must know the victim's AnyDesk ID.
Description
AnySniff is a tool for monitoring TCP connections of processes like AnyDesk on Windows. It uses the CVE-2024-52940 vulnerability to track open connections and log IPs, ports, and other details.
Readme
# 💀AnySniff
![изображение](https://github.com/user-attachments/assets/b0690927-2fe8-449b-b5d0-c15d7f9faa0a)

AnySniff is a tool for monitoring TCP connections of processes like AnyDesk on Windows. It uses the CVE-2024-52940 vulnerability to track open connections and log IPs, ports, and other relevant details.

## ⚙Features

- Monitors TCP connections of targeted processes (e.g., AnyDesk).
- Logs IP addresses, ports, and process details to a log file.
- Allows real-time sniffing of network traffic.
- Provides a simple menu-driven interface.

## 💽Requirements

- Python 3.x
- Windows operating system
- `pyfiglet` library for ASCII art
- `colorama` library for color support

## 🛠️Installation

1. Clone this repository:
    ```bash
    git clone https://github.com/yourusername/AnySniff.git
    ```
2. Navigate to the project directory:
    ```bash
    cd AnySniff
    ```
3. Install the required dependencies:
    ```bash
    pip install -r requirements.txt
    ```

## 🍴Usage

1. Run the script:
    ```bash
    python anysniff.py
    ```
2. Follow the menu options:
    - **Start Sniff**: Starts sniffing for targeted TCP connections.
    - **Info**: Displays information about the tool and its usage.
    - **Exit**: Exits the program.
3. How to sniff?
    - After starting the sniffer, connect to any remote machine via AnyDesk and look at the terminal.
### **Enjoy!**

## 📄Logs

All connection details will be logged in the current directory. The logs are saved with filenames that include the timestamp, such as `ip_2024-12-02_08-45-00.log`.

## 💊Acknowledgements

- This tool leverages CVE-2024-52940 for monitoring AnyDesk connections.
- Created by MKultra69 with love.

## ❓P.S

- I don't give a shit why or how.
File Snapshot

[4.0K] /data/pocs/cd2b395d41d4d9ffb94c3af921970c4d60962c13 ├── [ 33K] AnySniff.py ├── [ 484] LICENSE.md ├── [1.7K] README.md └── [ 26] requirements.txt 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →