ϻг_ϻε
@steven.srcincite.io
📤 1092
📥 115
📝 49
Hermetic Initiate. Exploring conscience and the nature of reality. I also hack things.
reposted by
ϻг_ϻε
Atredis Partners
3 months ago
Command & Conquer'd: worming RCEs through a classic multiplayer game. Check out the full writeup from our
@districtcon.bsky.social
Junkyard submission here:
www.atredis.com/blog/2026/1/...
By
@droner.bsky.social
and
@jordan9001.bsky.social
#Security
#modding
#rce
loading . . .
General Graboids: Worms and Remote Code Execution in Command & Conquer — Atredis Partners
[this work was conducted collaboratively by Bryan Alexander and Jordan Whitehead] This post details several vulnerabilities discovered in the popular online game Command & Conquer: Generals. We…
https://www.atredis.com/blog/2026/1/26/generals
0
10
11
Oh I nearly forgot about this platform
3 months ago
0
5
0
reposted by
ϻг_ϻε
3 months ago
@steven.srcincite.io
did some cool stuff, check it out!
srcincite.io/blog/2026/01...
loading . . .
Samstung Part 1 :: Remote Code Execution in MagicINFO 9 Server
One weekend, I decided to unpack some of the patches that Samsung have been sending out for their MagicINFO 9 solution. During this process, I discovered mul...
https://srcincite.io/blog/2026/01/28/samstung-part-1-remote-code-execution-in-magicinfo-server.html
0
3
2
reposted by
ϻг_ϻε
Peter Stöckli
about 1 year ago
If you're using ruby-saml or omniauth-saml for SAML authentication make sure to update these libraries as fast as possible! Fixes for two critical authentication bypass vulnerabilities were published today (CVE-2025-25291 + CVE-2025-25292).
github.blog/security/sig...
loading . . .
Sign in as anyone: Bypassing SAML SSO authentication with parser differentials
Critical authentication bypass vulnerabilities were discovered in ruby-saml up to version 1.17.0. See how they were uncovered.
https://github.blog/security/sign-in-as-anyone-bypassing-saml-sso-authentication-with-parser-differentials/
1
11
10
reposted by
ϻг_ϻε
Jasmine 🌌🔭
over 1 year ago
NEW JWST IMAGE SHOWING A PROTOPLANETARY DISK AROUND A NEWLY FORMED STAR!!! 🤩
30
1016
222
reposted by
ϻг_ϻε
Michael Stepankin
over 1 year ago
Last year, I committed to uncovering critical vulnerabilities in Maven repositories. Now it’s time to share the findings: RCE in Sonatype Nexus, Cache Poisoning in JFrog Artifactory, and more!
github.blog/security/vul...
1
29
16
This is what I love about Chris, authenticity:
muffsec.com/blog/abstain...
. Btw I couldn’t agree more with his conclusion about the event.
loading . . .
Abstaining From Pwn2own – muffSec
https://muffsec.com/blog/abstaining-from-pwn2own/
over 1 year ago
0
3
0
reposted by
ϻг_ϻε
SwiftOnSecurity
over 1 year ago
Bitcoin is enemy of culture because it introduces monetary incentive where only prestige belongs.
2
173
16
reposted by
ϻг_ϻε
Stephen Fewer
over 1 year ago
I wrote a PoC for the recent Ivanti Connect Secure stack buffer overflow, CVE-2025-0282, based on the exploitation strategy watchTowr published, along with an assessment of exploitability given the lack of a suitable info leak to break ASLR:
attackerkb.com/assessments/...
1
11
8
reposted by
ϻг_ϻε
Kelsey Hightower
over 1 year ago
What's the point of being rich if you can't afford to do the right thing.
732
27398
4369
reposted by
ϻг_ϻε
James Kettle
over 1 year ago
Nominations are now open for the Top 10 Web Hacking Techniques of 2024! Browse the contestants and submit your own here:
portswigger.net/research/top...
loading . . .
Top ten web hacking techniques of 2024: nominations open
Nominations are now open for the top 10 new web hacking techniques of 2024! Every year, security researchers from all over the world share their latest findings via blog posts, presentations, PoCs, an
https://portswigger.net/research/top-ten-web-hacking-techniques-of-2024-nominations-open
1
28
23
reposted by
ϻг_ϻε
Natalie Silvanovich
over 1 year ago
Just unrestricted an issue that shows a fun new attack surface. Android RCS locally transcribes incoming media, making vulnerabilities audio codecs now fully-remote. This bug in an obscure Samsung S24 codec is 0-click
project-zero.issues.chromium.org/issues/36869...
loading . . .
Project Zero
https://project-zero.issues.chromium.org/issues/368695689
1
38
18
youtu.be/a6EnyQ0Dy50?...
loading . . .
Aleph Bass — an aleph bet song by Darshan :: אלף בית – דרשן
YouTube video by Darshan Project
https://youtu.be/a6EnyQ0Dy50?si=XfWJduQTuPked9oC
over 1 year ago
0
1
0
reposted by
ϻг_ϻε
Nicolas Grégoire
over 1 year ago
Positive Technologies published two scenarios they encountered during pentests, where they pivot to the internal network thanks to an Internet-facing Exchange server and its numerous SSRF vectors 💎
loading . . .
https://static.ptsecurity.com/events/exch-vietnam.pdf
1
6
3
reposted by
ϻг_ϻε
Nicolas Grégoire
over 1 year ago
TIL how easy it is to ask curl to dump TLS session keys to disk 🛠️ Simply set the environment variable `SSLKEYLOGFILE=/path/to/file` 😅 Note: it also works for Firefox and Chrome Extremely useful when combined with Wireshark 👍
6
132
36
reposted by
ϻг_ϻε
Alex Chapman
over 1 year ago
CVE-2024-12727 Sophos coming in with an unauthenticated SQLi in their firewall appliance 👏
add a skeleton here at some point
2
93
30
These are some really nice blog posts regarding algo confusion bugs in JWT by
@pentesterlab.com
pentesterlab.com/blog/jwt-alg...
&
pentesterlab.com/blog/another...
nice one
@snyff.pentesterlab.com
!
loading . . .
PentesterLab Blog: Another JWT Algorithm Confusion Vulnerability: CVE-2024-54150
Discover how a code review uncovered a JWT algorithm confusion vulnerability (CVE-2024-54150). Learn key insights to enhance your security skills and spot vulnerabilities effectively.
https://pentesterlab.com/blog/another-jwt-algorithm-confusion-cve-2024-54150
over 1 year ago
1
20
5
reposted by
ϻг_ϻε
Piotr Bazydło
over 1 year ago
[4/n] My Hexacon 2023 talk about .NET Deserialization. New gadgets, insecure serialization (RCE through serialization) and custom gadgets found in the products codebase. Talk:
www.youtube.com/watch?v=_CJm...
White paper:
github.com/thezdi/prese...
loading . . .
HEXACON2023 - Exploiting Hardened .NET Deserialization by Piotr Bazydło
YouTube video by Hexacon
https://www.youtube.com/watch?v=_CJmUh0_uOM
0
5
2
reposted by
ϻг_ϻε
Louis Nyffenegger
over 1 year ago
I put together a VERY limited (for now) list of web hackers in a Starter pack:
go.bsky.app/9uay4Ad
A lot of people are missing (I will try to add more as I find them) but make sure you follow people already in the list!
add a skeleton here at some point
3
30
13
S2-067 is a fantastic bypass of the patch for S2-066. It uses ONGL to re-write the upload filename property in order to bypass the filename path traversal checks. PoC: if the target bean is called "UploadFile" the your target parameter is "top.UploadFileFileName". 🤯
over 1 year ago
0
6
2
reposted by
ϻг_ϻε
Phrack Zine
over 1 year ago
We updated our CFP for Phrack 72! The deadline is now April 1st 2025. Check the site for specifics on how to contribute, as well as some inspiration! We also posted a link to purchase physical copies of Phrack 71, and a donation link too. Enjoy!
phrack.org
4
114
61
reposted by
ϻг_ϻε
onion person
over 1 year ago
wokism is out of control
102
6922
383
…and what is your office? My office is that which is in the higher aspirant of the soul - Ma’at
over 1 year ago
0
0
0
reposted by
ϻг_ϻε
James Forshaw
over 1 year ago
A companion blog to my Bluehat 2024 presentation on OleView.NET is up now.
googleprojectzero.blogspot.com/2024/12/wind...
loading . . .
https://googleprojectzero.blogspot.com/2024/12/windows-tooling-updates-oleviewnet.htm
0
20
13
reposted by
ϻг_ϻε
Piotr Bazydło
over 1 year ago
I wrote a fun, little blog post. Remote pre-auth file deletion in SolarWinds ARM allowed to achieve LPE on AD machines 🙃
add a skeleton here at some point
1
9
6
Here is a great follow up blog post to my blog Remote Code Execution with Spring properties written by Elliot Ward:
snyk.io/articles/rem...
loading . . .
Remote Code Execution with Spring Boot 3.4.0 Properties | Snyk
this article introduces two methods for leveraging Logback configuration to achieve Remote Code Execution (RCE) in Spring Boot applications. These techniques are effective on the latest version of Spr...
https://snyk.io/articles/remote-code-execution-with-spring-boot-3-4-0-properties/
over 1 year ago
0
20
7
Shit posting on wastebook and having my family all triggered is the glory I get on a Friyay!
over 1 year ago
0
4
0
reposted by
ϻг_ϻε
Luke Jahnke
over 1 year ago
My latest blog post is live 🔥 Read it to learn what SafeMarshal is and *two* very different ways to escape and get RCE! Read it to find out why Date is *not* a safe class in Ruby or how to leverage serialized strings being constructed with string concatenation!
nastystereo.com/security/rub...
1
19
8
reposted by
ϻг_ϻε
Luke Jahnke
over 1 year ago
My latest blog post is live!
nastystereo.com/security/cro...
Read how to send a cross-site POST without including a Content-Type header (without CORS). It even works with navigator.sendBeacon
3
79
33
I just wrote a new blog post! This is how I (ab)used a jailed file write bug in Tomcat/Spring. Enjoy! Remote Code Execution with Spring Properties ::
srcincite.io/blog/2024/11...
loading . . .
Remote Code Execution with Spring Properties
Recently a past student came to me with a very interesting unauthenticated vulnerability in a Spring application that they were having a hard time exploiting...
https://srcincite.io/blog/2024/11/25/remote-code-execution-with-spring-properties.html
over 1 year ago
1
76
38
reposted by
ϻг_ϻε
Luke Jahnke
over 1 year ago
I just published a new blog post sharing an improved Deserialization Gadget Chain for Ruby! It builds on the work of others, including Leonardo Giovanni,
@ulldma.bsky.social
and
@vakzz.bsky.social
nastystereo.com/security/rub...
0
15
5
Trust me, the Chinese hack Spring apps harder than you:
juejin.cn/post/6972564...
loading . . .
https://juejin.cn/post/6972564484720328718
over 1 year ago
1
8
2
reposted by
ϻг_ϻε
Felipe Molina
over 1 year ago
Heh, got the poc for
@qualys.bsky.social
#needrestart
CVE-2024-48990 in a couple of hours 😄
1
11
5
X-PAN-AUTHCHECK: lol
over 1 year ago
1
10
1
Awesome:
www.zerodayinitiative.com/advisories/Z...
loading . . .
ZDI-24-1530
WordPress Core maybe_unserialize Deserialization of Untrusted Data Remote Code Execution Vulnerability
https://www.zerodayinitiative.com/advisories/ZDI-24-1530/
over 1 year ago
0
0
0
reposted by
ϻг_ϻε
buherator
over 1 year ago
Qualys is at it again:
https://seclists.org/oss-sec/2024/q4/108
LPEs in needrestart (CVE-2024-48990, CVE-2024-48991, CVE-2024-48992, CVE-2024-10224, and CVE-2024-11003)
Original post
0
3
4
Interesting read:
infosecwriteups.com/my-llm-bug-b...
loading . . .
My LLM Bug Bounty Journey on Hugging Face Hub via Protect AI
From Informative Rejection to Black Hat Briefing
https://infosecwriteups.com/my-llm-bug-bounty-journey-on-hugging-face-hub-via-protect-ai-9f3a1bc72c2e
over 1 year ago
0
5
1
Just the one :->
add a skeleton here at some point
over 1 year ago
0
2
0
Loose lips sink ships
add a skeleton here at some point
over 1 year ago
0
4
0
I bet this is actually pretty interesting:
seclists.org/oss-sec/2024...
and what’s the bet their would be variants in other frameworks and components.
loading . . .
oss-sec: CVE-2024-52316: Apache Tomcat: Authentication bypass when using Jakarta Authentication API
https://seclists.org/oss-sec/2024/q4/103
over 1 year ago
0
2
0
reposted by
ϻг_ϻε
Lukas Weichselbaum
over 1 year ago
I'm in the process of creating a *web security* starter pack and need your help finding more webbies here. Please share and recommend folks passionate about web security in comments below so we can get this community started here 🙂
go.bsky.app/Uf8dZhz
add a skeleton here at some point
16
55
25
Post a pic YOU took (no description) to bring some zen to the timeline
add a skeleton here at some point
over 1 year ago
1
3
1
Pop thy shell
add a skeleton here at some point
over 1 year ago
0
4
1
Born too late for 2000s blackhat ezines born to early for bug bounty millionaire.
over 1 year ago
0
10
1
It’s that time of the month… for some spell craft 🧙♂️
over 1 year ago
0
1
0
reposted by
ϻг_ϻε
TrendAI Zero Day Initiative
over 1 year ago
[ZDI-24-1510|CVE-2024-50330] Ivanti Endpoint Manager GetComputerID SQL Injection Remote Code Execution Vulnerability (CVSS 9.8; Credit: Piotr Bazydlo of Trend Micro Zero Day Initiative)
zerodayinitiative.com/advisories/Z...
loading . . .
ZDI-24-1510
Ivanti Endpoint Manager GetComputerID SQL Injection Remote Code Execution Vulnerability
https://zerodayinitiative.com/advisories/ZDI-24-1510/
0
5
2
reposted by
ϻг_ϻε
jstnkndy
over 1 year ago
Analysis for CVE-2024-47575, the recent FortiManager 0day, aka FortiJump from Rapid7:
attackerkb.com/topics/OFBGp...
loading . . .
CVE-2024-47575 | AttackerKB
On October 23, 2024, Fortinet published an advisory for CVE-2024-47575, a missing authentication vulnerability affecting FortiManager and FortiManager Cloud de…
https://attackerkb.com/topics/OFBGprmpIE/cve-2024-47575/rapid7-analysis
0
2
2
Im back because apparently this is the place to be
over 1 year ago
1
6
0
Load more
feeds!
log in