SensePost
@sensepost.com
📤 291
📥 16
📝 19
Work like hell, Share all you know, Abide by your handshake, Have fun. - Dan Geer
reposted by
SensePost
💥 leonjza
20 days ago
I've been hacking on a new Windows Named Pipe tool called PipeTap which helps analyse named pipe communications. Born out of necessity while doing some vulnerability research on a target, its been super useful in reversing it's fairly complex protocol. :)
2
7
9
Reverse engineering Microsoft’s SQLCMD.exe to implement Channel Binding support for MSSQL into Impacket’s
mssqlclient.py
. Storytime from Aurelien (@Defte_ on the bird site), including instructions for reproducing the test environment yourself.
sensepost.com/blog/2025/a-...
2 months ago
0
10
7
Adriaan was struggling to get an interactive shell on the *nix application server he had popped, so he wrote a turn-based mini binary to give you a semi-interactive shell in restrictive environments. Writeup & code are at 👇
sensepost.com/blog/2025/no...
3 months ago
0
11
6
reposted by
SensePost
💥 leonjza
4 months ago
Quite stoked to be speaking at
@defcon.bsky.social
33 this year, presenting: "7 Vulns in 7 Days: Breaking Bloatware Faster Than It’s Built". Reversing, exploits, disclosure pain - it has it all, and it's going to be fun! 💥 See ya soon Vegas. ☀️
1
13
4
reposted by
SensePost
Felipe Molina
4 months ago
I was talking with someone about dependency confusion and suply chain attacks and I was confused myself with the feasibility of doing this in 2025, so I decided to take a practical aproach and create my own tool 🔨 to detect Orphan and Mispelled packages 📦:
sensepost.com/blog/2025/de...
loading . . .
SensePost | Depscanner: find orphaned packages before the bad guys do
Leaders in Information Security
https://sensepost.com/blog/2025/depscanner-find-orphaned-packages-before-the-bad-guys-do/
0
5
4
Did we mention all this is done in the cloud with access to the labs available after the training for you to keep up practise post Vegas.
add a skeleton here at some point
4 months ago
0
1
0
Unsatisfied with merely relying on reFlutter to do its magic, Jacques dove deep to understand how Flutter's SSL pinning in Android works, and how to intercept it with Frida.
sensepost.com/blog/2025/in...
6 months ago
0
3
3
The S is for Security. How to use WinRMS as a solid NTLM relay target, and why it’s less secure than WinRM over HTTP. writeup:
sensepost.com/blog/2025/is...
PR to impacket:
github.com/fortra/impac...
Demo:
youtu.be/3mG2Ouu3Umk
loading . . .
WinRMS Relaying
YouTube video by Sense Post
https://youtu.be/3mG2Ouu3Umk
6 months ago
1
11
10
reposted by
SensePost
💥 leonjza
6 months ago
Whipped together a SOCKS5-over-any-transport feature today for the c2 & implant used in
@sensepost.com
purple teaming / emulation exercises. Here I have a cURL request, over an ICMP channel, funnelling HTTP requests in and out via our implant :D Fun! 😄🔥
0
15
4
reposted by
SensePost
Orange
6 months ago
What can be done to prevent phishing attacks? We speak to cyberdefence expert
@rodriguelebayon.bsky.social
, Head of Global CERT at Orange Cyberdefense, who tells us more about the growing problem and what we can do to stop it. 👉See the interview:
www.france24.com/en/tv-shows/...
loading . . .
Entre Nous - Fighting cybercrime: What can be done to prevent phishing attacks?
Have you ever received a phone call from a number you don't know, offering you a job that's too good to be true? Or received a link to pay for a package that's supposedly in your name? In many of thos...
https://www.france24.com/en/tv-shows/entre-nous/20250325-fighting-cybercrime-what-can-be-done-to-prevent-phishing-attacks
0
4
2
Dropping Teams malware via the browser’s cache - part II of Aurélien’s Browser Cache Smuggling covers his Insomni’hack talk with end to end weaponisation
sensepost.com/blog/2025/br...
Demo:
youtu.be/tIveWYfYcCI
6 months ago
0
9
2
GLPI (popular in France & Brazil) versions 9.5.0-10.0.16 allow hijacking sessions of authenticated users remotely. The details & process of discovering the vulnerability is detailed by @GuilhemRioux here:
sensepost.com/blog/2025/le...
Tooling:
github.com/Orange-Cyber...
Demo:
youtu.be/OTaCV4-6qHE
6 months ago
0
3
4
reposted by
SensePost
Using frida-trace to hook thousands of methods in one go and get clean, readable output for large, obfuscated mobile apps 📲. Another post from Reino’s to level up your dynamic analysis:
sensepost.com/blog/2025/us...
7 months ago
0
9
6
Using frida-trace to hook thousands of methods in one go and get clean, readable output for large, obfuscated mobile apps 📲. Another post from Reino’s to level up your dynamic analysis:
sensepost.com/blog/2025/us...
7 months ago
0
9
6
Reino takes his NoSQL injection series a bit further with (maybe) new techniques for more efficient error based NoSQL injections in this follow up post:
sensepost.com/blog/2025/no...
7 months ago
1
5
3
reposted by
SensePost
Dominic White
7 months ago
Some great research writeups and tool releases hitting the
@sensepost.com
blog and GitHub the last few days:
0
6
4
Want a hacker's introduction to using neural networks to create a tool to bypass CAPTCHAs? Adriaan's got you. Writeup:
sensepost.com/blog/2025/ca...
Accompanying training/classifying tool capchan
github.com/sensepost/ca...
7 months ago
0
10
5
A look at some of the trickier NoSQL injection scenarios from Reino. With ways of manipulating the query to deal with pre/post conditions successfully
sensepost.com/blog/2025/ge...
(v3 of this skeet because there's no edit button and I need a proof reader)
7 months ago
1
5
3
One part learning some golang, another part having an exe to manipulate LAPS passwords remotely, in this post
@felmoltor.me
introduces goLAPS.
github.com/sensepost/go...
sensepost.com/blog/2025/go...
loading . . .
https://github.com/sensepost/goLAPS
7 months ago
1
4
2
Attacks against AD CS are de rigueur these days, but sometimes a working attack doesn’t work somewhere else, and the inscrutable error messages are no help. Jacques replicated the most infuriating and explains what’s happening under the hood in this post:
sensepost.com/blog/2025/di...
loading . . .
SensePost | Diving into ad cs: exploring some common error messages
Leaders in Information Security
https://sensepost.com/blog/2025/diving-into-ad-cs-exploring-some-common-error-messages/
7 months ago
0
6
7
Want some handy powershell scripts to make your AD auditing life easier, Niels has your back with InvokeADCheck. Includes easy to add module system as well as consistent output and excel exports.
sensepost.com/blog/2025/in...
7 months ago
0
5
4
Instead of relying on RemCom, what if we had a python client to interact with the latest, Microsoft signed PSExec? In this post Aurélien details how he and the team did exactly this, including a tool, some PSExec internals and detection opportunities!
sensepost.com/blog/2025/ps...
8 months ago
0
6
5
👋 Bluesky!
10 months ago
5
12
4
you reached the end!!
feeds!
log in