Low Level CO 🇨🇴 – Telegram
Low Level CO 🇨🇴
119 subscribers
174 photos
10 videos
7 files
530 links
Canal enfocado en la investigación de técnicas de seguridad ofensivas avanzadas.

Windows internals
Malware Development
Exploits & Reversing
Low level programming
kernel mode & user mode
Syscall & Hypercalls
Ring 0, 3, -1
Firmware
Download Telegram
Fun-reliable side-channels for cross-container communication

#linux_hacking #kernel #linux_kernel
@ZwLowLevel


https://h4x0r.org/funreliable/
Please open Telegram to view this post
VIEW IN TELEGRAM
CVE-2025-54110

Windows Kernel Integer Overflow Privilege Escalation

#exploit #windows_kernel
@ZwLowLevel
🎰 Carding and Black Box Attacks: How Today’s Most Common ATM Hack Works

#carding #black_box_attack #fraud #jackpotting
@ZwLowLevel
https://hackmag.com/security/carding
Please open Telegram to view this post
VIEW IN TELEGRAM
👀💻
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from 1N73LL1G3NC3
This media is not supported in your browser
VIEW IN TELEGRAM
Fortinet 0day

An auth bypass + path traversal in Fortinet FortiWeb to create new administrative users on exposed devices without requiring authentication.

Blog: https://www.rapid7.com/blog/post/etr-critical-vulnerability-in-fortinet-fortiweb-exploited-in-the-wild/

Tweet: https://x.com/defusedcyber/status/1975242250373517373?s=46

Dork:
ZoomEye Dork: app="FortiWeb"
HUNTER: product.name="FortiWeb"
Shodan: http.noscript:FortiWeb

Affected versions: below 8.0.2
🔥1
Forwarded from Golden Byte
🎮POC for PS5 kernel vulnerability in fsc2h_ctrl syscall

#kernel_exploit #ps5 #binary_exploitation

@ZwLowLevel
https://github.com/MeisterLone/no_ctrl
Please open Telegram to view this post
VIEW IN TELEGRAM