Forwarded from ARVIN
0day speedrun? OpenFlagr <= 1.1.18 Authentication Bypass
https://dreyand.rs/code%20review/golang/2026/01/03/0day-speedrun-openflagr-less-1118-authentication-bypass?x
https://dreyand.rs/code%20review/golang/2026/01/03/0day-speedrun-openflagr-less-1118-authentication-bypass?x
DreyAnd’s Web Security Blog
0day speedrun? OpenFlagr <= 1.1.18 Authentication Bypass
A detailed 0day speedrun uncovering an authentication bypass in OpenFlagr ≤ 1.1.18. Root cause analysis, exploitation path, impact assessment, and remediation.
Sliver C2 — Comprehensive Cyber Threat Intelligence Brief
#cyber_threat_intelligence
#cti
#malware_analysis
@ZwLowLevel
0Xadroit
Sliver C2 — Comprehensive Cyber Threat Intelligence Brief
A comprehensive threat intelligence analysis of Sliver C2 framework, including MITRE ATT&CK mapping, indicators of compromise, detection rules, and defensive recommendations for security teams.
Sleak Crypter
Sleak Crypter is a simple obfuscate tool that allows you to encrypt and obfuscate your files.
Sleak Crypter is a simple obfuscate tool that allows you to encrypt and obfuscate your files.
#malware_development
#malwaredev
#maldev
@ZwLowLevel
FsquirtCPLPoC
Fsquirt.exe is a windows binary attempts to load a Control Panel applet (CPL) called bthprops.cpl from its current working directory. When bthprops.cpl is present alongside fsquirt.exe, the binary loads it and executes a MessageBox from DLLMain.#malware_development
#malwaredev
#maldev
@ZwLowLevel
https://github.com/mhaskar/FsquirtCPLPoC
Android Kernel Exploit CVE-2025-38352
1. In-the-wild Android Kernel Vulnerability Analysis + PoC
2. Extending The Race Window Without a Kernel Patch
3. Uncovering Chronomaly
1. In-the-wild Android Kernel Vulnerability Analysis + PoC
2. Extending The Race Window Without a Kernel Patch
3. Uncovering Chronomaly
#android_internals
#exploit_development
@ZwLowLevel
faith2dxy.xyz
CVE-2025-38352 (Part 1) - In-the-wild Android Kernel Vulnerability Analysis + PoC
Part 1 (This blog post) - In-the-wild Android Kernel Vulnerability Analysis + PoC Part 2 - Extending The Race Window Without a Kernel Patch CVE-2025-38352 was a…
Forwarded from Order of Six Angles
deep dive into an electronic detection and response system deployed by China’s security agencies
https://netaskari.substack.com/p/chinas-guardian-of-secrets
https://netaskari.substack.com/p/chinas-guardian-of-secrets
Substack
China's guardian of secrets: 保密管理系统
NetAskari got exclusive access to internal software used by Chinese security agencies to control data leakage from the internal government network.
Time(less) LAPS: Securing persistent anonymous access to local administrator passwords
The
The
RecoveryMode mechanism in Windows LAPS allows local administrator passwords to be decrypted using remote ‘decryptors’. #windows_internals
#windows_security
#reverse_engineering
#reversing
@ZwLowLevel
HackMag
Time(less) LAPS: Securing persistent anonymous access to local administrator passwords
Tech magazine for cybersecurity specialists
Golden Byte
Time(less) LAPS: Securing persistent anonymous access to local administrator passwords The RecoveryMode mechanism in Windows LAPS allows local administrator passwords to be decrypted using remote ‘decryptors’. #windows_internals #windows_security #rev…
Docs
Windows LAPS overview
Get an overview of Windows Local Administrator Password Solution (Windows LAPS), including key scenarios and setup and management options.
Low Level CO 🇨🇴 pinned «Time(less) LAPS: Securing persistent anonymous access to local administrator passwords The RecoveryMode mechanism in Windows LAPS allows local administrator passwords to be decrypted using remote ‘decryptors’. #windows_internals #windows_security #rev…»
JavaScript, MSBuild, and the Blockchain: Anatomy of the NeoShadow npm Supply-Chain Attack
#malware_analysis
@ZwLowLevel
www.aikido.dev
NeoShadow npm Supply-Chain Attack: JavaScript, MSBuild & Blockchain
A deep technical analysis of the NeoShadow npm supply-chain attack, detailing how JavaScript, MSBuild, and blockchain techniques were combined to compromise developers.
Fibratus
Adversary tradecraft detection, protection, and hunting
Adversary tradecraft detection, protection, and hunting
#cyber_threat_intelligence
#cti
#malware_analysis
@ZwLowLevel