Please open Telegram to view this post
VIEW IN TELEGRAM
🤩1
https://github.com/WafflesExploits/hide-payload-in-images
Please open Telegram to view this post
VIEW IN TELEGRAM
GitHub
GitHub - andrecrafts/hide-payload-in-images: A project that demonstrates embedding shellcode payloads into image files (like PNGs)…
A project that demonstrates embedding shellcode payloads into image files (like PNGs) using Python and extracting them using C/C++. Payloads can be retrieved directly from the file on disk or from ...
https://www.hackers-arise.com/post/new-no-click-critical-vulnerability-in-microsoft-windows-cve-2025-21298
Please open Telegram to view this post
VIEW IN TELEGRAM
👍1😁1🤡1
https://techcrunch.com/2025/03/21/russian-zero-day-seller-is-offering-up-to-4-million-for-telegram-exploits/
Please open Telegram to view this post
VIEW IN TELEGRAM
TechCrunch
Russian zero-day seller is offering up to $4 million for Telegram exploits | TechCrunch
Two sources in the zero-day industry say Operation Zero's prices for exploits against the popular messaging app Telegram will depend on different factors.
👍2
Please open Telegram to view this post
VIEW IN TELEGRAM
👍1🔥1
https://cybersecuritynews.com/ramigpt-gain-root-access/
Please open Telegram to view this post
VIEW IN TELEGRAM
Cyber Security News
RamiGPT – AI Tool To Escalate Privilege & Gain Root Access Within a Minute
A new AI-driven offensive security tool, RamiGPT, is known for its ability to autonomously escalate privileges and gain root access to vulnerable systems in under a minute.
👍2
www.mobile-hacker.com/2025/03/31/feberis-pro-the-ultimate-4-in-1-expansion-board-for-flipper
Please open Telegram to view this post
VIEW IN TELEGRAM
Mobile Hacker
Feberis Pro: The Ultimate 4-in-1 Expansion Board for Flipper Zero
In a previous blog post, I introduced Feberis, a versatile expansion board that enhanced the capabilities of the Flipper Zero by offering additional communication protocols. Now, I am excited to dive into the newly released Feberis Pro, a next-generation…
The attacker exploited a vulnerability in Oracle Access Manager to breach Oracle-hosted servers. The vulnerability is tracked as CVE-2021-35587 and was assigned a critical severity score 9.8/10. It was patched in mid-January 2022, raising questions over whether Oracle kept its own servers vulnerable to a flaw it fixed more than three years ago.
CrowdStrike is investigating the incident along FBI.
https://www.techradar.com/pro/security/oracle-quietly-confirms-public-cloud-data-breach-customer-data-stolen
Please open Telegram to view this post
VIEW IN TELEGRAM
TechRadar
Oracle quietly confirms public cloud data breach, customer data stolen
Oracle has sent out breach notifications
🔥3 1
https://tinted-hollyhock-92d.notion.site/EPICOR-HCM-Unauthenticated-Blind-SQL-Injection-CVE-2025-22953-170f1fdee211803988d1c9255a8cb904
Please open Telegram to view this post
VIEW IN TELEGRAM
tinted-hollyhock-92d on Notion
EPICOR HCM Unauthenticated Blind SQL Injection CVE-2025-22953 | Notion
[Update – Patch Released by Epicor]
❤🔥2🦄2 2
waybackurls target | grep -E '\bhttps?://\S+?=\S+' | grep -E '\.php|\.asp' | sort -u | sed 's/\(=[^&]*\)/=/g' | tee urls.txt | sort -u -o urls.txt && cat urls.txt | xargs -I{} sqlmap --technique=T --batch -u "{}"Credits: Zlatan H
Please open Telegram to view this post
VIEW IN TELEGRAM
https://timsh.org/tracking-myself-down-through-in-app-ads/
https://timsh.org/everyone-knows-your-location-part-2-try-it-yourself/
analyse-ad-traffic l: A guide + python notebook that helps to collect, analyse and visualise requests sent by a mobile device while using some app.
https://github.com/tim-sha256/analyse-ad-traffic
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥4🤡1
Please open Telegram to view this post
VIEW IN TELEGRAM
YouTube
Hacking a Microprocessor - Reverse Engineer shows you how it's done
*Become a Patreon* https://www.patreon.com/RECESSIM
*$10 Perplexity Discount* https://perplexity.ai/pro?referral_code=Q8T83K9C
Learn how Reverse Engineers extract secrets from locked microchips. It's not as hard as you might think!
*0x01 Team* https://0x01team.com…
*$10 Perplexity Discount* https://perplexity.ai/pro?referral_code=Q8T83K9C
Learn how Reverse Engineers extract secrets from locked microchips. It's not as hard as you might think!
*0x01 Team* https://0x01team.com…
🔥4😱2 2
Server MS-TNAP Authentication Bypass [RCE 0day]
A critical 0-click remote authentication bypass vulnerability in Microsoft Telnet Server that allows attackers to gain access as any user, including Administrator, without requiring valid credentials. The vulnerability exploits a misconfiguration in the NTLM Authentication processes of the Telnet MS-TNAP extension allowing remote unauthenticated attackers to bypass authentication completely.
Unconfirmed code
https://github.com/hackerhouse-opensource/hfwintelnet
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥2👍1👌1 1
Security researchers Thomas Imbert, Vincent Dehors, and David Bérard found and responsibly disclosed recently a remote code execution (RCE) vulnerability in Tesla's VCSEC ECU.
Technical overview: By manipulating the response sent from the Tire Pressure Monitoring System (TPMS), an attacker can trigger an integer overflow and execute code in the context of the VCSEC module. This gives the attacker the ability to send arbitrary messages to the vehicle's CAN bus.More details: "0-click RCE on Tesla Model 3 through TPMS Sensors" [PDF]:
https://www.synacktiv.com/sites/default/files/2024-10/hexacon_0_click_rce_on_tesla_model_3_through_tpms_sensors_light.pdf
Advisory: https://www.zerodayinitiative.com/advisories/ZDI-25-265/
Under Pressure: Exploring a Zero-Click RCE Vulnerability in Tesla's TPMS:
https://vicone.com/blog/under-pressure-exploring-a-zero-click-rce-vulnerability-in-teslas-tpms
Please open Telegram to view this post
VIEW IN TELEGRAM
👍3🆒1 1
An out-of-bounds write vulnerability has been reported in macOS. The vulnerability is due to the lack of proper validation of “lutAToBType” and “lutBToAType” tag types.
A remote attacker could exploit this vulnerability by enticing a victim to open a crafted file. A successful attack may result in code execution on the victim's machine in the context of the running process.https://www.zerodayinitiative.com/blog/2025/5/7/cve-2024-44236-remote-code-execution-vulnerability-in-apple-macos
Please open Telegram to view this post
VIEW IN TELEGRAM
Zero Day Initiative
Zero Day Initiative — CVE-2024-44236: Remote Code Execution vulnerability in Apple macOS
In this excerpt of a Trend Vulnerability Research Service vulnerability report, Nikolai Skliarenko and Yazhi Wang of the Trend™ Research Team detail a recently patched code execution vulnerability in the Apple macOS operating system. This bug was originally…
👍1
https://neodyme.io/en/blog/html_renderer_to_rce/
Please open Telegram to view this post
VIEW IN TELEGRAM
neodyme.io
HTML to PDF Renderer: A tale of local file access and shellcode execution
In a recent engagement, we found an HTML to PDF converter API endpoint that allowed us to list local directories and files on a remote server. One of the PDF files we created, revealed that the converter was using a .NET renderer framework based on Chromium…
This media is not supported in your browser
VIEW IN TELEGRAM
Simulated scenario where a PowerShell noscript is used to silently bypass a CrowdStrike Falcon endpoint and establish a reverse shell all while the sensor is running
Objective: Demonstrate how threat actors may abuse trusted noscripting environments and highlight the importance of layered defence and behavioural detection.
Source: Linkedin Bibek SapkotaPlease open Telegram to view this post
VIEW IN TELEGRAM
👻5👍3 2