GitHub
GitHub - tyranid/oleviewdotnet: A .net OLE/COM viewer and inspector to merge functionality of OleView and Test Container
A .net OLE/COM viewer and inspector to merge functionality of OleView and Test Container - tyranid/oleviewdotnet
Yet another DCOM object for lateral movement
OleView.NET
DCOM Hardening Toolkit
research #windows #dcom @reconcore
If you’re a penetration tester, you know that lateral movement is becoming increasingly difficult, especially in well-defended environments. One common technique for remote command execution has been the use of DCOM objects
OleView.NET
DCOM Hardening Toolkit
research #windows #dcom @reconcore
hexstrike-ai
#pentest #mcp #artificial #python #intelligence #linux #ctf #tools #security #cybersecurity @reconcore
HexStrike AI MCP Agents is an advanced MCP server that lets AI agents (Claude, GPT, Copilot, etc.) autonomously run 150+ cybersecurity tools for automated pentesting, vulnerability discovery, bug bounty automation, and security research. Seamlessly bridge LLMs with real-world offensive security capabilities.
www.hexstrike.com/
#pentest #mcp #artificial #python #intelligence #linux #ctf #tools #security #cybersecurity @reconcore
Cobalt Strike Crack 4.11.1
& Arsenal Kit
& Arsenal Kit
Cobalt Strike 4.11.1 is out now. This release introduces a new Sleepmask, a new process injection technique, new predefined obfuscation parameters for Beacon, asynchronous BOF files, and Beacon with DNS-over-HTTPS (DoH) support. We've also reworked the Beacon reflective loader and made numerous usability improvements.
Callback hell: abusing callbacks, tail-calls, and proxy frames to obfuscate the stack
ThreadPoolExecChain PoC
#technique #obfuscation #poc #malware #reversing #analysis @reconcore
ThreadPoolExecChain PoC
The article discusses sophisticated call stack obfuscation techniques - using callbacks, tail calls, and proxy frames - to evade detection in exploitation and malware scenarios
#technique #obfuscation #poc #malware #reversing #analysis @reconcore
klezVirus
Callback hell: abusing callbacks, tail-calls, and proxy frames to obfuscate the stack
Foreword
This media is not supported in your browser
VIEW IN TELEGRAM
immersa Open Source Web-based 3D Presentation Tool
#tools @reconcore
A Web-based 3D Presentation Tool - Create stunning 3D presentations with animated transitions between slides.
#tools @reconcore
SoK_Code_Obfuscation_in_LLM_VD.pdf
2 MB
A Systematic Study of Code Obfuscation Against LLM-based Vulnerability Detection Dec.2025.
#llm #obfuscation #threat #research @reconcore
We provide a structured systematization of obfuscation techniques and evaluate them under a unified framework. Specifically, we categorize existing obfuscation methods into three major classes (layout, data flow, and control flow) covering 11 subcategories and 19 techniques. We implement these techniques across four programming languages (Solidity, C, C++, Python) using a consistent LLM-driven approach, and evaluate their effects on 15 LLMs spanning four model families (DeepSeek, OpenAI, Qwen, LLaMA), as well as on two coding agents (GitHub Copilot and Codex). Our findings reveal both positive and negative impacts of code obfuscation on LLM-based vulnerability detection, highlighting conditions under which obfuscation leads to performance improvements or degradations
#llm #obfuscation #threat #research @reconcore
❤1
CVE-2025-68613 n8n RCE exploit and documentation
CVE-2025-68613: (CVSS 10.0) n8n RCE
vulnerability version:
Query:
#rce #exploit @reconcore
CVE-2025-68613: (CVSS 10.0) n8n RCE
vulnerability version:
— 0.211.0 to 1.120.3
— 1.121.0
Query:
FOFA: app="n8n"
HUNTER : product.name="N8n"
ZoomEye: app="n8n"
#rce #exploit @reconcore
AMSI-Bypass-via-Page-Guard-Exceptions
Blog post: Patchless AMSI Bypass via Page Guard Exceptions
#research #bypass #asmi #av #shellcode #poc @reconcore
Shellcode and In-PowerShell solution for patching AMSI via Page Guard Exceptions
Blog post: Patchless AMSI Bypass via Page Guard Exceptions
#research #bypass #asmi #av #shellcode #poc @reconcore
Happy Hacking!
CVE-2025-7771: Exploiting a Signed Kernel Driver in a Red Team Operation
#kaspersky #kernel #redteam #microsoft @reconcore
CVE-2025-7771: Exploiting a Signed Kernel Driver in a Red Team Operation
#kaspersky #kernel #redteam #microsoft @reconcore
EVA
#offensivesecurity #python #linux #cli #automation #intelligence #pentest #ctf #postexploitation #pe #vulnerability #assessment #llm #cybersecurity @reconcore
AI-assisted penetration testing agent that enhances offensive security workflows by providing structured attack guidance, contextual analysis, and multi-backend AI integration.
#offensivesecurity #python #linux #cli #automation #intelligence #pentest #ctf #postexploitation #pe #vulnerability #assessment #llm #cybersecurity @reconcore
Nezha
Research: The Monitoring Tool That’s Also a Perfect RAT
Wiki: Nezha Monitoring V1
Open-source, lightweight, and easy-to-use server monitoring and operation tool
#cybersecurity #tools #system #monitoring @reconcore
Self-hosted, lightweight server and website monitoring and O&M tool
Research: The Monitoring Tool That’s Also a Perfect RAT
A legitimate open-source monitoring tool (post-exploitation RAT). Compatible with mainstream systems, including Linux, Windows, macOS, OpenWRT, and Synology. The agent provides SYSTEM/root level access, file management, and an interactive web terminal. VirusTotal shows 0/72 detections because it isn’t malware, it’s legitimate software pointed at attacker infrastructure.
Installation is silent. Detection only occurs when attackers execute commands through the agent.
Wiki: Nezha Monitoring V1
Open-source, lightweight, and easy-to-use server monitoring and operation tool
#cybersecurity #tools #system #monitoring @reconcore
DumpChromeSecrets
#injection @reconcore
Extract data from modern Chrome versions, including refresh tokens, cookies, saved credentials, autofill data, browsing history, and bookmarks
#injection @reconcore
This media is not supported in your browser
VIEW IN TELEGRAM
CVE-2025-38001
#linux #poc @reconcore
CVE-2025-38001: Linux HFSC Eltree Use-After-Free - Debian 12 PoC
syst3mfailure.io/rbtree-family-drama
#linux #poc @reconcore
🎄1
Wyrm
#tools #rust #c2 #pentest #redteam #purpleteam #adversary #emulation #simulation @reconcore
The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.
#tools #rust #c2 #pentest #redteam #purpleteam #adversary #emulation #simulation @reconcore