reconcore – Telegram
reconcore
1.79K subscribers
1.06K photos
157 videos
296 files
2.36K links
#pentest #vulnerability #research #malware #analysis #redteam #blueteam #tools #cve #rce #lpe

#offensivesecurity #methods #technique

The channel does not call for any action.
The posts are taken from public sources.
The @reconcore is not responsible.
Download Telegram
CVE-2025-14611.yaml
3.2 KB
CVE-2025-14611
yeah again
Gladinet CentreStack/Triofox! - Hardcoded AES Key Arbitrary File Read
WASM_Code_Recovery_through_SEV-SNP.pdf
385.8 KB
Lost in the Pages: WebAssembly Code Recovery through SEV-SNP’s Exposed Address Space Dec. 2025.
The platform independence offered through Wasm makes it an attractive solution for many different applications that can run on disparate infrastructures. However, recent work has shown that Wasm binaries are more sensitive to code confidentiality attacks than native binaries. The previous result was obtained for Intel SGX only. We take this one step further, introducing a new Wasm code-confidentiality attack that exploits exposed address-space information in TEEs. Our attack enables the extraction of crucial execution features which, when combined with additional side channels, allows us to with high reliability obtain more than 70% of the code in most cases

#research #sca @reconcore
thc-tips-tricks-hacks-cheat-sheet
THC's favourite Tips, Tricks & Hacks (Cheat Sheet)
A collection of our favourite tricks. Many of those tricks are not from us. We merely collect them.

We show the tricks 'as is' without any explanation why they work. You need to know Linux to understand how and why they work.

#backdoor @reconcore
22
Exploiting Anno 1404
Multiple vulns in Anno 1404: Venice multiplayer mode enable arbitrary code execution through path traversal, DLL hijacking, RPC exposure, and memory corruption, demonstrated on Win10

#vulnerability #hijacking #rpc @reconcore
Google Cloud Shell Container Escape
Cloud Shell Postmortem: In-Depth Analysis of Internal Mechanisms
A successful container escape from Google Cloud Shell was achieved via hotplug hijacking, exploiting kernel hotplug events on a KVM-hosted environment, highlighting the risks posed by kernel vulnerabilities and system configurations

#vulnerability #vm #kernel @reconcore
🔥1
LDIFToBloodHound
A Windows tool that converts LDIF files to BloodHound CE
When performing Active Directory assessments through restricted network paths (SOCKS proxies, port forwarding, etc.), tools like SharpHound or bloodhound-python often fail due to DNS resolution issues or connectivity problems.

ldapsearch works reliably through proxies, but its output (LDIF format) isn't compatible with BloodHound. This tool bridges that gap by:
1. Parsing LDIF files from ldapsearch
2. Decoding binary nTSecurityDenoscriptor attributes using Windows APIs
3. Extracting ACEs (Access Control Entries) for attack path analysis
4. Outputting BloodHound CE v6 compatible JSON files

#ad #pentest #tools #bloodhound @reconcore
MobSF
About Mobile Security Framework

Mobile Security Framework (MobSF) is a security research platform for mobile applications in Android, iOS and Windows Mobile. MobSF can be used for a variety of use cases such as mobile application security, penetration testing, malware analysis, and privacy analysis. The Static Analyzer supports popular mobile app binaries like APK, IPA, APPX and source code. Meanwhile, the Dynamic Analyzer supports both Android and iOS applications and offers a platform for interactive instrumented testing, runtime data and network traffic analysis. MobSF seamlessly integrates with your DevSecOps or CI/CD pipeline, facilitated by REST APIs and CLI tools, enhancing your security workflow with ease.

MobSF only supports APK, APKS, XAPK, AAB, JAR, AAR, SO, IPA, DYLIB, A, ZIP, and APPX files.

#analysis @reconcore
ArkhamMirror
Local-first AI-powered document intelligence platform for investigative journalism

#python #opensource #osint #sqlite #data #visualization #embeddings #llm #localllm @reconcore
Security Advisory: CVE-2025-56157 - Default Credentials in Dify
CVE ID: CVE-2025-56157 Date:12/18/2025 Vendor: LangGenius (Dify)Product: Dify Affected Versions: <= v1.5.1Vulnerability Type: Insecure Permissions / Default Credentials Severity: High (Remote Code Execution, Privilege Escalation, Information Disclosure)

#vulnerability #pe #rce @reconcore
DevOps_Security_and_Automation.pdf
8.2 MB
DevOps Security and Automation:
Building, deploying, and scaling modern software systems
2025.
This book equips readers with the knowledge and practical skills needed to excel in DevOps. From foundational concepts to advanced techniques, it covers the DevOps lifecycle, including version control, CI/CD, IaC, containerization, Kubernetes, observability, security integration, and site reliability engineering. Each chapter includes hands-on exercises using industry-standard tools like Docker, Jenkins, Terraform, and Prometheus

#devops #iac #security #engineering #automation #book @reconcore
ESC1-unPAC (BOF)
A Beacon Object File (BOF) that performs the complete ESC1 attack chain in a single execution: certificate request with arbitrary SAN (+SID), PKINIT authentication, and NT hash extraction via UnPAC-the-hash.

#bof @reconcore
Legendary
Password Cracking: Getting Started with John the Rippe
The Evolution of C2: Centralized to On-Chain
We map how C2 moved from IRC and web panels to DGAs, P2P, fast-flux, abuse of legit cloud platforms, and now smart-contract C2 on public blockchains — with concrete detection playbooks.

What’s inside:
1. The lineage: IRC → HTTP/HTTPS → DGA & P2P → fast-flux → cloud/“legit” platforms → blockchain contracts.
2. Why on-chain C2 matters: immutable contracts, pseudonymous wallets, and payload retrieval over public RPC.
3. Trade-offs: resilience vs latency, and how transparency enables forensics even as takedowns get harder.
4. Practical detection: block JSON-RPC egress to public providers, use TLS/JARM and beacon-timing patterns, and watch for DNS tunneling.

#cybersecurity #malware #c2 #blockchain @reconcore
Cloudflare-Redirector
Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.

#redirector #cloudflare #c2 @reconcore