reconcore – Telegram
reconcore
1.79K subscribers
1.06K photos
157 videos
296 files
2.36K links
#pentest #vulnerability #research #malware #analysis #redteam #blueteam #tools #cve #rce #lpe

#offensivesecurity #methods #technique

The channel does not call for any action.
The posts are taken from public sources.
The @reconcore is not responsible.
Download Telegram
Security Advisory: CVE-2025-56157 - Default Credentials in Dify
CVE ID: CVE-2025-56157 Date:12/18/2025 Vendor: LangGenius (Dify)Product: Dify Affected Versions: <= v1.5.1Vulnerability Type: Insecure Permissions / Default Credentials Severity: High (Remote Code Execution, Privilege Escalation, Information Disclosure)

#vulnerability #pe #rce @reconcore
DevOps_Security_and_Automation.pdf
8.2 MB
DevOps Security and Automation:
Building, deploying, and scaling modern software systems
2025.
This book equips readers with the knowledge and practical skills needed to excel in DevOps. From foundational concepts to advanced techniques, it covers the DevOps lifecycle, including version control, CI/CD, IaC, containerization, Kubernetes, observability, security integration, and site reliability engineering. Each chapter includes hands-on exercises using industry-standard tools like Docker, Jenkins, Terraform, and Prometheus

#devops #iac #security #engineering #automation #book @reconcore
ESC1-unPAC (BOF)
A Beacon Object File (BOF) that performs the complete ESC1 attack chain in a single execution: certificate request with arbitrary SAN (+SID), PKINIT authentication, and NT hash extraction via UnPAC-the-hash.

#bof @reconcore
Legendary
Password Cracking: Getting Started with John the Rippe
The Evolution of C2: Centralized to On-Chain
We map how C2 moved from IRC and web panels to DGAs, P2P, fast-flux, abuse of legit cloud platforms, and now smart-contract C2 on public blockchains — with concrete detection playbooks.

What’s inside:
1. The lineage: IRC → HTTP/HTTPS → DGA & P2P → fast-flux → cloud/“legit” platforms → blockchain contracts.
2. Why on-chain C2 matters: immutable contracts, pseudonymous wallets, and payload retrieval over public RPC.
3. Trade-offs: resilience vs latency, and how transparency enables forensics even as takedowns get harder.
4. Practical detection: block JSON-RPC egress to public providers, use TLS/JARM and beacon-timing patterns, and watch for DNS tunneling.

#cybersecurity #malware #c2 #blockchain @reconcore
Cloudflare-Redirector
Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.

#redirector #cloudflare #c2 @reconcore
CVE-2025-37164: Unauthenticated RCE in HPE OneView.
Unauthenticated RCE (10.0 CVSS) vulnerability, in Hewlett Packard Enterprise (HPE) OneView via an unauthenticated REST endpoint called executeCommand. All versions below 11.00 are vulnerable (so long as the vendor supplied hotfix has not been applied), however some VM product versions do not enable the vulnerable "ID Pools" endpoint, and are not exploitable.

Blog post: https://attackerkb.com/topics/ixWdbDvjwX/cve-2025-37164/rapid7-analysis
Metasploit Module:
exploit/linux/http/hpe_oneview_rce

ZoomEye Dork:
app="HPE OneView"

P.S. When testing HPE OneView version 6.60, you can elevate to root by exploiting CVE-2021-4034. It's unknown if that will work against more recent OneView appliance versions.

#vulnerability #analysis @reconcore
This media is not supported in your browser
VIEW IN TELEGRAM
Moonwalk++
A PoC implementation of an enahnced version of StackMoonwalk, which combines its original technique to remove the caller from the call stack, with a memory self-encryption routine, using ROP to both desynchronize unwinding from control flow and simultaneously encrypt the executing shellcode to hide it from inpection.

Blog Post: Malware Just Got Its Free Passes Back!. #poc #malware #injection @reconcore
Team-History-Sync
A Burp Suite extension for real-time sharing of HTTP traffic between team members with user-based highlighting.

#burpsuite @reconcore
Tor_Pentest_Report.pdf
1.2 MB
Tor Project Pentest - Code audit and network health report 2025.
This document outlines the results of a pentest and whitebox security review conducted against a number of Tor Project items. Test Targets: Network Metrics, Visualization Stack, Relay & Network Health Tools, Exit Relay Scanning, Bandwidth Measurement, Tor Core Code Changes

#netsec #appsec #analytics #offensivesecurity @reconcore
GitHubDeviceCodePhishing
A tool that provides a web interface to easily perform GitHub Device Code phishing on red team engagements.

Blog Post: Introducing: GitHub Device Code Phishing
#tools #phishing @reconcore
I Stand Alone
Godsmack
❤‍🔥43🔥2
This media is not supported in your browser
VIEW IN TELEGRAM
boflink
Boflink is a tool designed to act as a sort of fill-in for the missing linking stage that comes with the BOF development process. It is a linker that takes unmodified object files generated by a compiler and links them together into a Beacon Object File capable of being loaded by a BOF loader.

Its main goal is to act as a bridge between the BOF development and the BOF loading process to help simplify them.

Blog post: Boflink: A Linker For Beacon Object Files
#bof #loader @reconcore