Cloudflare-Redirector
#redirector #cloudflare #c2 @reconcore
Just another C2 Redirector using CloudFlare. Support multiple C2 and multiple domains. Support for websocket listener.
#redirector #cloudflare #c2 @reconcore
CVE-2025-37164: Unauthenticated RCE in HPE OneView.
Blog post: https://attackerkb.com/topics/ixWdbDvjwX/cve-2025-37164/rapid7-analysis
Metasploit Module:
ZoomEye Dork:
#vulnerability #analysis @reconcore
Unauthenticated RCE (10.0 CVSS) vulnerability, in Hewlett Packard Enterprise (HPE) OneView via an unauthenticated REST endpoint called executeCommand. All versions below 11.00 are vulnerable (so long as the vendor supplied hotfix has not been applied), however some VM product versions do not enable the vulnerable "ID Pools" endpoint, and are not exploitable.
Blog post: https://attackerkb.com/topics/ixWdbDvjwX/cve-2025-37164/rapid7-analysis
Metasploit Module:
exploit/linux/http/hpe_oneview_rce
ZoomEye Dork:
app="HPE OneView"
P.S. When testing HPE OneView version 6.60, you can elevate to root by exploiting CVE-2021-4034. It's unknown if that will work against more recent OneView appliance versions.
#vulnerability #analysis @reconcore
This media is not supported in your browser
VIEW IN TELEGRAM
Moonwalk++
Blog Post: Malware Just Got Its Free Passes Back!. #poc #malware #injection @reconcore
A PoC implementation of an enahnced version of StackMoonwalk, which combines its original technique to remove the caller from the call stack, with a memory self-encryption routine, using ROP to both desynchronize unwinding from control flow and simultaneously encrypt the executing shellcode to hide it from inpection.
Blog Post: Malware Just Got Its Free Passes Back!. #poc #malware #injection @reconcore
Team-History-Sync
#burpsuite @reconcore
A Burp Suite extension for real-time sharing of HTTP traffic between team members with user-based highlighting.
#burpsuite @reconcore
Tor_Pentest_Report.pdf
1.2 MB
Tor Project Pentest - Code audit and network health report 2025.
#netsec #appsec #analytics #offensivesecurity @reconcore
This document outlines the results of a pentest and whitebox security review conducted against a number of Tor Project items. Test Targets: Network Metrics, Visualization Stack, Relay & Network Health Tools, Exit Relay Scanning, Bandwidth Measurement, Tor Core Code Changes
#netsec #appsec #analytics #offensivesecurity @reconcore
Zero-Click Exploits
#zeroclick #malware #exploit @reconcore
Explore zero-click exploits — stealthy, interactionless chains that evade defenses. Case studies reveal patch gaps and the need for stronger validation.
#zeroclick #malware #exploit @reconcore
netlas.io
Zero-Click Exploits - Netlas Blog
Explore zero-click exploits — stealthy, interactionless chains that evade defenses. Case studies reveal patch gaps and the need for stronger validation.
GitHubDeviceCodePhishing
Blog Post: Introducing: GitHub Device Code Phishing
#tools #phishing @reconcore
A tool that provides a web interface to easily perform GitHub Device Code phishing on red team engagements.
Blog Post: Introducing: GitHub Device Code Phishing
#tools #phishing @reconcore
BOF_ExecuteAssembly
#bof #technique #asm @reconcore
Beacon Object File for Cobalt Strike that executes .NET assemblies in beacon with evasion techniques.
#bof #technique #asm @reconcore
GitHub
GitHub - NtDallas/BOF_ExecuteAssembly: Beacon Object File for Cobalt Strike that executes .NET assemblies in beacon with evasion…
Beacon Object File for Cobalt Strike that executes .NET assemblies in beacon with evasion techniques. - GitHub - NtDallas/BOF_ExecuteAssembly: Beacon Object File for Cobalt Strike that executes .N...
boflink
Blog post: Boflink: A Linker For Beacon Object Files
#bof #loader @reconcore
Boflink is a tool designed to act as a sort of fill-in for the missing linking stage that comes with the BOF development process. It is a linker that takes unmodified object files generated by a compiler and links them together into a Beacon Object File capable of being loaded by a BOF loader.
Its main goal is to act as a bridge between the BOF development and the BOF loading process to help simplify them.
Blog post: Boflink: A Linker For Beacon Object Files
#bof #loader @reconcore
EDR-GhostLocker
#research #analysis #malware #applocker #development #windowsinternals #edr #bypass #evasion @reconcore
GhostLocker: AppLocker-Based EDR Neutralization
Introduction
After my article on Fairy-Law, where I used kernel mitigations to disable Endpoint Detection & Response (EDR) solutions, diversenok pointed out that IFEO exclusions (Image File Execution Options) were too invasive for third-party applications. This led to a better approach: leveraging the inherent power administrators already possess through AppLocker.
The concept was inspired by diversenok, who highlighted that administrators can legitimately control any software on their systems. From that insight, I developed a technique using AppLocker as a native Windows control mechanism. This research explores the technical implementation of AppLocker for EDR control, comparing it with WDAC and presenting a practical proof-of-concept tool.
#research #analysis #malware #applocker #development #windowsinternals #edr #bypass #evasion @reconcore
update: commix
#commix #python #pentest #injection #tools #web @reconcore
Automated All-in-One OS Command Injection Exploitation Tool.
Usage examples
#commix #python #pentest #injection #tools #web @reconcore
2022-08-25 - New Golang Ransomware Agenda Customizes Attacks.pdf
1.6 MB
This PDF provides a detailed technical analysis of Agenda, a ransomware family written in Golang and designed for highly customized, victim‑specific attacks. The report breaks down how Agenda operators generate tailored payloads for each target—modifying ransom notes, encryption extensions, service‑killing lists, and execution behavior.
#analysis #ransomware #raas #golang @reconcore
The document examines the ransomware’s modular architecture, its ability to reboot systems into Safe Mode, terminate critical enterprise services, and perform multi‑threaded file encryption for maximum impact. It also highlights how Agenda targets healthcare and education organizations across Asia and Africa, leveraging spear‑phishing and compromised credentials to gain initial access.
#analysis #ransomware #raas #golang @reconcore
❤1
Linux Kernel: Exploiting a Netfilter Use-after-Free in kmalloc-cg
#exploitation #kernel #linux @reconcore
#exploitation #kernel #linux @reconcore
Exodus Intelligence
Linux Kernel: Exploiting a Netfilter Use-after-Free in kmalloc-cg - Exodus Intelligence
By Sergi Martinez Overview It’s been a while since our last technical blogpost, so here’s one right on time for the Christmas holidays. We describe a method to exploit a use-after-free in the Linux kernel when objects are allocated in a specific slab cache…
This media is not supported in your browser
VIEW IN TELEGRAM
TokenFlare
Blog post: TokenFlare: Serverless AiTM Phishing in Under 60 Seconds
#cybersecurity #threat #research #technique @reconcore
Serverless AITM Simulation Framework for Entra ID and M365
Blog post: TokenFlare: Serverless AiTM Phishing in Under 60 Seconds
#cybersecurity #threat #research #technique @reconcore