boflink
Blog post: Boflink: A Linker For Beacon Object Files
#bof #loader @reconcore
Boflink is a tool designed to act as a sort of fill-in for the missing linking stage that comes with the BOF development process. It is a linker that takes unmodified object files generated by a compiler and links them together into a Beacon Object File capable of being loaded by a BOF loader.
Its main goal is to act as a bridge between the BOF development and the BOF loading process to help simplify them.
Blog post: Boflink: A Linker For Beacon Object Files
#bof #loader @reconcore
EDR-GhostLocker
#research #analysis #malware #applocker #development #windowsinternals #edr #bypass #evasion @reconcore
GhostLocker: AppLocker-Based EDR Neutralization
Introduction
After my article on Fairy-Law, where I used kernel mitigations to disable Endpoint Detection & Response (EDR) solutions, diversenok pointed out that IFEO exclusions (Image File Execution Options) were too invasive for third-party applications. This led to a better approach: leveraging the inherent power administrators already possess through AppLocker.
The concept was inspired by diversenok, who highlighted that administrators can legitimately control any software on their systems. From that insight, I developed a technique using AppLocker as a native Windows control mechanism. This research explores the technical implementation of AppLocker for EDR control, comparing it with WDAC and presenting a practical proof-of-concept tool.
#research #analysis #malware #applocker #development #windowsinternals #edr #bypass #evasion @reconcore
update: commix
#commix #python #pentest #injection #tools #web @reconcore
Automated All-in-One OS Command Injection Exploitation Tool.
Usage examples
#commix #python #pentest #injection #tools #web @reconcore
2022-08-25 - New Golang Ransomware Agenda Customizes Attacks.pdf
1.6 MB
This PDF provides a detailed technical analysis of Agenda, a ransomware family written in Golang and designed for highly customized, victim‑specific attacks. The report breaks down how Agenda operators generate tailored payloads for each target—modifying ransom notes, encryption extensions, service‑killing lists, and execution behavior.
#analysis #ransomware #raas #golang @reconcore
The document examines the ransomware’s modular architecture, its ability to reboot systems into Safe Mode, terminate critical enterprise services, and perform multi‑threaded file encryption for maximum impact. It also highlights how Agenda targets healthcare and education organizations across Asia and Africa, leveraging spear‑phishing and compromised credentials to gain initial access.
#analysis #ransomware #raas #golang @reconcore
❤1
Linux Kernel: Exploiting a Netfilter Use-after-Free in kmalloc-cg
#exploitation #kernel #linux @reconcore
#exploitation #kernel #linux @reconcore
Exodus Intelligence
Linux Kernel: Exploiting a Netfilter Use-after-Free in kmalloc-cg - Exodus Intelligence
By Sergi Martinez Overview It’s been a while since our last technical blogpost, so here’s one right on time for the Christmas holidays. We describe a method to exploit a use-after-free in the Linux kernel when objects are allocated in a specific slab cache…
This media is not supported in your browser
VIEW IN TELEGRAM
TokenFlare
Blog post: TokenFlare: Serverless AiTM Phishing in Under 60 Seconds
#cybersecurity #threat #research #technique @reconcore
Serverless AITM Simulation Framework for Entra ID and M365
Blog post: TokenFlare: Serverless AiTM Phishing in Under 60 Seconds
#cybersecurity #threat #research #technique @reconcore
This media is not supported in your browser
VIEW IN TELEGRAM
ms-photos_NTLM_Leak
video #vulnerability #zeroday @reconcore
New 0 day vulnerability allowing to leak NTLM hashes from browsers with one click
leakage of the victim’s NTLMv2-SSP hash to an attacker-controlled server. This issue enables credential exposure and potential relay attacks in enterprise environments, requiring only minimal user interaction (Opening the App). Microsoft didn't recognize the vulnerability and no CVE was issued.
video #vulnerability #zeroday @reconcore
gotatun 哇哦 Mullvad 居然把带 DAITA 和 Multihop 的 BoringTun/WireGuard fork 开源了
Blog post: Announcing GotaTun, the future of WireGuard at Mullvad VPN
Blog post: Announcing GotaTun, the future of WireGuard at Mullvad VPN
GitHub
GitHub - mullvad/gotatun: Userspace WireGuard® Implementation in Rust
Userspace WireGuard® Implementation in Rust. Contribute to mullvad/gotatun development by creating an account on GitHub.
CVE-2025-68260:
rust_binder: fix race condition on death_list
#vulnerability #kernel #driver #rust #reconcore
rust_binder: fix race condition on death_list
First CVE was registered for the new Binder kernel driver written in Rust. The vulnerability is a race condition caused by a list operation in an unsafe code block.
#vulnerability #kernel #driver #rust #reconcore
Offensive-AI-Agent-Prompts
#llm #linux #offensivesecurity @reconcore
Prompts for performing tests on your Kali Linux using Gemini-cli, ChatGPT, DeepSeek, CursorAI, Claude Code, and Copilot.
#llm #linux #offensivesecurity @reconcore
GitHub
GitHub - CyberSecurityUP/Offensive-AI-Agent-Prompts: Prompts for performing tests on your Kali Linux using Gemini-cli, ChatGPT…
Prompts for performing tests on your Kali Linux using Gemini-cli, ChatGPT, DeepSeek, CursorAI, Claude Code, and Copilot. - CyberSecurityUP/Offensive-AI-Agent-Prompts
NeuroSploit
#offensivesecurity #analysis #pentest #llm @reconcore
NeuroSploitv2 is an advanced, AI-powered penetration testing framework designed to automate and augment various aspects of offensive security operations. Leveraging the capabilities of large language models (LLMs).
#offensivesecurity #analysis #pentest #llm @reconcore
GitHub
GitHub - CyberSecurityUP/NeuroSploit: NeuroSploitv2 is an advanced, AI-powered penetration testing framework designed to automate…
NeuroSploitv2 is an advanced, AI-powered penetration testing framework designed to automate and augment various aspects of offensive security operations. Leveraging the capabilities of large langua...
GitHub
GitHub - tyranid/oleviewdotnet: A .net OLE/COM viewer and inspector to merge functionality of OleView and Test Container
A .net OLE/COM viewer and inspector to merge functionality of OleView and Test Container - tyranid/oleviewdotnet
Yet another DCOM object for lateral movement
OleView.NET
DCOM Hardening Toolkit
research #windows #dcom @reconcore
If you’re a penetration tester, you know that lateral movement is becoming increasingly difficult, especially in well-defended environments. One common technique for remote command execution has been the use of DCOM objects
OleView.NET
DCOM Hardening Toolkit
research #windows #dcom @reconcore
❤1
hexstrike-ai
#pentest #mcp #artificial #python #intelligence #linux #ctf #tools #security #cybersecurity @reconcore
HexStrike AI MCP Agents is an advanced MCP server that lets AI agents (Claude, GPT, Copilot, etc.) autonomously run 150+ cybersecurity tools for automated pentesting, vulnerability discovery, bug bounty automation, and security research. Seamlessly bridge LLMs with real-world offensive security capabilities.
www.hexstrike.com/
#pentest #mcp #artificial #python #intelligence #linux #ctf #tools #security #cybersecurity @reconcore
Callback hell: abusing callbacks, tail-calls, and proxy frames to obfuscate the stack
ThreadPoolExecChain PoC
#technique #obfuscation #poc #malware #reversing #analysis @reconcore
ThreadPoolExecChain PoC
The article discusses sophisticated call stack obfuscation techniques - using callbacks, tail calls, and proxy frames - to evade detection in exploitation and malware scenarios
#technique #obfuscation #poc #malware #reversing #analysis @reconcore
klezVirus
Callback hell: abusing callbacks, tail-calls, and proxy frames to obfuscate the stack
Foreword
This media is not supported in your browser
VIEW IN TELEGRAM
immersa Open Source Web-based 3D Presentation Tool
#tools @reconcore
A Web-based 3D Presentation Tool - Create stunning 3D presentations with animated transitions between slides.
#tools @reconcore
SoK_Code_Obfuscation_in_LLM_VD.pdf
2 MB
A Systematic Study of Code Obfuscation Against LLM-based Vulnerability Detection Dec.2025.
#llm #obfuscation #threat #research @reconcore
We provide a structured systematization of obfuscation techniques and evaluate them under a unified framework. Specifically, we categorize existing obfuscation methods into three major classes (layout, data flow, and control flow) covering 11 subcategories and 19 techniques. We implement these techniques across four programming languages (Solidity, C, C++, Python) using a consistent LLM-driven approach, and evaluate their effects on 15 LLMs spanning four model families (DeepSeek, OpenAI, Qwen, LLaMA), as well as on two coding agents (GitHub Copilot and Codex). Our findings reveal both positive and negative impacts of code obfuscation on LLM-based vulnerability detection, highlighting conditions under which obfuscation leads to performance improvements or degradations
#llm #obfuscation #threat #research @reconcore
❤1
CVE-2025-68613 n8n RCE exploit and documentation
CVE-2025-68613: (CVSS 10.0) n8n RCE
vulnerability version:
Query:
#rce #exploit @reconcore
CVE-2025-68613: (CVSS 10.0) n8n RCE
vulnerability version:
— 0.211.0 to 1.120.3
— 1.121.0
Query:
FOFA: app="n8n"
HUNTER : product.name="N8n"
ZoomEye: app="n8n"
#rce #exploit @reconcore
❤1
AMSI-Bypass-via-Page-Guard-Exceptions
Blog post: Patchless AMSI Bypass via Page Guard Exceptions
#research #bypass #asmi #av #shellcode #poc @reconcore
Shellcode and In-PowerShell solution for patching AMSI via Page Guard Exceptions
Blog post: Patchless AMSI Bypass via Page Guard Exceptions
#research #bypass #asmi #av #shellcode #poc @reconcore