AMSI-Bypass-via-Page-Guard-Exceptions
Blog post: Patchless AMSI Bypass via Page Guard Exceptions
#research #bypass #asmi #av #shellcode #poc @reconcore
Shellcode and In-PowerShell solution for patching AMSI via Page Guard Exceptions
Blog post: Patchless AMSI Bypass via Page Guard Exceptions
#research #bypass #asmi #av #shellcode #poc @reconcore
Happy Hacking!
CVE-2025-7771: Exploiting a Signed Kernel Driver in a Red Team Operation
#kaspersky #kernel #redteam #microsoft @reconcore
CVE-2025-7771: Exploiting a Signed Kernel Driver in a Red Team Operation
#kaspersky #kernel #redteam #microsoft @reconcore
EVA
#offensivesecurity #python #linux #cli #automation #intelligence #pentest #ctf #postexploitation #pe #vulnerability #assessment #llm #cybersecurity @reconcore
AI-assisted penetration testing agent that enhances offensive security workflows by providing structured attack guidance, contextual analysis, and multi-backend AI integration.
#offensivesecurity #python #linux #cli #automation #intelligence #pentest #ctf #postexploitation #pe #vulnerability #assessment #llm #cybersecurity @reconcore
Nezha
Research: The Monitoring Tool That’s Also a Perfect RAT
Wiki: Nezha Monitoring V1
Open-source, lightweight, and easy-to-use server monitoring and operation tool
#cybersecurity #tools #system #monitoring @reconcore
Self-hosted, lightweight server and website monitoring and O&M tool
Research: The Monitoring Tool That’s Also a Perfect RAT
A legitimate open-source monitoring tool (post-exploitation RAT). Compatible with mainstream systems, including Linux, Windows, macOS, OpenWRT, and Synology. The agent provides SYSTEM/root level access, file management, and an interactive web terminal. VirusTotal shows 0/72 detections because it isn’t malware, it’s legitimate software pointed at attacker infrastructure.
Installation is silent. Detection only occurs when attackers execute commands through the agent.
Wiki: Nezha Monitoring V1
Open-source, lightweight, and easy-to-use server monitoring and operation tool
#cybersecurity #tools #system #monitoring @reconcore
DumpChromeSecrets
#injection @reconcore
Extract data from modern Chrome versions, including refresh tokens, cookies, saved credentials, autofill data, browsing history, and bookmarks
#injection @reconcore
This media is not supported in your browser
VIEW IN TELEGRAM
CVE-2025-38001
#linux #poc @reconcore
CVE-2025-38001: Linux HFSC Eltree Use-After-Free - Debian 12 PoC
syst3mfailure.io/rbtree-family-drama
#linux #poc @reconcore
🎄1
Wyrm
#tools #rust #c2 #pentest #redteam #purpleteam #adversary #emulation #simulation @reconcore
The dragon in the dark. A red team post exploitation framework for testing security controls during red team assessments.
#tools #rust #c2 #pentest #redteam #purpleteam #adversary #emulation #simulation @reconcore
Backdoor code found in Trust Wallet browser extension, causing theft of tens of millions of dollars in assets
A new backdoor code was added to version 2.68 of the Trust Wallet cryptocurrency wallet's browser extension, which sends users' mnemonic phrases to attacker servers. Due to the automatic update mechanism, the impact was widespread. On Christmas Day, December 25th, attackers began transferring funds, and according to current estimates, more than tens of millions of dollars in assets have been stolen. The latest version 2.69 has now removed the backdoor code.
Security_Metrics_Workbook.pdf
4.3 MB
The Security Metrics Workbook:
A practical guide to building a metrics program that actually matters 2025.
#book #threat #modelling @reconcore
A practical guide to building a metrics program that actually matters 2025.
This workbook walks you through the exact processes Iʼve found most useful for figuring out what to measure in a security program and why it matters. Itʼs built to cut through the noise and give you a clear, repeatable approach. I know your time is valuable. Thatʼs why this workbook is practical, not theoretical. The goal is to help you define metrics that drive real decisions and show a return on the effort you put in
#book #threat #modelling @reconcore
DoH_Data_Exfiltration.pdf
1.8 MB
Evasion-Resilient Detection of DNS-over-HTTPS Data Exfiltration: A Practical Evaluation 2025.
#research #tools #netsec #cybersecurity @reconcore
This dissertation to explore the darker side of the protocol, how its privacy features can be exploited by attackers for data exfiltration, and what security challenges this poses for defenders
#research #tools #netsec #cybersecurity @reconcore
Tangled
#security #phishing #redteam @reconcore
Open-source offensive security platform for conducting phishing campaigns that weaponizes iCalendar automatic event processing.
tangled.gitbook.io/tangled-docs/
#security #phishing #redteam @reconcore
OWASP Top 10 2025
The Ten Most Critical Web Application Security Risks
Introducing the OWASP Top 10:2025
#websec #owasp @reconcore
The Ten Most Critical Web Application Security Risks
Introducing the OWASP Top 10:2025
A01:2025 - Broken Access Control
A02:2025 - Security Misconfiguration
A03:2025 - Software Supply Chain Failures
A04:2025 - Cryptographic Failures
A05:2025 - Injection
A06:2025 - Insecure Design
A07:2025 - Authentication Failures
A08:2025 - Software or Data Integrity Failures
A09:2025 - Security Logging & Alerting Failures
A10:2025 - Mishandling of Exceptional Conditions
#websec #owasp @reconcore
❤2
sleep-from-scratch
#linux #kernel @reconcore
This is a completely standalone sleep implementation for x86_64 Linux that depends only on the Linux kernel.
#linux #kernel @reconcore
YouTube
Rewriting "sleep" from scratch - no libraries, not even libc - only syscalls and some assembly magic
Let's rewrite "sleep" program absolutely from scrath - not even with libc. Only the compiler, the kernel, and a magic of inline assembly!
Let me know if this kind of long-form video is something you like.
Sources:
the code: https://github.com/valignatev/sleep…
Let me know if this kind of long-form video is something you like.
Sources:
the code: https://github.com/valignatev/sleep…