cmhacks's profile picture. 29a Labs http://hackstory.net/29A // Security Researcher @ ZDI

MrSandman

@cmhacks

29a Labs http://hackstory.net/29A // Security Researcher @ ZDI

MrSandman 已轉發

Se ha filtrado todo el código fuente de la web de la Apple App Store. Se olvidaron de desactivar los Source Maps y es totalmente legible, con comentarios incluidos: github.com/rxliuli/apps.a…

midudev's tweet image. Se ha filtrado todo el código fuente de la web de la Apple App Store. Se olvidaron de desactivar los Source Maps y es totalmente legible, con comentarios incluidos:
github.com/rxliuli/apps.a…

MrSandman 已轉發

The security guarantees of modern TEE offerings by Intel and AMD can be broken cheaply and easily, by building a memory interposition device that allows attackers to physically inspect all memory traffic inside a DDR5 server. Source: tee.fail

此推文已無法使用。

MrSandman 已轉發

🚨Cyber Alert ‼️ 🇪🇸Spain - Spain citizens: 34 million records for sale The threat actor "Cayenne22" claims to be selling 34 million records of Spanish citizens' data, including full name, DNI, email, phone number and IBAN. Threat class: Cybercrime Observed: Oct 31, 2025…

H4ckmanac's tweet image. 🚨Cyber Alert ‼️

🇪🇸Spain - Spain citizens: 34 million records for sale 

The threat actor "Cayenne22" claims to be selling 34 million records of Spanish citizens' data, including full name, DNI, email, phone number and IBAN.

Threat class: Cybercrime
Observed: Oct 31, 2025…

MrSandman 已轉發

Cell phone roaming and how to hack it: SoR systems and bugs in the Diameter protocol. ☎️🌐📱💣💰 More details on: LinkedIn: linkedin.com/posts/dlaskov_… Substack: it4sec.substack.com/p/cell-phone-r…

it4sec's tweet image. Cell phone roaming and how to hack it: SoR systems and bugs in the Diameter protocol. ☎️🌐📱💣💰

More details on:
LinkedIn: linkedin.com/posts/dlaskov_…
Substack: it4sec.substack.com/p/cell-phone-r…

MrSandman 已轉發

Tools such as PsExec.py from Impacket are usually flagged for lateral movement due to the pre-built service executable that is dropped on the remote system. However, some vendors also flag Impacket based on its behaviour. With RustPack, you can easily create…


MrSandman 已轉發

While the exploit craddles from hawktrace for CVE-2025-59287 did not work in our testbed, github.com/jiansiting/CVE… actually did. Be aware, include SCCM when the Software Update Point role is in use, as this requires WSUS.


MrSandman 已轉發

Google research created a dataset with rainbow tables for NetNTLMv1 with the 1122334455667788 challenge. research.google/resources/data… Dataset is available for download at: ▪️console.cloud.google.com/storage/browse… [Login required] ▪️gs://net-ntlmv1-tables

sekurlsa_pw's tweet image. Google research created a dataset with rainbow tables for NetNTLMv1 with the 1122334455667788 challenge. 
research.google/resources/data…
Dataset is available for download at:
▪️console.cloud.google.com/storage/browse… [Login required]
▪️gs://net-ntlmv1-tables

MrSandman 已轉發

Hacking modern ARM processors: Practical side-channel attacks on Cortex-A72 to recover AES. 👨🏻‍💻🧲👂📟🔗 More details on: LinkedIn: linkedin.com/posts/dlaskov_… Substack: it4sec.substack.com/p/hacking-mode…

it4sec's tweet image. Hacking modern ARM processors: Practical side-channel attacks on Cortex-A72 to recover AES. 👨🏻‍💻🧲👂📟🔗

More details on:
LinkedIn: linkedin.com/posts/dlaskov_…
Substack: it4sec.substack.com/p/hacking-mode…

MrSandman 已轉發

The Emulator's Gambit: Executing Code from Non-Executable Memory redops.at/en/blog/the-em…

5mukx's tweet image. The Emulator's Gambit: Executing Code from Non-Executable Memory

redops.at/en/blog/the-em…

MrSandman 已轉發

Writing unix viruses in asm is hard, but it's a bunch of fun. I'm pleased to share that my first ever virus is now able to target PIE ELF64 binaries. Next I'd like to encrypt the payload and make it only execute at midnight :)))

0xDeLuks's tweet image. Writing unix viruses in asm is hard, but it's a bunch of fun. I'm pleased to share that my first ever virus is now able to target PIE ELF64 binaries.  Next I'd like to encrypt the payload and make it only execute at midnight :)))

MrSandman 已轉發

☠ Lenovo CVE-2025-8061 Exploit PoC and write-up for shell popping against LnvMSRIO.sys (3.1.0.36) driver. Try: github.com/symeonp/Lenovo…

IntCyberDigest's tweet image. ☠ Lenovo CVE-2025-8061 Exploit  

PoC and write-up for shell popping against LnvMSRIO.sys (3.1.0.36) driver.

Try: github.com/symeonp/Lenovo…

MrSandman 已轉發

An exciting milestone for AI in science: Our C2S-Scale 27B foundation model, built with @Yale and based on Gemma, generated a novel hypothesis about cancer cellular behavior, which scientists experimentally validated in living cells.  With more preclinical and clinical tests,…


MrSandman 已轉發

Tunnel all your traffic over Websocket or HTTP2 - Bypass firewalls/DPI - Static binary available github.com/erebe/wstunnel


MrSandman 已轉發

❗️🐭 Your gaming mouse might be eavesdropping due to a critical vulnerability named Mic-E-Mouse.

IntCyberDigest's tweet image. ❗️🐭 Your gaming mouse might be eavesdropping due to a critical vulnerability named Mic-E-Mouse.
IntCyberDigest's tweet image. ❗️🐭 Your gaming mouse might be eavesdropping due to a critical vulnerability named Mic-E-Mouse.
IntCyberDigest's tweet image. ❗️🐭 Your gaming mouse might be eavesdropping due to a critical vulnerability named Mic-E-Mouse.
IntCyberDigest's tweet image. ❗️🐭 Your gaming mouse might be eavesdropping due to a critical vulnerability named Mic-E-Mouse.

MrSandman 已轉發

CVE-2025-32463: Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option. PoC: github.com/kh4sh3i/CVE-20… CVSS: 9.3 Affected Versions: ▪️Vulnerable: sudo 1.9.14 – 1.9.17…

DarkWebInformer's tweet image. CVE-2025-32463: Sudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option.

PoC: github.com/kh4sh3i/CVE-20…

CVSS: 9.3

Affected Versions:

▪️Vulnerable: sudo 1.9.14 – 1.9.17…

MrSandman 已轉發

‼️ Iranian nation-state APT CharmingKitten exposed on GitHub. Exposure includes: - Official APT internal network documents - Employee photos - Attack reports - Translation documents - Internal chat files

IntCyberDigest's tweet image. ‼️ Iranian nation-state APT CharmingKitten exposed on GitHub.

Exposure includes:
- Official APT internal network documents
- Employee photos
- Attack reports
- Translation documents
- Internal chat files

MrSandman 已轉發

🚨Cyber Alert ‼️ 🇪🇸 Spain - Forocoches The threat actor known as Cargo is leaking a database allegedly belonging to Forocoches. He stated that this collection has been passed around many members of private groups, warning that some accounts may no longer work. discover…

H4ckmanac's tweet image. 🚨Cyber Alert ‼️ 

🇪🇸 Spain - Forocoches 

The threat actor known as Cargo is leaking a database allegedly belonging to Forocoches. 

He stated that this collection has been passed around many members of private groups, warning that some accounts may no longer work.

discover…

MrSandman 已轉發

🚨Cyber Alert ‼️ 🇪🇸Spain – A threat actor going by the alias N4t0x has leaked a dataset allegedly containing personal data of Spanish politicians, law enforcement officials, intelligence officers, and their families. The attacker claims to have used a tool called SpainData,…

H4ckmanac's tweet image. 🚨Cyber Alert ‼️

🇪🇸Spain – A threat actor going by the alias N4t0x has leaked a dataset allegedly containing personal data of Spanish politicians, law enforcement officials, intelligence officers, and their families.

The attacker claims to have used a tool called SpainData,…

Loading...

Something went wrong.


Something went wrong.