
bruh
@cppbruh
OSCP, OSCE, OSEE
Może Ci się spodobać
🔥 SharkStealer - a Golang infostealer - uses the BNB Smart Chain (BSC) Testnet to resolve its C2 communication channels ("EtherHiding"). vmray.com/analyses/shark… 🔍 In a nutshell: - EtherHiding is a technique where threat actors store part of their infection chain (code or…




Here's my latest research. I decided to dive in to exploring Polymorphic PIC shellcode and walk the reader through the process of creating their own loader via x64 assembly code and Python. Thanks for your support and feedback as always. Enjoy! g3tsyst3m.com/shellcode/pic/…
Inside x64 SEH on Windows - A deep dive into modern Windows structured exception handling #ReverseEngineering #WindowsInternals blog.elmo.sg/posts/structur…

❄️[New Video] - The Most Overlooked Bug in Web Apps: HTTP Request Smuggling (Deep Dive) (P.S. Only Real Wannabe Hackers can Watch it) youtu.be/6Zck1649AP0
![medusa_0xf's tweet image. ❄️[New Video] - The Most Overlooked Bug in Web Apps: HTTP Request Smuggling (Deep Dive)
(P.S. Only Real Wannabe Hackers can Watch it)
youtu.be/6Zck1649AP0](https://pbs.twimg.com/media/G3ZtDsgWIAAdq_U.jpg)
Find hidden Endpoint - by: Sina Yeganeh ✨ -raw.githubusercontent.com/sinaayeganeh/F… #cybersec #infosec #bugbountytips
Fun little IOC in impacket-smbserver's Negotiate Protocol Response 🙃

Exploitation of CVE-2025–9961: authenticated remote code execution via the CWMP binary on TP-Link AX10 and AX1500 blog.byteray.co.uk/exploiting-zer… #infosec


🌐 We Hacked the npm Supply Chain of 36 Million Weekly Installs Blog: landh.tech/blog/20251003-… author: @0xLupin



Chrome V8 ndays exploits github.com/anvbis/chrome_… Writeups: anvbis.au
The X64 Stack offensivecraft.wordpress.com/2023/02/11/the… #x64 #assembly #security #reverseengineering

Exploring Windows Defender Detection History - a file containing key forensic information like the threat file's hash, file path, initiating process, associated users, and detection/remediation timestamps. Team at Orange Defense reverse engineered the file format and internals.…

this was meant to be a simple debugging tool, but ended up being a full barebones, concurrent RFC1928 (SOCKS5) server. unnecessarily fast, very simple. gophers that are interested in learning SOCKS5 protocol may find this useful (hopefully someone does) gist.github.com/yunginnanet/c8…

Rest in Peace to @yunginnanet a/k/a Kayos. I'm at a total loss of words. I have no idea what to say. When vx-underground first started him, and his friends with ThugCrowd, were the first to offer us hosting when no one else would. He helped us before anyone gave a shit about the…


🧩 Chrome Exploitation 101: The Architecture Blog: opzero.ru/en/press/101-c… author: @opzero_en



ShellExec using msgbox.exe => in my C2 Facility. Bypassing EDR's. a cool new way = ) Actually tg is just an sample, you can use calendar, teams or whatever that can communicate with apis. to uplaod & exec your custom agents !

CVE-2025-55680 cldflt.sys EoP exploited in TyphoonPWN 2025 A direct bypass of @tiraniddo 's bug from 2020 (project-zero.issues.chromium.org/issues/42451188) unpatched for 5 years

Digging into Windows Defender Detection History (WDDH) orangecyberdefense.com/global/blog/cy…

Valve Anti-Cheat (VAC) reverse engineering codeneverdies.github.io/posts/gh-2/ Credits @codeneverdies #cybersecurity

As expected the MacBook Pro M5 brings #MTE to #MacOS2601 - you can learn about the details in our MacOS and iOS security kernel internals training next month antid0te-sg.com/blog/25-11-17-…

United States Trendy
- 1. #DWTS 12.8K posts
- 2. Chet 13.4K posts
- 3. Rockets 38.8K posts
- 4. Whitney 8,631 posts
- 5. Robert 118K posts
- 6. Shai 16.8K posts
- 7. #NBAonNBC 1,989 posts
- 8. Alix 3,280 posts
- 9. Reed Sheppard 1,705 posts
- 10. Sengun 4,738 posts
- 11. Amen Thompson 3,953 posts
- 12. #WWENXT 8,553 posts
- 13. Kevin Durant 14.7K posts
- 14. Tari Eason 1,373 posts
- 15. #ThunderUp 3,507 posts
- 16. Brad Marchand 6,599 posts
- 17. Ajay Mitchell N/A
- 18. Steven Adams 2,025 posts
- 19. Russ 33.8K posts
- 20. Reggie Miller N/A
Something went wrong.
Something went wrong.