cppbruh's profile picture. OSCP, OSCE, OSEE

bruh

@cppbruh

OSCP, OSCE, OSEE

bruh gönderiyi yeniden yayınladı

macOS LPE via the .localized directory · theevilbit blog - theevilbit.github.io/posts/localize…


bruh gönderiyi yeniden yayınladı

Looking to get into Exploit Development? I posted a beginner friendly walk through video tutorial for a pwnable.tw challenge that you can find here: youtu.be/TQv2WvXQ1HM?si…


bruh gönderiyi yeniden yayınladı

Leveraging Fake DLLs, Guard Pages, and VEH for Enhanced Detection redops.at/en/blog/edr-an…

5mukx's tweet image. Leveraging Fake DLLs, Guard Pages, and VEH for Enhanced Detection

redops.at/en/blog/edr-an…
5mukx's tweet image. Leveraging Fake DLLs, Guard Pages, and VEH for Enhanced Detection

redops.at/en/blog/edr-an…

bruh gönderiyi yeniden yayınladı

Tutorial LD_PRELOAD TLS cert bypass for embedded security research by @f0rw4rd_at f0rw4rd.github.io/posts/tls-nove… #infosec

0xor0ne's tweet image. Tutorial LD_PRELOAD TLS cert bypass for embedded security research by @f0rw4rd_at

f0rw4rd.github.io/posts/tls-nove…

#infosec
0xor0ne's tweet image. Tutorial LD_PRELOAD TLS cert bypass for embedded security research by @f0rw4rd_at

f0rw4rd.github.io/posts/tls-nove…

#infosec

bruh gönderiyi yeniden yayınladı

🐀 Cracking ValleyRAT: From Builder Secrets to Kernel Rootkits CP<r> reveals: 🔍 Full #ValleyRAT/#Winos teardown 🧩 Leaked builder + artifacts mapped to all plugins 🛠️ Win11-loadable kernel rootkits 💥 Stealthy driver install, APC injection, AV/EDR wipe research.checkpoint.com/2025/cracking-…


bruh gönderiyi yeniden yayınladı

Today, we’re releasing watchTowr Labs’ @chudyPB’s BlackHat .NET research, owning Barracuda, Ivanti and more solutions. Enjoy the read as Piotr explains a new .NET Framework primitive, used to achieve pre- and post-auth RCE on numerous enterprise appliances.…


bruh gönderiyi yeniden yayınladı

Can't use you favorite impacket tools in FAST armored domains ? Fear no more ! BreakFAST is a small utility to demonstrate how Kerberos FAST armoring can be bypassed without local access to LSASS! Check out the repo: github.com/monsieurPale/B…

Damag3dRoot's tweet image. Can&apos;t use you favorite impacket tools in FAST armored domains ? Fear no more ! BreakFAST is a small utility to demonstrate how Kerberos FAST armoring can be bypassed without local access to LSASS! Check out the repo:

github.com/monsieurPale/B…

bruh gönderiyi yeniden yayınladı

#React2Shell Someone asked which WAFs this bypass technique works on. AWS CloudFront be one answer. AWS recommends a rule that, with a bit of analysis, shows you can bypass using UTF-16 encoding. Here’s an official AWS link for more details: aws.amazon.com/security/secur…

pyn3rd's tweet image. #React2Shell Someone asked which WAFs this bypass technique works on. AWS CloudFront be one answer. AWS recommends a rule that, with a bit of analysis, shows you can bypass using UTF-16 encoding. 

Here’s an official AWS link for more details: 
aws.amazon.com/security/secur…
pyn3rd's tweet image. #React2Shell Someone asked which WAFs this bypass technique works on. AWS CloudFront be one answer. AWS recommends a rule that, with a bit of analysis, shows you can bypass using UTF-16 encoding. 

Here’s an official AWS link for more details: 
aws.amazon.com/security/secur…
pyn3rd's tweet image. #React2Shell Someone asked which WAFs this bypass technique works on. AWS CloudFront be one answer. AWS recommends a rule that, with a bit of analysis, shows you can bypass using UTF-16 encoding. 

Here’s an official AWS link for more details: 
aws.amazon.com/security/secur…
pyn3rd's tweet image. #React2Shell Someone asked which WAFs this bypass technique works on. AWS CloudFront be one answer. AWS recommends a rule that, with a bit of analysis, shows you can bypass using UTF-16 encoding. 

Here’s an official AWS link for more details: 
aws.amazon.com/security/secur…

#CVE-2025-55182 #React2Shell Let me walk you through the technical path of the WAF bypass. When a request is sent as multipart/form-data, Next.js hands the raw body stream to Busboy. The bypass comes from Busboy’s charset logic: it cleanly accepts UTF‑16LE (and legacy UCS‑2) and…

pyn3rd's tweet image. #CVE-2025-55182 #React2Shell 
Let me walk you through the technical path of the WAF bypass.
When a request is sent as multipart/form-data, Next.js hands the raw body stream to Busboy. The bypass comes from Busboy’s charset logic: it cleanly accepts UTF‑16LE (and legacy UCS‑2) and…
pyn3rd's tweet image. #CVE-2025-55182 #React2Shell 
Let me walk you through the technical path of the WAF bypass.
When a request is sent as multipart/form-data, Next.js hands the raw body stream to Busboy. The bypass comes from Busboy’s charset logic: it cleanly accepts UTF‑16LE (and legacy UCS‑2) and…
pyn3rd's tweet image. #CVE-2025-55182 #React2Shell 
Let me walk you through the technical path of the WAF bypass.
When a request is sent as multipart/form-data, Next.js hands the raw body stream to Busboy. The bypass comes from Busboy’s charset logic: it cleanly accepts UTF‑16LE (and legacy UCS‑2) and…
pyn3rd's tweet image. #CVE-2025-55182 #React2Shell 
Let me walk you through the technical path of the WAF bypass.
When a request is sent as multipart/form-data, Next.js hands the raw body stream to Busboy. The bypass comes from Busboy’s charset logic: it cleanly accepts UTF‑16LE (and legacy UCS‑2) and…


bruh gönderiyi yeniden yayınladı

Part 9 of the ARM64 series breaks down Off-by-One overflow issues and how they can affect your software: 8ksec.io/arm64-reversin… Black Friday promotion ends today. Get 15% off our Mobile and AI Security training at checkout with the code blackfriday15 👉 academy.8ksec.io

8kSec's tweet image. Part 9 of the ARM64 series breaks down Off-by-One overflow issues and how they can affect your software:
8ksec.io/arm64-reversin… 

Black Friday promotion ends today. Get 15% off our Mobile and AI Security training at checkout with the code blackfriday15 👉 academy.8ksec.io…

bruh gönderiyi yeniden yayınladı

Evade behavioral analysis by executing malicious code within trusted Microsoft call stacks, patchless hooking library IAT/EAT github.com/hwbp/LazyHook


bruh gönderiyi yeniden yayınladı

Just published a new write-up! 🥳🎉 #bugbounty #bugbountytips medium.com/bugbountywrite…


bruh gönderiyi yeniden yayınladı

Assembly code visualizer asm.diveintosystems.org

vivekgalatage's tweet image. Assembly code visualizer

asm.diveintosystems.org

bruh gönderiyi yeniden yayınladı

Digging through Rust to find Gold: Extracting Secrets from Rust Malware binarydefense.com/resources/blog…

5mukx's tweet image. Digging through Rust to find Gold: Extracting Secrets from Rust Malware

binarydefense.com/resources/blog…

bruh gönderiyi yeniden yayınladı

Phantom Keylogger - an advanced, stealth-enabled keystroke and visual intelligence gathering system github.com/MattiaAlessi/p…


bruh gönderiyi yeniden yayınladı

🚀 It’s official — my new book is live on Amazon: MAoS – Malware Analysis on Steroids This book is not like the others. It’s built on years of raw, hands-on research, reverse engineering sessions at 3 AM, and real-world incident response cases. Inside, you’ll find full A–Z…

MalFuzzer's tweet image. 🚀 It’s official — my new book is live on Amazon:
MAoS – Malware Analysis on Steroids

This book is not like the others. It’s built on years of raw, hands-on research, reverse engineering sessions at 3 AM, and real-world incident response cases.

Inside, you’ll find full A–Z…

bruh gönderiyi yeniden yayınladı

Explains DNS at varying complexity levels github.com/devanshbatham/…

tom_doerr's tweet image. Explains DNS at varying complexity levels

github.com/devanshbatham/…

bruh gönderiyi yeniden yayınladı

New Evil-WinRM version (3.8). Awesome work of @CyberVaca_ and others involved. Thanks to all who contributed. Cool changes including Kerberos stuff and more! Ruby gem is available now "gem install evil-winrm" to update it as always.😈 github.com/Hackplayers/ev… #evilwinrm #hacking


bruh gönderiyi yeniden yayınladı

Abusing delegation with Impacket hunio.org/posts/security…


Loading...

Something went wrong.


Something went wrong.