offethhacker's profile picture.

Ethical Hacker

@offethhacker

Ethical Hacker podał dalej

Today I am happy to release a new blog post about Pointer Authentication (PAC) on Windows ARM64! This post takes a look at the Windows implementation of PAC in both user-mode and kernel-mode. I must say, I have REALLY been enjoying Windows on ARM!! preludesecurity.com/blog/windows-a…


Ethical Hacker podał dalej

Ever been on an SCCM site server and *this* close to a DA pw that you couldn't decrypt for some reason? Check out my new blog looking at encryption in use within SCCM sites configured for High Availability and accompanying tooling to recover passwords: ibm.com/think/x-force/…


Ethical Hacker podał dalej

Something disturbing to be particularly aware of with the F5 incident: While the company didn't call this out in its press release, it obviously thinks that the keys used to sign its BIG-IP software either could have been or actually were compromised. my.f5.com/manage/s/artic…


Ethical Hacker podał dalej

🦵Finding vulnerabilities in modern web apps using Claude Code and OpenAI Codex Blog: semgrep.dev/blog/2025/find… author: @clintgibler, @ermil0v & @rgaucher

mqst_'s tweet image. 🦵Finding vulnerabilities in modern web apps using Claude Code and OpenAI Codex

Blog: semgrep.dev/blog/2025/find…

author: @clintgibler, @ermil0v & @rgaucher
mqst_'s tweet image. 🦵Finding vulnerabilities in modern web apps using Claude Code and OpenAI Codex

Blog: semgrep.dev/blog/2025/find…

author: @clintgibler, @ermil0v & @rgaucher
mqst_'s tweet image. 🦵Finding vulnerabilities in modern web apps using Claude Code and OpenAI Codex

Blog: semgrep.dev/blog/2025/find…

author: @clintgibler, @ermil0v & @rgaucher

Ethical Hacker podał dalej

AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services. By: @0xTib3rius github.com/Tib3rius/AutoR…


Ethical Hacker podał dalej

I just went back to this great post ! dirkjanm.io/phishing-for-m… I love the part where he "elevates" the PRT by adding to it the ngcmfa authentication method! BTW, prtenrich command is not working for me :(


Ethical Hacker podał dalej

Our newest @dfsec_com blog post is live, thanks to @tomitokics from @df_forensics for putting this together :-) blog.dfsec.com/ios/2025/10/14…


Ethical Hacker podał dalej

93 custom queries of 189 in total at the Bloodhound queries site: queries.specterops.io The last Bloodhound update also has a new user interface for the queries menu.

sekurlsa_pw's tweet image. 93 custom queries of 189 in total at the Bloodhound queries site:
queries.specterops.io

The last Bloodhound update also has a new user interface for the queries menu.
sekurlsa_pw's tweet image. 93 custom queries of 189 in total at the Bloodhound queries site:
queries.specterops.io

The last Bloodhound update also has a new user interface for the queries menu.

Ethical Hacker podał dalej

Now freely live streaming on our YouTube channel: #OBTS v8 (Day #1) 😍 youtube.com/channel/UCQycc… 🍎🎥🍿


Ethical Hacker podał dalej

#exploit 1⃣. CVE-2025-32463: LPE to Root via Sudo chroot in Linux - github.com/kh4sh3i/CVE-20… 2⃣. CVE-2025-61984: Exploiting SSH via ProxyCommand - dgl.cx/2025/10/bash-a… 3⃣. CVE-2025-9961: TP-Link CWMP Service RCE - github.com/theByteRay/pub… 4⃣. Exploit development for…


Ethical Hacker podał dalej

My first technical blogpost is out now! Check it out: blog.dfsec.com/ios/2025/10/14… Thanks for the DFF team for their support and to the dfsec people for posting it! Special thanks to @iBSparkes for his assistence :)

tomitokics's tweet image. My first technical blogpost is out now!
Check it out: blog.dfsec.com/ios/2025/10/14…

Thanks for the DFF team for their support and to the dfsec people for posting it!
Special thanks to @iBSparkes for his assistence :)

Our newest @dfsec_com blog post is live, thanks to @tomitokics from @df_forensics for putting this together :-) blog.dfsec.com/ios/2025/10/14…



Ethical Hacker podał dalej

The slidedeck to our talk, Crash One: A Starbucks Story - CVE-2025-24277, with @gergely_kalman from @hexacon_fr and @objective_see #OBTS is available from the link below. It was a macOS vulnerability impacting the crash reporting process where we could achieve LPE and sandbox…


Ethical Hacker podał dalej

I've found the path to AGI: arxiv.org/abs/2510.12269


Ethical Hacker podał dalej

Want to integrate #LLMs and #AI into #OffSec operations? On Oct 21, experts from @OutflankNL and Cobalt Strike are offering a free hands-on training sharing their research on using these technologies to amplify engagements. Spots are limited, register now! ow.ly/yB5r50XaQVy

_CobaltStrike's tweet image. Want to integrate #LLMs and #AI into #OffSec operations? On Oct 21, experts from @OutflankNL and Cobalt Strike are offering a free hands-on training sharing their research on using these technologies to amplify engagements. Spots are limited, register now!
ow.ly/yB5r50XaQVy

Ethical Hacker podał dalej

APK Tool GUI GUI for apktool, signapk, zipalign and baksmali utilities github.com/AndnixSH/APKTo…

androidmalware2's tweet image. APK Tool GUI
GUI for apktool, signapk, zipalign and baksmali utilities
github.com/AndnixSH/APKTo…
androidmalware2's tweet image. APK Tool GUI
GUI for apktool, signapk, zipalign and baksmali utilities
github.com/AndnixSH/APKTo…

Ethical Hacker podał dalej

Using Artificial Intelligence (AI) in Cybersecurity: Using AI for Port Scanning hackers-arise.com/artificial-int…


Ethical Hacker podał dalej

NTLM reflection is dead, long live NTLM reflection! – An in-depth analysis of CVE-2025-33073 - @yaumn_ and @wil_fri3d synacktiv.com/en/publication…


Ethical Hacker podał dalej

Weaponizing WDAC: Killing the Dreams of EDR beierle.win/2024-12-20-Wea… ]-> PoC .NET tool for remotely killing EDR with WDAC ]-> Win Hacktool Krueger Rule ]-> A Nightmare on EDR Street: WDAC's Revenge // Mitigation: - Enforce a WDAC policy through group policy - Follow the…


Ethical Hacker podał dalej

Bypass the uploader and upload any file the attacker wants just by using the null byte %0d%0a Bypass technique used : shell.php%0d%0a.jpg Tip: Always test all null bytes #bugbountytips #bugbounty #CyberSecurity #Developers #RedTeaming #bug #Security


Ethical Hacker podał dalej

👋 Check out this new Microsoft Entra blog post 👇 The Conditional Access Optimization Agent keeps getting better—and making your life easier techcommunity.microsoft.com/t5/microsoft-e…


Loading...

Something went wrong.


Something went wrong.