offethhacker's profile picture.

Ethical Hacker

@offethhacker

Ethical Hacker 님이 재게시함

Slide: powerofcommunity.net/2025/slide/x-8… Thanks for the fantastic conference @POC_Crew :)

Sweet talk, enjoyed it! Xingyu Jin (@1ce0ear) & Martijn Bogaard (@jmartijnb) – Dirty Ptrace: Exploiting Undocumented Behaviors in Kernel mmap Handlers 🐧🛠️ #POC2025

POC_Crew's tweet image. Sweet talk, enjoyed it!

Xingyu Jin (@1ce0ear) & Martijn Bogaard (@jmartijnb) – Dirty Ptrace: Exploiting Undocumented Behaviors in Kernel mmap Handlers 🐧🛠️

#POC2025


Ethical Hacker 님이 재게시함

Direct kernel object manipulation (DKOM) attacks on ETW providers. TL;DR: This blog post analyze how attackers, with elevated privileges, can use their access to stage Windows Kernel post-exploitation capabilities. IBM Post: ibm.com/think/x-force/…

5mukx's tweet image. Direct kernel object manipulation (DKOM) attacks on ETW providers.

TL;DR: This blog post analyze how attackers, with elevated privileges, can use their access to stage Windows Kernel post-exploitation capabilities.

IBM Post: ibm.com/think/x-force/…

Ethical Hacker 님이 재게시함

stillepost - a proof-of-concept demonstrating how an implant can route its HTTP traffic through a Chromium-based browser by leveraging the Chrome DevTools Protocol github.com/dis0rder0x00/s…


Ethical Hacker 님이 재게시함

How to Proxy your C2s HTTP-Traffic through Chromium x90x90.dev/posts/stillepo…


Ethical Hacker 님이 재게시함

The Silent Leak: How One Line of Go Drained Memory Across Thousands of Goroutines #golang engineering.harness.io/the-silent-lea…

golangch's tweet image. The Silent Leak: How One Line of Go Drained Memory Across Thousands of Goroutines
#golang

engineering.harness.io/the-silent-lea…

Ethical Hacker 님이 재게시함

Today I share my first ever blogpost and give u another tool drop. I'll show you how to delegate your C2s HTTP-traffic to chromium-based browsers, using the Chrome DevTools Protocol. Blog: x90x90.dev/posts/stillepo… GitHub Repo with library for you to use: github.com/dis0rder0x00/s…


Ethical Hacker 님이 재게시함

Ethical Hacker 님이 재게시함

Various routes attackers are exploiting React2Shell (CVE-2025-55182) via (from least to most exploited): /_next/data/ /_next/refresh/ /_next/redirect/ /_next/turbopack/flight /_next/webpack-hmr /_next/server-actions /_react/flight /_next/flight /


Ethical Hacker 님이 재게시함

ETW internals for security research and forensics blog.trailofbits.com/2023/11/22/etw… #WindowsSecurity #ETW #Forensics

raashidbhatt's tweet image. ETW internals for security research and forensics 

blog.trailofbits.com/2023/11/22/etw…

#WindowsSecurity #ETW #Forensics

Ethical Hacker 님이 재게시함

Backdooring Managed Identities via Azure API Management dazesecurity.io/blog/apimMIVuln


Ethical Hacker 님이 재게시함

any WAF bypass gurus in my circles? this is your chance, $50k for bypassing Vercel WAF #bugbountytips #bugbounty

We introduced a dedicated HackerOne program for Vercel WAF bypasses for CVE-2025-55182 / react2shell Critical bypass: $50K hackerone.com/vercel_platfor…

cramforce's tweet image. We introduced a dedicated HackerOne program for Vercel WAF bypasses for CVE-2025-55182 / react2shell
Critical bypass: $50K
hackerone.com/vercel_platfor…


Ethical Hacker 님이 재게시함

12/6/2025: Every week I share a curated list of red team-specific jobs (or similar/adjacent) that caught my attention or were shared with me by others in the community. My goal is to help job hunters in the offensive security space find a red team-specific role. 🏛 Company +…

nickvangilder's tweet image. 12/6/2025: Every week I share a curated list of red team-specific jobs (or similar/adjacent) that caught my attention or were shared with me by others in the community. My goal is to help job hunters in the offensive security space find a red team-specific role. 

🏛 Company +…

Ethical Hacker 님이 재게시함

In memory react4shell webshell. 🤌Stolen from github.com/Malayke/Next.j… and dropped into go-exploit framework.

Junior_Baines's tweet image. In memory react4shell webshell. 🤌Stolen from github.com/Malayke/Next.j… and dropped into go-exploit framework.

Ethical Hacker 님이 재게시함

EvilMist - a collection of scripts and utilities designed to support cloud penetration testing & red teaming. ✅Identify misconfigurations ✅Assess privilege-escalation paths ✅Simulate attack techniques github.com/Logisek/EvilMi…


Ethical Hacker 님이 재게시함

The MSec Operations - @MSecOps - Discord channel provides vetted Cyber Security experts the opportunity to exchange TTPs, to ask questions and to get answers! 😎 More than 280 verified people already joined. discord.gg/JRxXmy8P4B

discord.com

Tritt dem MSec Operations-Discord-Server bei!

Sieh dir die MSec Operations-Community auf Discord an – häng mit 394 anderen Mitgliedern ab und freu dich über kostenlose Sprach- und Textchats.


Ethical Hacker 님이 재게시함

Pushed a new update to github.com/assetnote/reac… -- it now scans for the RCE payload via reflection. Use the --waf-bypass flag to bypass WAFs, works well for Cloudflare/AWS. Other WAFs might need tinkering with the payload, depending on whether they don't have a max context limit.


Ethical Hacker 님이 재게시함

Exploit Development: Fuzzing with American Fuzzy Lop++ (AFL++) to Find Zero-Day Vulnerabilities First step to building your own exploit: hackers-arise.com/exploit-develo… @three_cube

_aircorridor's tweet image. Exploit Development: Fuzzing with American Fuzzy Lop++ (AFL++) to Find Zero-Day Vulnerabilities

First step to building your own exploit:
hackers-arise.com/exploit-develo…
@three_cube

Ethical Hacker 님이 재게시함

The Chinese advanced persistent threat (APT) group “Silver Fox” has used false flags, such as Cyrillic characters, to impersonate a Russian threat group | reliaquest.com/blog/threat-sp… @ReliaQuestTR


Ethical Hacker 님이 재게시함

🚨 Critical Apache Tika flaw (CVE-2025-66516) just dropped — CVSS 10.0. A single fake PDF can trigger an XXE attack, letting hackers read server files or run code. 🔗 Read ↓ thehackernews.com/2025/12/critic… Update to v3.2.2 now.


Loading...

Something went wrong.


Something went wrong.