home.social

#offensivesecurity โ€” Public Fediverse posts

Live and recent posts from across the Fediverse tagged #offensivesecurity, aggregated by home.social.

  1. World Password Day. The finding that should sting: roughly 60% of credential issues from real pentests this year came from factory defaults still running. FTP, RDP, Redis, Telnet. No brute-forcing needed.

    Dragos Sandu, Product Manager at Pentest-Tools.com, shared the data with IT Security Guru. Full piece: itsecurityguru.org/2026/05/07/

    #offensivesecurity #penetrationtesting

  2. World Password Day. The finding that should sting: roughly 60% of credential issues from real pentests this year came from factory defaults still running. FTP, RDP, Redis, Telnet. No brute-forcing needed.

    Dragos Sandu, Product Manager at Pentest-Tools.com, shared the data with IT Security Guru. Full piece: itsecurityguru.org/2026/05/07/

    #offensivesecurity #penetrationtesting

  3. World Password Day. The finding that should sting: roughly 60% of credential issues from real pentests this year came from factory defaults still running. FTP, RDP, Redis, Telnet. No brute-forcing needed.

    Dragos Sandu, Product Manager at Pentest-Tools.com, shared the data with IT Security Guru. Full piece: itsecurityguru.org/2026/05/07/

    #offensivesecurity #penetrationtesting

  4. World Password Day. The finding that should sting: roughly 60% of credential issues from real pentests this year came from factory defaults still running. FTP, RDP, Redis, Telnet. No brute-forcing needed.

    Dragos Sandu, Product Manager at Pentest-Tools.com, shared the data with IT Security Guru. Full piece: itsecurityguru.org/2026/05/07/

    #offensivesecurity #penetrationtesting

  5. World Password Day. The finding that should sting: roughly 60% of credential issues from real pentests this year came from factory defaults still running. FTP, RDP, Redis, Telnet. No brute-forcing needed.

    Dragos Sandu, Product Manager at Pentest-Tools.com, shared the data with IT Security Guru. Full piece: itsecurityguru.org/2026/05/07/

    #offensivesecurity #penetrationtesting

  6. ๐Ÿ“ฐ Accenture Invests in AI-Powered Offensive Security Platform XBOW

    Accenture invests in AI-powered offensive security firm XBOW. ๐Ÿค– The partnership aims to bring autonomous, continuous penetration testing to clients, fighting AI-driven threats with AI-driven defense. #CyberSecurity #AI #OffensiveSecurity #Accenture

    ๐Ÿ”— cyber.netsecops.io

  7. Viele denken, der รœbergang vom Penetrationstest ins Red Teaming sei eine logische, graduelle Weiterentwicklung. In der Praxis zeigt sich schnell: Es ist ein echter Perspektivwechsel.
    Die grรถรŸten Unterschiede liegen nicht in den Tools, sondern im Mindset:
    ๐Ÿ”น OPSEC first โ€“ Jede Aktion wird hinterfragt: Welche Spuren hinterlasse ich? Wie reagiert der Verteidiger?
    ๐Ÿ”น Realismus vor Geschwindigkeit โ€“ Es geht nicht darum, mรถglichst schnell ans Ziel zu kommen, sondern einen echten Angreifer abzubilden.
    ๐Ÿ”น Kontinuierliches Lernen โ€“ Standard-Tools werden zunehmend erkannt. Wer sich nicht weiterentwickelt, wird sichtbar.
    ๐Ÿ”น Fehler als Lernmoment โ€“ Der Moment, in dem man erkannt wird, verรคndert die eigene Denkweise nachhaltig.
    In unserem neuen Blogartikel beschreibt Marcel Heisel, wie wir neue Mitarbeitende auf genau diesen Wechsel vorbereiten โ€“ und was dabei wirklich den Unterschied macht.
    ๐Ÿ‘‰ research.hisolutions.com/2026/
    #RedTeaming #Pentesting #CyberSecurity #OffensiveSecurity #OPSEC #InfoSec #ActiveDirectory

  8. Most tools added AI and called it a feature. We kept asking whether it actually makes results more reliable.

    Session two of Office Hours is recorded. Jan covers the ML classifier, the authentication layer, and the MCP integration that won't act without your explicit go-ahead.

    45 minutes. Q&A included.

    Recording: youtube.com/watch?v=abGruzf2pPk

    #penetrationtesting #offensivesecurity #vulnerabilitymanagement

  9. Most tools added AI and called it a feature. We kept asking whether it actually makes results more reliable.

    Session two of Office Hours is recorded. Jan covers the ML classifier, the authentication layer, and the MCP integration that won't act without your explicit go-ahead.

    45 minutes. Q&A included.

    Recording: youtube.com/watch?v=abGruzf2pPk

    #penetrationtesting #offensivesecurity #vulnerabilitymanagement

  10. Most tools added AI and called it a feature. We kept asking whether it actually makes results more reliable.

    Session two of Office Hours is recorded. Jan covers the ML classifier, the authentication layer, and the MCP integration that won't act without your explicit go-ahead.

    45 minutes. Q&A included.

    Recording: youtube.com/watch?v=abGruzf2pPk

    #penetrationtesting #offensivesecurity #vulnerabilitymanagement

  11. Most tools added AI and called it a feature. We kept asking whether it actually makes results more reliable.

    Session two of Office Hours is recorded. Jan covers the ML classifier, the authentication layer, and the MCP integration that won't act without your explicit go-ahead.

    45 minutes. Q&A included.

    Recording: youtube.com/watch?v=abGruzf2pPk

    #penetrationtesting #offensivesecurity #vulnerabilitymanagement

  12. Most tools added AI and called it a feature. We kept asking whether it actually makes results more reliable.

    Session two of Office Hours is recorded. Jan covers the ML classifier, the authentication layer, and the MCP integration that won't act without your explicit go-ahead.

    45 minutes. Q&A included.

    Recording: youtube.com/watch?v=abGruzf2pPk

    #penetrationtesting #offensivesecurity #vulnerabilitymanagement

  13. CVE-2026-40321: stored XSS in DNN (DotNetNuke) prior to v10.2.2 chains to full RCE.

    Any authenticated user can upload a crafted SVG with embedded JavaScript. If a power user opens it, the payload calls DNN's own config endpoint to drop an ASPX backdoor in the server root.

    One file. One click. Full RCE. CVSS 8.1, patched, fully documented.

    Write-up + PoC payloads: pentest-tools.com/blog/dotnetn

    More research from our team: pentest-tools.com/research

    #offensivesecurity #penetrationtesting #infosec

  14. CVE-2026-40321: stored XSS in DNN (DotNetNuke) prior to v10.2.2 chains to full RCE.

    Any authenticated user can upload a crafted SVG with embedded JavaScript. If a power user opens it, the payload calls DNN's own config endpoint to drop an ASPX backdoor in the server root.

    One file. One click. Full RCE. CVSS 8.1, patched, fully documented.

    Write-up + PoC payloads: pentest-tools.com/blog/dotnetn

    More research from our team: pentest-tools.com/research

    #offensivesecurity #penetrationtesting #infosec

  15. CVE-2026-40321: stored XSS in DNN (DotNetNuke) prior to v10.2.2 chains to full RCE.

    Any authenticated user can upload a crafted SVG with embedded JavaScript. If a power user opens it, the payload calls DNN's own config endpoint to drop an ASPX backdoor in the server root.

    One file. One click. Full RCE. CVSS 8.1, patched, fully documented.

    Write-up + PoC payloads: pentest-tools.com/blog/dotnetn

    More research from our team: pentest-tools.com/research

    #offensivesecurity #penetrationtesting #infosec

  16. CVE-2026-40321: stored XSS in DNN (DotNetNuke) prior to v10.2.2 chains to full RCE.

    Any authenticated user can upload a crafted SVG with embedded JavaScript. If a power user opens it, the payload calls DNN's own config endpoint to drop an ASPX backdoor in the server root.

    One file. One click. Full RCE. CVSS 8.1, patched, fully documented.

    Write-up + PoC payloads: pentest-tools.com/blog/dotnetn

    More research from our team: pentest-tools.com/research

    #offensivesecurity #penetrationtesting #infosec

  17. CVE-2026-40321: stored XSS in DNN (DotNetNuke) prior to v10.2.2 chains to full RCE.

    Any authenticated user can upload a crafted SVG with embedded JavaScript. If a power user opens it, the payload calls DNN's own config endpoint to drop an ASPX backdoor in the server root.

    One file. One click. Full RCE. CVSS 8.1, patched, fully documented.

    Write-up + PoC payloads: pentest-tools.com/blog/dotnetn

    More research from our team: pentest-tools.com/research

    #offensivesecurity #penetrationtesting #infosec

  18. False positives in web scans often aren't wrong detections. They're unfiltered responses: soft 404s, error pages, and redirect chains that look like findings until someone checks.

    We added an ML classifier that catches those before they ever surface as results. Fewer findings to re-validate, cleaner reports, less explaining to developers.

    Full breakdown: pentest-tools.com/usage/minimi

    #pentesting #offensivesecurity

  19. ๐Ÿšจ Most people think red teaming is about exploits.

    Itโ€™s not.

    The most effective attacks today donโ€™t start with vulnerabilities โ€”
    they start with **trust**.

    Modern environments are cloud-heavy, identity-driven, and full of SaaS integrations. In these systems, attackers donโ€™t always need to โ€œbreak in.โ€

    They move quietly through:

    โ€ข Over-permissioned identities
    โ€ข Weak approval workflows
    โ€ข Misconfigured cloud roles
    โ€ข OAuth tokens and API access
    โ€ข Human behavior under pressure
    โ€ข Business processes no one questions

    This is what Iโ€™ve been studying and calling the **Quiet Kill Chain** โ€”
    a sequence of legitimate-looking actions that, when chained together, become an attack path.

    No loud exploits.
    No obvious malware.
    Just normal activityโ€ฆ used the wrong way.

    ## What changes at an advanced level?

    You stop asking:
    โ€œWhat exploit should I use?โ€

    And start asking:

    โ€ข Where does this system trust too easily?
    โ€ข Which action would look completely normal?
    โ€ข What would defenders ignore?
    โ€ข How can I blend into business operations?

    Because the strongest intrusion today is not the one that is invisible.

    Itโ€™s the one that looks **legitimate**.

    ## My takeaway

    Offensive security is shifting from breaking systems
    to understanding them deeply enough to move inside them unnoticed.

    Iโ€™ve written a full deep-dive on this concept here ๐Ÿ‘‡

    ๐Ÿ”— dev.to/blackcipher/the-quiet-k

    Curious to hear your thoughts โ€”
    Is detection today ready for this level of subtlety?

    #CyberSecurity #RedTeam #OffensiveSecurity #ThreatIntel #CloudSecurity #IdentitySecurity #EthicalHacking #BlackCipher

  20. Python C2 Server for Red Teaming: A Comprehensive Hands-On Guide

    In this guide, I walk through building a Python-based C2 server, covering its architecture, encrypted communication, and real-world operational workflow.
    denizhalil.com/2025/12/15/pyth

    #CyberSecurity #RedTeam #C2 #commandandcontrol #Python #offensivesecurity #Pentesting #infosec #threatdetection #blueteam #securityengineering #ethicalhacking

  21. FuelCMS doesn't validate the Host header on password reset requests.

    Spoof it, trigger a reset for a valid user, and the app sends them a legitimate-looking email with your server in the link. They click. You get the token.

    PTT-2025-029 / CVE-2026-30459, CVSS 7.1 High. No fix coming (vendor's been quiet for ~4 years).
    Full PoC: pentest-tools.com/research

    #penetrationtesting #offensivesecurity

  22. Genuinely wigging out about AI taking my job. Like, actually losing sleep over it.

    My grand strategy: pivot to OT/ICS and hardware. Hardware because AI doesn't have hands (yet?). OT/ICS because I assume people still prefer their facilities/cars/planes to not explode when the AI goes the extra mile.

    Is it a good plan? Probably no. Do I have a backup? Also no.

    Looking for some assurance Iโ€™m crazy and wrong or correct and doing the right thing.

    #infosec #icssecurity #hardwarehacking #careeradvice #offensivesecurity

  23. "It's just dev mode."

    PTT-2025-028 / CVE-2026-30461 disagrees. Any authenticated user on a FuelCMS dev instance can drop a PHP shell via git submodule and call it from the browser. One HTTP request. Full RCE. CVSS 8.8 High.

    No patch coming. Project's been dormant for almost 4 years.
    Found by Raul Bledea and Matei "Mal" Bฤƒdฤƒnoiu.

    Full PoC: pentest-tools.com/research

    #offensivesecurity #vulnerabilityresearch

  24. ๐Ÿดโ€โ˜ ๏ธ Least privilege? FuelCMS didn't get the memo.

    Any authenticated user (regardless of role) can call the Blocks module endpoint. Pair that with PTT-2025-026 and a low privilege (one could even say zero-permission) account becomes full RCE. CVSSv3 goes from 5.4 to 8.8 faster than you can say "access denied."

    No patch. ~4 years of unmaintained software. You know the drill.

    Matei "Mal" Bฤƒdฤƒnoiu and Raul Bledea found the gap. Full PoC can be found in our Offensive Security Research Hub: pentest-tools.com/research

    #offensivesecurity #vulnerabilityresearch #infosec #RCE

  25. One does not simply exfiltrate a reset token using an email array.

    And yet, Frodo (Matei "Mal" Bฤƒdฤƒnoiu) and Samwise (Raul Bledea) from Pentest-Tools.com did exactly that in FuelCMS.

    Know someone's email? That's enough. Slip your address alongside theirs in a โ€œforgot passwordโ€ request and the token lands in your inbox. Their account is yours. You shall not (safely) parse!๐Ÿง™

    Chain it with PTT-2025-026 and you're looking at a 9.8 Critical unauthenticated RCE. One array to rule them all! ๐Ÿ’

    Full PoC here: pentest-tools.com/research

    #offensivesecurity #vulnerabilityresearch #infosec #accounttakeover

  26. "Accuracy" gets thrown around a lot. But for practitioners doing the actual work, it means something specific.
    Not a buzzword. A daily constraint.
    So what does it translate to for you?

    #offensivesecurity #ethicalhacking #vulnerabilityassessment

    When you need accuracy, what does that actually mean for your work?

    Vote below ๐Ÿ‘‡

  27. ๐Ÿดโ€โ˜ ๏ธ One backslash. Full RCE. That's PTT-2025-026 in a nutshell. Discovered by our Pentest-Tools.com team

    FuelCMS uses Dwoo to keep PHP code out of templates. Turns out, it forgot about โ€œ\โ€.

    Escape the string. Inject the code. Own the server.

    CVSSv3 8.8 High or 9.8 Critical if you chain it with our previous FuelCMS finding (PTT-2025-025 - unauthenticated account takeover). No patch coming either. The project's been on fumes for almost 4 years.

    Our colleagues Matei "Mal" Bฤƒdฤƒnoiu and Raul Bledea did the digging. Full PoC and exploit is added here: pentest-tools.com/research

    #offensivesecurity #vulnerabilityresearch #infosec

  28. Forgot your password? No worries, we attackers can reset even the admin's. ๐Ÿ”‘

    PTT-2025-030: Matei "Mal" Bฤƒdฤƒnoiu and Raul Bledea from our team found SQL injection hiding inside the password reset flow of FuelCMS v1.5.2.

    The parameters meant to verify your reset token and email? Both injectable.

    So a valid reset token becomes a master key to:
    ๐Ÿ—„๏ธ Dump the entire database
    ๐Ÿ”‘ Reset any account's password, not just yours
    โœ๏ธ Modify or delete content across the site as the admin

    CVSS: 7.7 High. No fix is coming, the FuelCMS master branch hasn't seen a commit in ~4 years. We emailed the vendor. They're as quiet as an unmonitored server at 3am.

    See the full technical breakdown in the comments. ๐Ÿ‘‡

    #offensivesecurity #vulnerabilityresearch #infosec

  29. Just published my research paper on Basilisk an open-source AI red-teaming framework that uses genetic
    algorithms to evolve adversarial prompts automatically. Instead of static jailbreak lists, Basilisk breeds attacks.

    Paper: doi.org/10.5281/zenodo.18909538

    Code: github.com/regaan/basilisk

    pip install basilisk-ai

    #LLMSecurity #AIRedTeaming #OffensiveSecurity #InfoSec
    #RedTeam #OWASP #CyberSecurity #OpenSource #Research

  30. Seven bugs. One unauthenticated RCE chain. Zero clicks.

    This original research by our offensive security team into FuelCMS (v1.5.2) uncovered seven new vulnerabilities. By chaining some of them, we achieved Remote Code Execution (RCE).

    The root causes? A *12-year-old Dwoo templating engine* and *outdated CodeIgniter3 code* still lurking in production systems.

    The exploit chain combines:

    ๐Ÿ”“ Account takeover (PTT-2025-025): reset password tokens leaked by sending them to the attacker's inbox

    ๐Ÿ’‰ SQL injection (PTT-2025-030): usernames extracted during password reset (optional step)

    โšก PHP code execution (PTT-2025-026): unsanitized backslashes in the Dwoo parser resulting in RAW PHP CODE EXECUTION

    Result: full web app compromise.

    We published the full exploit chain on our blogpost so practitioners can reproduce and validate the findings. Read the detailed research here: pentest-tools.com/blog/throwin

    Many thanks to Matei Badanoiu, Raul Bledea and Eusebiu Boghici for their contributions.

    #offensivesecurity #vulnerabilityresearch #pentesting #infosec

    Out of curiosity: how often do you still run into 10+ year-old libraries during engagements?

  31. We just launched the Offensive Security Research Hub on Pentest-Tools.com!
    This isnโ€™t a CVE recap page.

    Our #offensivesecurity team - led by Matei Badanoiu (CVE Jesus) - publishes original research: newly discovered vulnerabilities, deep technical write-ups, and full exploit chains built from real-world investigation.

    Youโ€™ll see:

    ๐Ÿ› ๏ธ Working PoCs and reproducible exploit paths

    ๐Ÿง  The exact reasoning that turned strange behavior into confirmed impact

    โš–๏ธ Field-tested analysis of edge cases, constraints, and trade-offs

    No summaries. No recycled advisories.

    This is practitioner-grade research from people who _actively_ hunt and validate vulnerabilities.

    If you want to understand how experienced attackers approach complex targets, start here.

    Bookmark this link, we're going to update it frequently with new learnings: pentest-tools.com/research

    #vulnerabilityresearch #ethicalhacking #infosec

  32. ๐Ÿ‹๏ธ ๐—ก๐—ผ๐—ฟ๐˜๐—ต๐—ฆ๐—ฒ๐—ฐ ๐Ÿฎ๐Ÿฌ๐Ÿฎ๐Ÿฒ ๐—™๐—ผ๐—ฟ๐—บ๐—ฎ๐˜ต๐—ถ๐—ผ๐—ป๐˜ด/๐—ง๐—ฟ๐—ฎ๐—ถ๐—ป๐—ถ๐—ป๐—ด (7/12): "Offensive Development Practitioner Certification (ODPC)" ๐—ฝ๐—ฎ๐—ฟ/๐—ฏ๐˜† Munaf Shariff (White Knight Labs)

    ๐Ÿ“… Dates: May 11, 12 and 13, 2026 (3 days)
    ๐Ÿ“Š Difficulty: Medium
    ๐Ÿ–ฅ๏ธ Mode: Hybrid (on-site & remote)

    Description: "๐˜›๐˜ฉ๐˜ฆ ๐˜–๐˜ง๐˜ง๐˜ฆ๐˜ฏ๐˜ด๐˜ช๐˜ท๐˜ฆ ๐˜‹๐˜ฆ๐˜ท๐˜ฆ๐˜ญ๐˜ฐ๐˜ฑ๐˜ฎ๐˜ฆ๐˜ฏ๐˜ต ๐˜—๐˜ณ๐˜ข๐˜ค๐˜ต๐˜ช๐˜ต๐˜ช๐˜ฐ๐˜ฏ๐˜ฆ๐˜ณ ๐˜Š๐˜ฆ๐˜ณ๐˜ต๐˜ช๐˜ง๐˜ช๐˜ค๐˜ข๐˜ต๐˜ช๐˜ฐ๐˜ฏ (๐˜–๐˜‹๐˜—๐˜Š) ๐˜ช๐˜ด ๐˜ฅ๐˜ฆ๐˜ด๐˜ช๐˜จ๐˜ฏ๐˜ฆ๐˜ฅ ๐˜ต๐˜ฐ ๐˜ต๐˜ข๐˜ฌ๐˜ฆ ๐˜บ๐˜ฐ๐˜ถ ๐˜ฅ๐˜ฆ๐˜ฆ๐˜ฑ ๐˜ช๐˜ฏ๐˜ต๐˜ฐ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ณ๐˜ฆ๐˜ข๐˜ญ๐˜ช๐˜ต๐˜ช๐˜ฆ๐˜ด ๐˜ฐ๐˜ง ๐˜ฎ๐˜ฐ๐˜ฅ๐˜ฆ๐˜ณ๐˜ฏ ๐˜ฅ๐˜ฆ๐˜ง๐˜ฆ๐˜ฏ๐˜ด๐˜ฆ ๐˜ฆ๐˜ท๐˜ข๐˜ด๐˜ช๐˜ฐ๐˜ฏ ๐˜ข๐˜ฏ๐˜ฅ ๐˜ฐ๐˜ง๐˜ง๐˜ฆ๐˜ฏ๐˜ด๐˜ช๐˜ท๐˜ฆ ๐˜ต๐˜ฐ๐˜ฐ๐˜ญ๐˜ช๐˜ฏ๐˜จ, ๐˜ฑ๐˜ณ๐˜ฐ๐˜ท๐˜ช๐˜ฅ๐˜ช๐˜ฏ๐˜จ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ฉ๐˜ข๐˜ฏ๐˜ฅ๐˜ด-๐˜ฐ๐˜ฏ ๐˜ฆ๐˜น๐˜ฑ๐˜ฆ๐˜ณ๐˜ช๐˜ฆ๐˜ฏ๐˜ค๐˜ฆ ๐˜ฏ๐˜ฆ๐˜ฆ๐˜ฅ๐˜ฆ๐˜ฅ ๐˜ต๐˜ฐ ๐˜ฐ๐˜ฑ๐˜ฆ๐˜ณ๐˜ข๐˜ต๐˜ฆ ๐˜ข๐˜ต ๐˜ข๐˜ฏ ๐˜ข๐˜ฅ๐˜ท๐˜ข๐˜ฏ๐˜ค๐˜ฆ๐˜ฅ ๐˜ญ๐˜ฆ๐˜ท๐˜ฆ๐˜ญ. ๐˜›๐˜ฉ๐˜ณ๐˜ฐ๐˜ถ๐˜จ๐˜ฉ ๐˜ญ๐˜ช๐˜ท๐˜ฆ, ๐˜ช๐˜ฏ๐˜ด๐˜ต๐˜ณ๐˜ถ๐˜ค๐˜ต๐˜ฐ๐˜ณ-๐˜ด๐˜ถ๐˜ฑ๐˜ฑ๐˜ฐ๐˜ณ๐˜ต๐˜ฆ๐˜ฅ ๐˜ญ๐˜ข๐˜ฃ๐˜ด, ๐˜บ๐˜ฐ๐˜ถโ€™๐˜ญ๐˜ญ ๐˜ญ๐˜ฆ๐˜ข๐˜ณ๐˜ฏ ๐˜ฉ๐˜ฐ๐˜ธ ๐˜ต๐˜ฐ ๐˜ฐ๐˜ท๐˜ฆ๐˜ณ๐˜ค๐˜ฐ๐˜ฎ๐˜ฆ ๐˜ณ๐˜ฆ๐˜ข๐˜ญ-๐˜ธ๐˜ฐ๐˜ณ๐˜ญ๐˜ฅ ๐˜ด๐˜ฆ๐˜ค๐˜ถ๐˜ณ๐˜ช๐˜ต๐˜บ ๐˜ฎ๐˜ฆ๐˜ค๐˜ฉ๐˜ข๐˜ฏ๐˜ช๐˜ด๐˜ฎ๐˜ด ๐˜ฃ๐˜บ ๐˜ธ๐˜ฐ๐˜ณ๐˜ฌ๐˜ช๐˜ฏ๐˜จ ๐˜ฅ๐˜ช๐˜ณ๐˜ฆ๐˜ค๐˜ต๐˜ญ๐˜บ ๐˜ธ๐˜ช๐˜ต๐˜ฉ ๐˜›๐˜ฆ๐˜ณ๐˜ณ๐˜ข๐˜ง๐˜ฐ๐˜ณ๐˜ฎ-๐˜ฅ๐˜ฆ๐˜ฑ๐˜ญ๐˜ฐ๐˜บ๐˜ฆ๐˜ฅ ๐˜ฆ๐˜ฏ๐˜ท๐˜ช๐˜ณ๐˜ฐ๐˜ฏ๐˜ฎ๐˜ฆ๐˜ฏ๐˜ต๐˜ด, ๐˜ฑ๐˜ฆ๐˜ณ๐˜ง๐˜ฐ๐˜ณ๐˜ฎ๐˜ช๐˜ฏ๐˜จ ๐˜—๐˜Œ ๐˜ง๐˜ช๐˜ญ๐˜ฆ ๐˜ค๐˜ฐ๐˜ฏ๐˜ท๐˜ฆ๐˜ณ๐˜ด๐˜ช๐˜ฐ๐˜ฏ๐˜ด, ๐˜ข๐˜ฏ๐˜ฅ ๐˜ฆ๐˜น๐˜ฆ๐˜ค๐˜ถ๐˜ต๐˜ช๐˜ฏ๐˜จ ๐˜ข๐˜ฅ๐˜ท๐˜ข๐˜ฏ๐˜ค๐˜ฆ๐˜ฅ ๐˜ฑ๐˜ณ๐˜ฐ๐˜ค๐˜ฆ๐˜ด๐˜ด-๐˜ช๐˜ฏ๐˜ซ๐˜ฆ๐˜ค๐˜ต๐˜ช๐˜ฐ๐˜ฏ ๐˜ด๐˜ต๐˜ณ๐˜ข๐˜ต๐˜ฆ๐˜จ๐˜ช๐˜ฆ๐˜ด.

    ๐˜›๐˜ฉ๐˜ฆ ๐˜ค๐˜ฐ๐˜ถ๐˜ณ๐˜ด๐˜ฆ ๐˜ต๐˜ฉ๐˜ฆ๐˜ฏ ๐˜ฆ๐˜น๐˜ฑ๐˜ข๐˜ฏ๐˜ฅ๐˜ด ๐˜ช๐˜ฏ๐˜ต๐˜ฐ ๐˜ฆ๐˜น๐˜ฑ๐˜ฆ๐˜ณ๐˜ต-๐˜ญ๐˜ฆ๐˜ท๐˜ฆ๐˜ญ ๐˜ฐ๐˜ง๐˜ง๐˜ฆ๐˜ฏ๐˜ด๐˜ช๐˜ท๐˜ฆ ๐˜ฅ๐˜ฆ๐˜ท๐˜ฆ๐˜ญ๐˜ฐ๐˜ฑ๐˜ฎ๐˜ฆ๐˜ฏ๐˜ต, ๐˜ช๐˜ฏ๐˜ค๐˜ญ๐˜ถ๐˜ฅ๐˜ช๐˜ฏ๐˜จ ๐˜ช๐˜ฏ-๐˜ฅ๐˜ฆ๐˜ฑ๐˜ต๐˜ฉ ๐˜ฆ๐˜น๐˜ฑ๐˜ญ๐˜ฐ๐˜ณ๐˜ข๐˜ต๐˜ช๐˜ฐ๐˜ฏ ๐˜ฐ๐˜ง ๐˜Š๐˜ฐ๐˜ฃ๐˜ข๐˜ญ๐˜ต ๐˜š๐˜ต๐˜ณ๐˜ช๐˜ฌ๐˜ฆ ๐˜ค๐˜ฐ๐˜ฎ๐˜ฎ๐˜ข๐˜ฏ๐˜ฅ-๐˜ข๐˜ฏ๐˜ฅ-๐˜ค๐˜ฐ๐˜ฏ๐˜ต๐˜ณ๐˜ฐ๐˜ญ ๐˜ง๐˜ณ๐˜ข๐˜ฎ๐˜ฆ๐˜ธ๐˜ฐ๐˜ณ๐˜ฌ๐˜ด, ๐˜ด๐˜ข๐˜ฏ๐˜ฅ๐˜ฃ๐˜ฐ๐˜น ๐˜ฅ๐˜ฆ๐˜ต๐˜ฆ๐˜ค๐˜ต๐˜ช๐˜ฐ๐˜ฏ ๐˜ฆ๐˜ท๐˜ข๐˜ด๐˜ช๐˜ฐ๐˜ฏ, ๐˜ข๐˜ฏ๐˜ฅ ๐˜ด๐˜ฐ๐˜ฑ๐˜ฉ๐˜ช๐˜ด๐˜ต๐˜ช๐˜ค๐˜ข๐˜ต๐˜ฆ๐˜ฅ ๐˜Œ๐˜‹๐˜™ ๐˜ฃ๐˜บ๐˜ฑ๐˜ข๐˜ด๐˜ด ๐˜ต๐˜ฆ๐˜ค๐˜ฉ๐˜ฏ๐˜ช๐˜ฒ๐˜ถ๐˜ฆ๐˜ด. ๐˜ ๐˜ฐ๐˜ถโ€™๐˜ญ๐˜ญ ๐˜ข๐˜ญ๐˜ด๐˜ฐ ๐˜ฅ๐˜ฆ๐˜ท๐˜ฆ๐˜ญ๐˜ฐ๐˜ฑ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ข๐˜ฃ๐˜ช๐˜ญ๐˜ช๐˜ต๐˜บ ๐˜ต๐˜ฐ ๐˜ฅ๐˜ฆ๐˜ด๐˜ช๐˜จ๐˜ฏ ๐˜ข๐˜ฏ๐˜ฅ ๐˜ฅ๐˜ฆ๐˜ฑ๐˜ญ๐˜ฐ๐˜บ ๐˜ค๐˜ถ๐˜ด๐˜ต๐˜ฐ๐˜ฎ ๐˜ฑ๐˜ข๐˜บ๐˜ญ๐˜ฐ๐˜ข๐˜ฅ๐˜ด, ๐˜ฃ๐˜ถ๐˜ช๐˜ญ๐˜ฅ๐˜ช๐˜ฏ๐˜จ ๐˜ณ๐˜ฆ๐˜ง๐˜ญ๐˜ฆ๐˜ค๐˜ต๐˜ช๐˜ท๐˜ฆ ๐˜‹๐˜“๐˜“ ๐˜ญ๐˜ฐ๐˜ข๐˜ฅ๐˜ฆ๐˜ณ๐˜ด, ๐˜ฆ๐˜ฏ๐˜จ๐˜ช๐˜ฏ๐˜ฆ๐˜ฆ๐˜ณ๐˜ช๐˜ฏ๐˜จ ๐˜ˆ๐˜”๐˜š๐˜ ๐˜ข๐˜ฏ๐˜ฅ ๐˜Œ๐˜›๐˜ž ๐˜ฃ๐˜บ๐˜ฑ๐˜ข๐˜ด๐˜ด๐˜ฆ๐˜ด, ๐˜ข๐˜ฏ๐˜ฅ ๐˜ค๐˜ณ๐˜ข๐˜ง๐˜ต๐˜ช๐˜ฏ๐˜จ ๐˜ต๐˜ข๐˜ช๐˜ญ๐˜ฐ๐˜ณ๐˜ฆ๐˜ฅ ๐˜ฐ๐˜ง๐˜ง๐˜ฆ๐˜ฏ๐˜ด๐˜ช๐˜ท๐˜ฆ ๐˜ต๐˜ฐ๐˜ฐ๐˜ญ๐˜ช๐˜ฏ๐˜จ ๐˜ง๐˜ณ๐˜ฐ๐˜ฎ ๐˜ต๐˜ฉ๐˜ฆ ๐˜จ๐˜ณ๐˜ฐ๐˜ถ๐˜ฏ๐˜ฅ ๐˜ถ๐˜ฑ. ๐˜‰๐˜บ ๐˜ฃ๐˜ญ๐˜ฆ๐˜ฏ๐˜ฅ๐˜ช๐˜ฏ๐˜จ ๐˜ฅ๐˜ฆ๐˜ฆ๐˜ฑ ๐˜ต๐˜ฆ๐˜ค๐˜ฉ๐˜ฏ๐˜ช๐˜ค๐˜ข๐˜ญ ๐˜ช๐˜ฏ๐˜ด๐˜ต๐˜ณ๐˜ถ๐˜ค๐˜ต๐˜ช๐˜ฐ๐˜ฏ ๐˜ธ๐˜ช๐˜ต๐˜ฉ ๐˜ฑ๐˜ณ๐˜ข๐˜ค๐˜ต๐˜ช๐˜ค๐˜ข๐˜ญ, ๐˜ช๐˜ฏ๐˜ต๐˜ฆ๐˜ณ๐˜ข๐˜ค๐˜ต๐˜ช๐˜ท๐˜ฆ ๐˜ญ๐˜ข๐˜ฃ๐˜ด, ๐˜–๐˜‹๐˜—๐˜Š ๐˜จ๐˜ช๐˜ท๐˜ฆ๐˜ด ๐˜บ๐˜ฐ๐˜ถ ๐˜ต๐˜ฉ๐˜ฆ ๐˜ฌ๐˜ฏ๐˜ฐ๐˜ธ๐˜ญ๐˜ฆ๐˜ฅ๐˜จ๐˜ฆ, ๐˜ด๐˜ฌ๐˜ช๐˜ญ๐˜ญ๐˜ด, ๐˜ข๐˜ฏ๐˜ฅ ๐˜ค๐˜ฐ๐˜ฏ๐˜ง๐˜ช๐˜ฅ๐˜ฆ๐˜ฏ๐˜ค๐˜ฆ ๐˜ต๐˜ฐ ๐˜ถ๐˜ฏ๐˜ฅ๐˜ฆ๐˜ณ๐˜ด๐˜ต๐˜ข๐˜ฏ๐˜ฅโ€”๐˜ข๐˜ฏ๐˜ฅ ๐˜ฐ๐˜ถ๐˜ต๐˜ฎ๐˜ข๐˜ฏ๐˜ฆ๐˜ถ๐˜ท๐˜ฆ๐˜ณโ€”๐˜ฎ๐˜ฐ๐˜ฅ๐˜ฆ๐˜ณ๐˜ฏ ๐˜ฅ๐˜ฆ๐˜ง๐˜ฆ๐˜ฏ๐˜ด๐˜ช๐˜ท๐˜ฆ ๐˜ต๐˜ฆ๐˜ค๐˜ฉ๐˜ฏ๐˜ฐ๐˜ญ๐˜ฐ๐˜จ๐˜ช๐˜ฆ๐˜ด."

    About the trainer:
    Munaf Shariff is an offensive development specialist with deep expertise in bypassing modern security mechanisms and building custom offensive tooling that operates effectively in real-world environments.

    ๐Ÿ”— Training details: nsec.io/training/2026-offensiv

    #NorthSec #cybersecurity #offensivesecurity #malware #evasion

  33. #CallForSponsors
    We are currently open for sponsors and partners for Adversary Village at RSAC 2026, San Francisco.

    This is an opportunity to collaborate with one of the leading communities focused on #AdversarySimulation and #OffensiveSecurity, and to engage directly with practitioners, researchers, and industry leaders shaping modern security operations.
    If you are interested in partnering with us for RSAC 2026, feel free to reach out: adversaryvillage.org/sponsors/

    #AdversaryVillage #RSAConference #PurpleTeam

  34. ๐Ÿšจ Supply Chain Attack Simulation on Drupal (PoC, not a CVE)

    What if a malicious actor hijacked the update server for your favorite CMS?
    I built a full lab scenario to demonstrate how it could happen โ€” and how to defend against it.

    ๐Ÿ”ฌ Techniques covered:

    MITM + rogue CA, fake update feeds, trojanized package โ†’ RCE & persistence.
    Full doc + PDF PoC.

    Full documentation: attack steps, scripts (in PDF), hardening tips

    โš ๏ธ Not a Drupal 0-day โ€” this is a controlled, educational simulation for awareness and training.

    ๐Ÿ’ก Why it matters

    Supply chain attacks are no longer theoretical.
    This demo helps Blue Teams, Red Teams, developers, and trainers strengthen detection, review processes, and update security.

    ๐Ÿ‘‰ Repo :
    github.com/privlabs/-Supply-Ch

    Questions or feedback?
    DM me or email me (contact in README).

    All in lab, all safe

    #cybersecurity #infosec #securityresearch #offensivesecurity #blueteam
    #redteam #supplychainsecurity #drupal #websecurity #devsecops
    #softwaresecurity #rce #mitm

  35. DefCamp 2025, you were so awesome! โšก๏ธ

    Another year, another incredible edition in the books. We are so proud to have been part of this event once again and to see the community showing up in full force in Bucharest.

    Huge kudos to the organizers for pulling off such a great gathering. It was a blast seeing so many familiar faces and meeting so many new people who share our passion for breaking things (for the right reasons).

    A few highlights from our team:

    ๐ŸŽค The talks: It was a big year for our research team on stage!

    Our Founder & CEO, Adrian Furtuna, explored how LLMs are changing the game in "VIBE Pentesting" (enhancing the human hacker, not replacing them!).

    Our Offensive Security Research Lead, Matei "CVE Jesus" Bฤƒdฤƒnoiu, took us deep into the "Nightmare Factory," breaking down the process behind the 15 fresh 0-days the team found this year.

    ๐Ÿ“บ Missed them live? Don't worry, we'll be sharing the recordings on our YouTube channel soon, so keep an eye out!

    ๐Ÿ‘• The swag: We knew our new merch was cool, but that line?! Seeing so many of you waiting to grab a Pentest-Tools.com T-shirt was a massive compliment. We hope you wear them while you hunt your next bug.

    Weโ€™re already looking forward to the next one!

    #DefCamp2025 #OffensiveSecurity #InfosecCommunity #Cybersecurity #Pentesting

  36. ๐Ÿ‘ป This Halloween, make sure *you* haunt vulnerabilities - not the other way around. ๐Ÿ˜ˆ

    October updates are here, and theyโ€™re a real treat for security teams.

    Check out the new powers you can use to keep monsters out:
    ๐Ÿ•ธ๏ธ Catch 2 new RCEs before attackers do (Fortra GoAnywhere & SolarWinds).
    ๐ŸŽฏ Validate #SessionReaper safely with Sniper: Auto-Exploiter.
    โ˜๏ธ Scan private Azure environments securely with our new VPN Agent.
    ๐Ÿ“ Download multiple reports in one go (no more manual horrors).
    ๐Ÿ“š See how we help MSPs, consultants & internal teams - and hear it from them if we do a good job (or not).

    youtu.be/F8E5H0oO-pk

    ๐Ÿญ Check the changelog for the full basket: pentest-tools.com/change-log

    #cybersecurity #vulnerabilitymanagement #offensivesecurity #azure

  37. ๐ŸŒ Manual effort slows you down. Hereโ€™s how we sped things up this September โšก

    ๐Ÿ”น Sniper: Auto-Exploiter ๐Ÿ‘‰ 4 new modules for Fortinet (CVE-2025-25256), SharePoint (CVE-2025-53771 & 49704), FreePBX (CVE-2025-57819), and OpenSSH (CVE-2018-15473)
    ๐Ÿ”น Network Scanner ๐Ÿ‘‰ Targeted detection for SonicWall SonicOS (CVE-2024-40766).
    ๐Ÿ”น Vanta integration ๐Ÿ‘‰ Automatic vulnerability syncing. 32 mapped tests, daily updates, zero manual uploads.
    ๐Ÿ”น Azure internal scans ๐Ÿ‘‰ Run internal vulnerability scans directly in Azure.
    ๐Ÿ”น Customer Story ๐Ÿ‘‰ Learn how Chill IT, a security-driven MSP, uses Pentest-Tools.com to qualify clients and strengthen proposals.

    ๐Ÿ‘€ Check the video for the full details: youtu.be/1kNX9IsQg1o

    #cybersecurity #vulnerabilitymanagement #offensivesecurity #vanta #azure

  38. ๐Ÿ‘จโ€๐Ÿ’ป Want to work at Epieos?
    Meet us at Hexacon 2025!

    ๐Ÿ›ก๏ธ Hexacon is a world-class event for enthusiasts of #OffensiveSecurity and #ReverseEngineering.

    ๐Ÿค Weโ€™ll be there to meet exceptional talents, curious, rigorous, and driven by the desire to use their technical #skills, particularly in reverse engineering, to help us develop #OSINT 0days that protect and save human lives.

    ๐Ÿ“Hexacon in Paris, October 10โ€“11.

    ๐Ÿ“ฎ And if you canโ€™t attend in person, feel free to send us your #CV for a #ReverseEngineer position or to learn more about our needs at: contact[at]epieos[dot]com.

  39. Weโ€™re at IT-SA 2025 in Nuremberg with our partner Allnet, starting today through Oct 9 ๐Ÿš€

    ๐Ÿ‘‹๐Ÿผ Find us at Booth 6-432 and come say hi to Robert (Product Manager) and Jan (Channel Account Manager).

    Stop by for a live demo to see how Pentest-Tools.com helps you:
    โ€ข Simplify assessments by scanning network, web, and API in one toolkit
    โ€ข Prove real-world impact with automatically validated findings and actionable PoCs
    โ€ข Save hours with client-ready, customizable reports

    More info about the event โžก๏ธ itsa365.de/en/it-sa-expo-congr

    ๐ŸŽŸ๏ธ We still have a small batch of tickets available. First-come, first-served. DM us and weโ€™ll share a code ๐Ÿคซ

    #ITSA2025 #offensivesecurity #informationsecurity

  40. ๐ŸŽค NightmareFactory drops at #DefCamp 2025 ๐Ÿ˜ฑ
    Live from Bucharest, on Nov 13โ€“14.

    After digging into Odoo, Gitea, and FileCloud in 2024, Matei Badanoiu and Catalin Iovita from our team at Pentest-Tools.com leveled up their 0-day hunting game.

    ๐Ÿšจ In 2025 alone:
    ๐Ÿงฉ they reported ~15 new 0-days
    โš™๏ธ Built fresh vulnerability chains
    ๐Ÿ’ฅ And got one-click RCE from seemingly โ€œlowโ€ bugs

    Their talk breaks down:
    ๐Ÿ” How the team evolved their approach
    ๐Ÿง  Why chaining bugs changes the impact game
    ๐Ÿš€ What they learned about turning niche findings into real-world exploitation paths

    If youโ€™re into #offensivesecurity, vuln research, or just love a good โ€œwaitโ€ฆ that worked?!โ€ moment โ†’

    ๐Ÿ“ Donโ€™t miss NightmareFactory at DefCamp! --> def.camp/

    #vulnerabilityresearch #cybersecurity #infosec

  41. Nach einer betriebsbedingten Kรผndigung bin ich derzeit auf Jobsuche im Bereich #itsecurity / #offensivesecurity / #penetrationtest

    Ihr kennt jemanden, der jemanden kennt? Gern teilen, danke!

    Verfรผgbarkeit: 01.01.2026
    Modalitรคten: ca. 32h/Woche, Remote bzw. im Raum Magdeburg