#offensivesecurity โ Public Fediverse posts
Live and recent posts from across the Fediverse tagged #offensivesecurity, aggregated by home.social.
-
World Password Day. The finding that should sting: roughly 60% of credential issues from real pentests this year came from factory defaults still running. FTP, RDP, Redis, Telnet. No brute-forcing needed.
Dragos Sandu, Product Manager at Pentest-Tools.com, shared the data with IT Security Guru. Full piece: https://www.itsecurityguru.org/2026/05/07/world-password-day-2026-the-credential-crisis-hasnt-gone-away-its-just-got-more-dangerous/
-
World Password Day. The finding that should sting: roughly 60% of credential issues from real pentests this year came from factory defaults still running. FTP, RDP, Redis, Telnet. No brute-forcing needed.
Dragos Sandu, Product Manager at Pentest-Tools.com, shared the data with IT Security Guru. Full piece: https://www.itsecurityguru.org/2026/05/07/world-password-day-2026-the-credential-crisis-hasnt-gone-away-its-just-got-more-dangerous/
-
World Password Day. The finding that should sting: roughly 60% of credential issues from real pentests this year came from factory defaults still running. FTP, RDP, Redis, Telnet. No brute-forcing needed.
Dragos Sandu, Product Manager at Pentest-Tools.com, shared the data with IT Security Guru. Full piece: https://www.itsecurityguru.org/2026/05/07/world-password-day-2026-the-credential-crisis-hasnt-gone-away-its-just-got-more-dangerous/
-
World Password Day. The finding that should sting: roughly 60% of credential issues from real pentests this year came from factory defaults still running. FTP, RDP, Redis, Telnet. No brute-forcing needed.
Dragos Sandu, Product Manager at Pentest-Tools.com, shared the data with IT Security Guru. Full piece: https://www.itsecurityguru.org/2026/05/07/world-password-day-2026-the-credential-crisis-hasnt-gone-away-its-just-got-more-dangerous/
-
World Password Day. The finding that should sting: roughly 60% of credential issues from real pentests this year came from factory defaults still running. FTP, RDP, Redis, Telnet. No brute-forcing needed.
Dragos Sandu, Product Manager at Pentest-Tools.com, shared the data with IT Security Guru. Full piece: https://www.itsecurityguru.org/2026/05/07/world-password-day-2026-the-credential-crisis-hasnt-gone-away-its-just-got-more-dangerous/
-
๐ฐ Accenture Invests in AI-Powered Offensive Security Platform XBOW
Accenture invests in AI-powered offensive security firm XBOW. ๐ค The partnership aims to bring autonomous, continuous penetration testing to clients, fighting AI-driven threats with AI-driven defense. #CyberSecurity #AI #OffensiveSecurity #Accenture
-
Viele denken, der รbergang vom Penetrationstest ins Red Teaming sei eine logische, graduelle Weiterentwicklung. In der Praxis zeigt sich schnell: Es ist ein echter Perspektivwechsel.
Die grรถรten Unterschiede liegen nicht in den Tools, sondern im Mindset:
๐น OPSEC first โ Jede Aktion wird hinterfragt: Welche Spuren hinterlasse ich? Wie reagiert der Verteidiger?
๐น Realismus vor Geschwindigkeit โ Es geht nicht darum, mรถglichst schnell ans Ziel zu kommen, sondern einen echten Angreifer abzubilden.
๐น Kontinuierliches Lernen โ Standard-Tools werden zunehmend erkannt. Wer sich nicht weiterentwickelt, wird sichtbar.
๐น Fehler als Lernmoment โ Der Moment, in dem man erkannt wird, verรคndert die eigene Denkweise nachhaltig.
In unserem neuen Blogartikel beschreibt Marcel Heisel, wie wir neue Mitarbeitende auf genau diesen Wechsel vorbereiten โ und was dabei wirklich den Unterschied macht.
๐ https://research.hisolutions.com/2026/05/vom-pentester-zum-red-teamer-wie-wir-neue-mitarbeitende-fit-machen/
#RedTeaming #Pentesting #CyberSecurity #OffensiveSecurity #OPSEC #InfoSec #ActiveDirectory -
Most tools added AI and called it a feature. We kept asking whether it actually makes results more reliable.
Session two of Office Hours is recorded. Jan covers the ML classifier, the authentication layer, and the MCP integration that won't act without your explicit go-ahead.
45 minutes. Q&A included.
Recording: https://www.youtube.com/watch?v=abGruzf2pPk
#penetrationtesting #offensivesecurity #vulnerabilitymanagement
-
Most tools added AI and called it a feature. We kept asking whether it actually makes results more reliable.
Session two of Office Hours is recorded. Jan covers the ML classifier, the authentication layer, and the MCP integration that won't act without your explicit go-ahead.
45 minutes. Q&A included.
Recording: https://www.youtube.com/watch?v=abGruzf2pPk
#penetrationtesting #offensivesecurity #vulnerabilitymanagement
-
Most tools added AI and called it a feature. We kept asking whether it actually makes results more reliable.
Session two of Office Hours is recorded. Jan covers the ML classifier, the authentication layer, and the MCP integration that won't act without your explicit go-ahead.
45 minutes. Q&A included.
Recording: https://www.youtube.com/watch?v=abGruzf2pPk
#penetrationtesting #offensivesecurity #vulnerabilitymanagement
-
Most tools added AI and called it a feature. We kept asking whether it actually makes results more reliable.
Session two of Office Hours is recorded. Jan covers the ML classifier, the authentication layer, and the MCP integration that won't act without your explicit go-ahead.
45 minutes. Q&A included.
Recording: https://www.youtube.com/watch?v=abGruzf2pPk
#penetrationtesting #offensivesecurity #vulnerabilitymanagement
-
Most tools added AI and called it a feature. We kept asking whether it actually makes results more reliable.
Session two of Office Hours is recorded. Jan covers the ML classifier, the authentication layer, and the MCP integration that won't act without your explicit go-ahead.
45 minutes. Q&A included.
Recording: https://www.youtube.com/watch?v=abGruzf2pPk
#penetrationtesting #offensivesecurity #vulnerabilitymanagement
-
CVE-2026-40321: stored XSS in DNN (DotNetNuke) prior to v10.2.2 chains to full RCE.
Any authenticated user can upload a crafted SVG with embedded JavaScript. If a power user opens it, the payload calls DNN's own config endpoint to drop an ASPX backdoor in the server root.
One file. One click. Full RCE. CVSS 8.1, patched, fully documented.
Write-up + PoC payloads: https://pentest-tools.com/blog/dotnetnuke-xss-to-rce
More research from our team: https://pentest-tools.com/research
-
CVE-2026-40321: stored XSS in DNN (DotNetNuke) prior to v10.2.2 chains to full RCE.
Any authenticated user can upload a crafted SVG with embedded JavaScript. If a power user opens it, the payload calls DNN's own config endpoint to drop an ASPX backdoor in the server root.
One file. One click. Full RCE. CVSS 8.1, patched, fully documented.
Write-up + PoC payloads: https://pentest-tools.com/blog/dotnetnuke-xss-to-rce
More research from our team: https://pentest-tools.com/research
-
CVE-2026-40321: stored XSS in DNN (DotNetNuke) prior to v10.2.2 chains to full RCE.
Any authenticated user can upload a crafted SVG with embedded JavaScript. If a power user opens it, the payload calls DNN's own config endpoint to drop an ASPX backdoor in the server root.
One file. One click. Full RCE. CVSS 8.1, patched, fully documented.
Write-up + PoC payloads: https://pentest-tools.com/blog/dotnetnuke-xss-to-rce
More research from our team: https://pentest-tools.com/research
-
CVE-2026-40321: stored XSS in DNN (DotNetNuke) prior to v10.2.2 chains to full RCE.
Any authenticated user can upload a crafted SVG with embedded JavaScript. If a power user opens it, the payload calls DNN's own config endpoint to drop an ASPX backdoor in the server root.
One file. One click. Full RCE. CVSS 8.1, patched, fully documented.
Write-up + PoC payloads: https://pentest-tools.com/blog/dotnetnuke-xss-to-rce
More research from our team: https://pentest-tools.com/research
-
CVE-2026-40321: stored XSS in DNN (DotNetNuke) prior to v10.2.2 chains to full RCE.
Any authenticated user can upload a crafted SVG with embedded JavaScript. If a power user opens it, the payload calls DNN's own config endpoint to drop an ASPX backdoor in the server root.
One file. One click. Full RCE. CVSS 8.1, patched, fully documented.
Write-up + PoC payloads: https://pentest-tools.com/blog/dotnetnuke-xss-to-rce
More research from our team: https://pentest-tools.com/research
-
False positives in web scans often aren't wrong detections. They're unfiltered responses: soft 404s, error pages, and redirect chains that look like findings until someone checks.
We added an ML classifier that catches those before they ever surface as results. Fewer findings to re-validate, cleaner reports, less explaining to developers.
Full breakdown: https://pentest-tools.com/usage/minimize-false-positives
-
๐จ Most people think red teaming is about exploits.
Itโs not.
The most effective attacks today donโt start with vulnerabilities โ
they start with **trust**.Modern environments are cloud-heavy, identity-driven, and full of SaaS integrations. In these systems, attackers donโt always need to โbreak in.โ
They move quietly through:
โข Over-permissioned identities
โข Weak approval workflows
โข Misconfigured cloud roles
โข OAuth tokens and API access
โข Human behavior under pressure
โข Business processes no one questionsThis is what Iโve been studying and calling the **Quiet Kill Chain** โ
a sequence of legitimate-looking actions that, when chained together, become an attack path.No loud exploits.
No obvious malware.
Just normal activityโฆ used the wrong way.## What changes at an advanced level?
You stop asking:
โWhat exploit should I use?โAnd start asking:
โข Where does this system trust too easily?
โข Which action would look completely normal?
โข What would defenders ignore?
โข How can I blend into business operations?Because the strongest intrusion today is not the one that is invisible.
Itโs the one that looks **legitimate**.
## My takeaway
Offensive security is shifting from breaking systems
to understanding them deeply enough to move inside them unnoticed.Iโve written a full deep-dive on this concept here ๐
Curious to hear your thoughts โ
Is detection today ready for this level of subtlety?#CyberSecurity #RedTeam #OffensiveSecurity #ThreatIntel #CloudSecurity #IdentitySecurity #EthicalHacking #BlackCipher
-
Python C2 Server for Red Teaming: A Comprehensive Hands-On Guide
In this guide, I walk through building a Python-based C2 server, covering its architecture, encrypted communication, and real-world operational workflow.
https://denizhalil.com/2025/12/15/python-c2-server-red-teaming-guide/#CyberSecurity #RedTeam #C2 #commandandcontrol #Python #offensivesecurity #Pentesting #infosec #threatdetection #blueteam #securityengineering #ethicalhacking
-
FuelCMS doesn't validate the Host header on password reset requests.
Spoof it, trigger a reset for a valid user, and the app sends them a legitimate-looking email with your server in the link. They click. You get the token.
PTT-2025-029 / CVE-2026-30459, CVSS 7.1 High. No fix coming (vendor's been quiet for ~4 years).
Full PoC: https://pentest-tools.com/research -
Genuinely wigging out about AI taking my job. Like, actually losing sleep over it.
My grand strategy: pivot to OT/ICS and hardware. Hardware because AI doesn't have hands (yet?). OT/ICS because I assume people still prefer their facilities/cars/planes to not explode when the AI goes the extra mile.
Is it a good plan? Probably no. Do I have a backup? Also no.
Looking for some assurance Iโm crazy and wrong or correct and doing the right thing.
#infosec #icssecurity #hardwarehacking #careeradvice #offensivesecurity
-
The cybersecurity certification landscape
https://negativepid.blog/the-cybersecurity-certification-landscape/#defensiveSecurity #threatHunting #forensics #offensiveSecurity #ethicalHacking #cybersecurityCareers #cybersecurityCerts #certifications #Cybersecurity #ITcareers #onlineSecurity #negativepid
-
"It's just dev mode."
PTT-2025-028 / CVE-2026-30461 disagrees. Any authenticated user on a FuelCMS dev instance can drop a PHP shell via git submodule and call it from the browser. One HTTP request. Full RCE. CVSS 8.8 High.
No patch coming. Project's been dormant for almost 4 years.
Found by Raul Bledea and Matei "Mal" Bฤdฤnoiu.Full PoC: https://pentest-tools.com/research
-
๐ดโโ ๏ธ Least privilege? FuelCMS didn't get the memo.
Any authenticated user (regardless of role) can call the Blocks module endpoint. Pair that with PTT-2025-026 and a low privilege (one could even say zero-permission) account becomes full RCE. CVSSv3 goes from 5.4 to 8.8 faster than you can say "access denied."
No patch. ~4 years of unmaintained software. You know the drill.
Matei "Mal" Bฤdฤnoiu and Raul Bledea found the gap. Full PoC can be found in our Offensive Security Research Hub: https://pentest-tools.com/research
-
The cybersecurity certification landscape
https://negativepid.blog/the-cybersecurity-certification-landscape/#defensiveSecurity #threatHunting #forensics #offensiveSecurity #ethicalHacking #cybersecurityCareers #cybersecurityCerts #certifications #Cybersecurity #ITcareers #onlineSecurity #negativepid
-
One does not simply exfiltrate a reset token using an email array.
And yet, Frodo (Matei "Mal" Bฤdฤnoiu) and Samwise (Raul Bledea) from Pentest-Tools.com did exactly that in FuelCMS.
Know someone's email? That's enough. Slip your address alongside theirs in a โforgot passwordโ request and the token lands in your inbox. Their account is yours. You shall not (safely) parse!๐ง
Chain it with PTT-2025-026 and you're looking at a 9.8 Critical unauthenticated RCE. One array to rule them all! ๐
Full PoC here: https://pentest-tools.com/research
#offensivesecurity #vulnerabilityresearch #infosec #accounttakeover
-
"Accuracy" gets thrown around a lot. But for practitioners doing the actual work, it means something specific.
Not a buzzword. A daily constraint.
So what does it translate to for you?#offensivesecurity #ethicalhacking #vulnerabilityassessment
When you need accuracy, what does that actually mean for your work?
Vote below ๐
-
๐ดโโ ๏ธ One backslash. Full RCE. That's PTT-2025-026 in a nutshell. Discovered by our Pentest-Tools.com team
FuelCMS uses Dwoo to keep PHP code out of templates. Turns out, it forgot about โ\โ.
Escape the string. Inject the code. Own the server.
CVSSv3 8.8 High or 9.8 Critical if you chain it with our previous FuelCMS finding (PTT-2025-025 - unauthenticated account takeover). No patch coming either. The project's been on fumes for almost 4 years.
Our colleagues Matei "Mal" Bฤdฤnoiu and Raul Bledea did the digging. Full PoC and exploit is added here: https://pentest-tools.com/research
-
This Startupโs AI Beat 99% Of Humans In Six Elite Hacking Competitions https://www.forbes.com/sites/thomasbrewster/2026/03/17/ai-beat-most-humans-in-elite-hacking-competitions/ #cybersecurity #AI #AIHacking #OffensiveSecurity #AIAgent #AgenticAI #Tenzai #CTF
-
Forgot your password? No worries, we attackers can reset even the admin's. ๐
PTT-2025-030: Matei "Mal" Bฤdฤnoiu and Raul Bledea from our team found SQL injection hiding inside the password reset flow of FuelCMS v1.5.2.
The parameters meant to verify your reset token and email? Both injectable.
So a valid reset token becomes a master key to:
๐๏ธ Dump the entire database
๐ Reset any account's password, not just yours
โ๏ธ Modify or delete content across the site as the adminCVSS: 7.7 High. No fix is coming, the FuelCMS master branch hasn't seen a commit in ~4 years. We emailed the vendor. They're as quiet as an unmonitored server at 3am.
See the full technical breakdown in the comments. ๐
-
Just published my research paper on Basilisk an open-source AI red-teaming framework that uses genetic
algorithms to evolve adversarial prompts automatically. Instead of static jailbreak lists, Basilisk breeds attacks.Paper: https://doi.org/10.5281/zenodo.18909538
Code: https://github.com/regaan/basilisk
pip install basilisk-ai
#LLMSecurity #AIRedTeaming #OffensiveSecurity #InfoSec
#RedTeam #OWASP #CyberSecurity #OpenSource #Research -
Seven bugs. One unauthenticated RCE chain. Zero clicks.
This original research by our offensive security team into FuelCMS (v1.5.2) uncovered seven new vulnerabilities. By chaining some of them, we achieved Remote Code Execution (RCE).
The root causes? A *12-year-old Dwoo templating engine* and *outdated CodeIgniter3 code* still lurking in production systems.
The exploit chain combines:
๐ Account takeover (PTT-2025-025): reset password tokens leaked by sending them to the attacker's inbox
๐ SQL injection (PTT-2025-030): usernames extracted during password reset (optional step)
โก PHP code execution (PTT-2025-026): unsanitized backslashes in the Dwoo parser resulting in RAW PHP CODE EXECUTION
Result: full web app compromise.
We published the full exploit chain on our blogpost so practitioners can reproduce and validate the findings. Read the detailed research here: https://pentest-tools.com/blog/throwing-a-spark-in-fuelcms
Many thanks to Matei Badanoiu, Raul Bledea and Eusebiu Boghici for their contributions.
#offensivesecurity #vulnerabilityresearch #pentesting #infosec
Out of curiosity: how often do you still run into 10+ year-old libraries during engagements?
-
We just launched the Offensive Security Research Hub on Pentest-Tools.com!
This isnโt a CVE recap page.Our #offensivesecurity team - led by Matei Badanoiu (CVE Jesus) - publishes original research: newly discovered vulnerabilities, deep technical write-ups, and full exploit chains built from real-world investigation.
Youโll see:
๐ ๏ธ Working PoCs and reproducible exploit paths
๐ง The exact reasoning that turned strange behavior into confirmed impact
โ๏ธ Field-tested analysis of edge cases, constraints, and trade-offs
No summaries. No recycled advisories.
This is practitioner-grade research from people who _actively_ hunt and validate vulnerabilities.
If you want to understand how experienced attackers approach complex targets, start here.
Bookmark this link, we're going to update it frequently with new learnings: https://pentest-tools.com/research
-
El lado del mal - Mรกster Online en Seguridad Ofensiva del Campus Internacional de Seguridad 2026: Comienzo el 24 de Marzo https://www.elladodelmal.com/2026/02/master-online-en-seguridad-ofensiva-del.html #Master #Cibersegurida #OCSP #Formaciรณn #OffensiveSecurity
-
๐๏ธ ๐ก๐ผ๐ฟ๐๐ต๐ฆ๐ฒ๐ฐ ๐ฎ๐ฌ๐ฎ๐ฒ ๐๐ผ๐ฟ๐บ๐ฎ๐ต๐ถ๐ผ๐ป๐ด/๐ง๐ฟ๐ฎ๐ถ๐ป๐ถ๐ป๐ด (7/12): "Offensive Development Practitioner Certification (ODPC)" ๐ฝ๐ฎ๐ฟ/๐ฏ๐ Munaf Shariff (White Knight Labs)
๐ Dates: May 11, 12 and 13, 2026 (3 days)
๐ Difficulty: Medium
๐ฅ๏ธ Mode: Hybrid (on-site & remote)Description: "๐๐ฉ๐ฆ ๐๐ง๐ง๐ฆ๐ฏ๐ด๐ช๐ท๐ฆ ๐๐ฆ๐ท๐ฆ๐ญ๐ฐ๐ฑ๐ฎ๐ฆ๐ฏ๐ต ๐๐ณ๐ข๐ค๐ต๐ช๐ต๐ช๐ฐ๐ฏ๐ฆ๐ณ ๐๐ฆ๐ณ๐ต๐ช๐ง๐ช๐ค๐ข๐ต๐ช๐ฐ๐ฏ (๐๐๐๐) ๐ช๐ด ๐ฅ๐ฆ๐ด๐ช๐จ๐ฏ๐ฆ๐ฅ ๐ต๐ฐ ๐ต๐ข๐ฌ๐ฆ ๐บ๐ฐ๐ถ ๐ฅ๐ฆ๐ฆ๐ฑ ๐ช๐ฏ๐ต๐ฐ ๐ต๐ฉ๐ฆ ๐ณ๐ฆ๐ข๐ญ๐ช๐ต๐ช๐ฆ๐ด ๐ฐ๐ง ๐ฎ๐ฐ๐ฅ๐ฆ๐ณ๐ฏ ๐ฅ๐ฆ๐ง๐ฆ๐ฏ๐ด๐ฆ ๐ฆ๐ท๐ข๐ด๐ช๐ฐ๐ฏ ๐ข๐ฏ๐ฅ ๐ฐ๐ง๐ง๐ฆ๐ฏ๐ด๐ช๐ท๐ฆ ๐ต๐ฐ๐ฐ๐ญ๐ช๐ฏ๐จ, ๐ฑ๐ณ๐ฐ๐ท๐ช๐ฅ๐ช๐ฏ๐จ ๐ต๐ฉ๐ฆ ๐ฉ๐ข๐ฏ๐ฅ๐ด-๐ฐ๐ฏ ๐ฆ๐น๐ฑ๐ฆ๐ณ๐ช๐ฆ๐ฏ๐ค๐ฆ ๐ฏ๐ฆ๐ฆ๐ฅ๐ฆ๐ฅ ๐ต๐ฐ ๐ฐ๐ฑ๐ฆ๐ณ๐ข๐ต๐ฆ ๐ข๐ต ๐ข๐ฏ ๐ข๐ฅ๐ท๐ข๐ฏ๐ค๐ฆ๐ฅ ๐ญ๐ฆ๐ท๐ฆ๐ญ. ๐๐ฉ๐ณ๐ฐ๐ถ๐จ๐ฉ ๐ญ๐ช๐ท๐ฆ, ๐ช๐ฏ๐ด๐ต๐ณ๐ถ๐ค๐ต๐ฐ๐ณ-๐ด๐ถ๐ฑ๐ฑ๐ฐ๐ณ๐ต๐ฆ๐ฅ ๐ญ๐ข๐ฃ๐ด, ๐บ๐ฐ๐ถโ๐ญ๐ญ ๐ญ๐ฆ๐ข๐ณ๐ฏ ๐ฉ๐ฐ๐ธ ๐ต๐ฐ ๐ฐ๐ท๐ฆ๐ณ๐ค๐ฐ๐ฎ๐ฆ ๐ณ๐ฆ๐ข๐ญ-๐ธ๐ฐ๐ณ๐ญ๐ฅ ๐ด๐ฆ๐ค๐ถ๐ณ๐ช๐ต๐บ ๐ฎ๐ฆ๐ค๐ฉ๐ข๐ฏ๐ช๐ด๐ฎ๐ด ๐ฃ๐บ ๐ธ๐ฐ๐ณ๐ฌ๐ช๐ฏ๐จ ๐ฅ๐ช๐ณ๐ฆ๐ค๐ต๐ญ๐บ ๐ธ๐ช๐ต๐ฉ ๐๐ฆ๐ณ๐ณ๐ข๐ง๐ฐ๐ณ๐ฎ-๐ฅ๐ฆ๐ฑ๐ญ๐ฐ๐บ๐ฆ๐ฅ ๐ฆ๐ฏ๐ท๐ช๐ณ๐ฐ๐ฏ๐ฎ๐ฆ๐ฏ๐ต๐ด, ๐ฑ๐ฆ๐ณ๐ง๐ฐ๐ณ๐ฎ๐ช๐ฏ๐จ ๐๐ ๐ง๐ช๐ญ๐ฆ ๐ค๐ฐ๐ฏ๐ท๐ฆ๐ณ๐ด๐ช๐ฐ๐ฏ๐ด, ๐ข๐ฏ๐ฅ ๐ฆ๐น๐ฆ๐ค๐ถ๐ต๐ช๐ฏ๐จ ๐ข๐ฅ๐ท๐ข๐ฏ๐ค๐ฆ๐ฅ ๐ฑ๐ณ๐ฐ๐ค๐ฆ๐ด๐ด-๐ช๐ฏ๐ซ๐ฆ๐ค๐ต๐ช๐ฐ๐ฏ ๐ด๐ต๐ณ๐ข๐ต๐ฆ๐จ๐ช๐ฆ๐ด.
๐๐ฉ๐ฆ ๐ค๐ฐ๐ถ๐ณ๐ด๐ฆ ๐ต๐ฉ๐ฆ๐ฏ ๐ฆ๐น๐ฑ๐ข๐ฏ๐ฅ๐ด ๐ช๐ฏ๐ต๐ฐ ๐ฆ๐น๐ฑ๐ฆ๐ณ๐ต-๐ญ๐ฆ๐ท๐ฆ๐ญ ๐ฐ๐ง๐ง๐ฆ๐ฏ๐ด๐ช๐ท๐ฆ ๐ฅ๐ฆ๐ท๐ฆ๐ญ๐ฐ๐ฑ๐ฎ๐ฆ๐ฏ๐ต, ๐ช๐ฏ๐ค๐ญ๐ถ๐ฅ๐ช๐ฏ๐จ ๐ช๐ฏ-๐ฅ๐ฆ๐ฑ๐ต๐ฉ ๐ฆ๐น๐ฑ๐ญ๐ฐ๐ณ๐ข๐ต๐ช๐ฐ๐ฏ ๐ฐ๐ง ๐๐ฐ๐ฃ๐ข๐ญ๐ต ๐๐ต๐ณ๐ช๐ฌ๐ฆ ๐ค๐ฐ๐ฎ๐ฎ๐ข๐ฏ๐ฅ-๐ข๐ฏ๐ฅ-๐ค๐ฐ๐ฏ๐ต๐ณ๐ฐ๐ญ ๐ง๐ณ๐ข๐ฎ๐ฆ๐ธ๐ฐ๐ณ๐ฌ๐ด, ๐ด๐ข๐ฏ๐ฅ๐ฃ๐ฐ๐น ๐ฅ๐ฆ๐ต๐ฆ๐ค๐ต๐ช๐ฐ๐ฏ ๐ฆ๐ท๐ข๐ด๐ช๐ฐ๐ฏ, ๐ข๐ฏ๐ฅ ๐ด๐ฐ๐ฑ๐ฉ๐ช๐ด๐ต๐ช๐ค๐ข๐ต๐ฆ๐ฅ ๐๐๐ ๐ฃ๐บ๐ฑ๐ข๐ด๐ด ๐ต๐ฆ๐ค๐ฉ๐ฏ๐ช๐ฒ๐ถ๐ฆ๐ด. ๐ ๐ฐ๐ถโ๐ญ๐ญ ๐ข๐ญ๐ด๐ฐ ๐ฅ๐ฆ๐ท๐ฆ๐ญ๐ฐ๐ฑ ๐ต๐ฉ๐ฆ ๐ข๐ฃ๐ช๐ญ๐ช๐ต๐บ ๐ต๐ฐ ๐ฅ๐ฆ๐ด๐ช๐จ๐ฏ ๐ข๐ฏ๐ฅ ๐ฅ๐ฆ๐ฑ๐ญ๐ฐ๐บ ๐ค๐ถ๐ด๐ต๐ฐ๐ฎ ๐ฑ๐ข๐บ๐ญ๐ฐ๐ข๐ฅ๐ด, ๐ฃ๐ถ๐ช๐ญ๐ฅ๐ช๐ฏ๐จ ๐ณ๐ฆ๐ง๐ญ๐ฆ๐ค๐ต๐ช๐ท๐ฆ ๐๐๐ ๐ญ๐ฐ๐ข๐ฅ๐ฆ๐ณ๐ด, ๐ฆ๐ฏ๐จ๐ช๐ฏ๐ฆ๐ฆ๐ณ๐ช๐ฏ๐จ ๐๐๐๐ ๐ข๐ฏ๐ฅ ๐๐๐ ๐ฃ๐บ๐ฑ๐ข๐ด๐ด๐ฆ๐ด, ๐ข๐ฏ๐ฅ ๐ค๐ณ๐ข๐ง๐ต๐ช๐ฏ๐จ ๐ต๐ข๐ช๐ญ๐ฐ๐ณ๐ฆ๐ฅ ๐ฐ๐ง๐ง๐ฆ๐ฏ๐ด๐ช๐ท๐ฆ ๐ต๐ฐ๐ฐ๐ญ๐ช๐ฏ๐จ ๐ง๐ณ๐ฐ๐ฎ ๐ต๐ฉ๐ฆ ๐จ๐ณ๐ฐ๐ถ๐ฏ๐ฅ ๐ถ๐ฑ. ๐๐บ ๐ฃ๐ญ๐ฆ๐ฏ๐ฅ๐ช๐ฏ๐จ ๐ฅ๐ฆ๐ฆ๐ฑ ๐ต๐ฆ๐ค๐ฉ๐ฏ๐ช๐ค๐ข๐ญ ๐ช๐ฏ๐ด๐ต๐ณ๐ถ๐ค๐ต๐ช๐ฐ๐ฏ ๐ธ๐ช๐ต๐ฉ ๐ฑ๐ณ๐ข๐ค๐ต๐ช๐ค๐ข๐ญ, ๐ช๐ฏ๐ต๐ฆ๐ณ๐ข๐ค๐ต๐ช๐ท๐ฆ ๐ญ๐ข๐ฃ๐ด, ๐๐๐๐ ๐จ๐ช๐ท๐ฆ๐ด ๐บ๐ฐ๐ถ ๐ต๐ฉ๐ฆ ๐ฌ๐ฏ๐ฐ๐ธ๐ญ๐ฆ๐ฅ๐จ๐ฆ, ๐ด๐ฌ๐ช๐ญ๐ญ๐ด, ๐ข๐ฏ๐ฅ ๐ค๐ฐ๐ฏ๐ง๐ช๐ฅ๐ฆ๐ฏ๐ค๐ฆ ๐ต๐ฐ ๐ถ๐ฏ๐ฅ๐ฆ๐ณ๐ด๐ต๐ข๐ฏ๐ฅโ๐ข๐ฏ๐ฅ ๐ฐ๐ถ๐ต๐ฎ๐ข๐ฏ๐ฆ๐ถ๐ท๐ฆ๐ณโ๐ฎ๐ฐ๐ฅ๐ฆ๐ณ๐ฏ ๐ฅ๐ฆ๐ง๐ฆ๐ฏ๐ด๐ช๐ท๐ฆ ๐ต๐ฆ๐ค๐ฉ๐ฏ๐ฐ๐ญ๐ฐ๐จ๐ช๐ฆ๐ด."
About the trainer:
Munaf Shariff is an offensive development specialist with deep expertise in bypassing modern security mechanisms and building custom offensive tooling that operates effectively in real-world environments.๐ Training details: https://nsec.io/training/2026-offensive-development-practitioner-certification-odpc/
#NorthSec #cybersecurity #offensivesecurity #malware #evasion
-
#CallForSponsors
We are currently open for sponsors and partners for Adversary Village at RSAC 2026, San Francisco.This is an opportunity to collaborate with one of the leading communities focused on #AdversarySimulation and #OffensiveSecurity, and to engage directly with practitioners, researchers, and industry leaders shaping modern security operations.
If you are interested in partnering with us for RSAC 2026, feel free to reach out: https://adversaryvillage.org/sponsors/ -
๐จ Supply Chain Attack Simulation on Drupal (PoC, not a CVE)
What if a malicious actor hijacked the update server for your favorite CMS?
I built a full lab scenario to demonstrate how it could happen โ and how to defend against it.๐ฌ Techniques covered:
MITM + rogue CA, fake update feeds, trojanized package โ RCE & persistence.
Full doc + PDF PoC.Full documentation: attack steps, scripts (in PDF), hardening tips
โ ๏ธ Not a Drupal 0-day โ this is a controlled, educational simulation for awareness and training.
๐ก Why it matters
Supply chain attacks are no longer theoretical.
This demo helps Blue Teams, Red Teams, developers, and trainers strengthen detection, review processes, and update security.Questions or feedback?
DM me or email me (contact in README).All in lab, all safe
#cybersecurity #infosec #securityresearch #offensivesecurity #blueteam
#redteam #supplychainsecurity #drupal #websecurity #devsecops
#softwaresecurity #rce #mitm -
DefCamp 2025, you were so awesome! โก๏ธ
Another year, another incredible edition in the books. We are so proud to have been part of this event once again and to see the community showing up in full force in Bucharest.
Huge kudos to the organizers for pulling off such a great gathering. It was a blast seeing so many familiar faces and meeting so many new people who share our passion for breaking things (for the right reasons).
A few highlights from our team:
๐ค The talks: It was a big year for our research team on stage!
Our Founder & CEO, Adrian Furtuna, explored how LLMs are changing the game in "VIBE Pentesting" (enhancing the human hacker, not replacing them!).
Our Offensive Security Research Lead, Matei "CVE Jesus" Bฤdฤnoiu, took us deep into the "Nightmare Factory," breaking down the process behind the 15 fresh 0-days the team found this year.
๐บ Missed them live? Don't worry, we'll be sharing the recordings on our YouTube channel soon, so keep an eye out!
๐ The swag: We knew our new merch was cool, but that line?! Seeing so many of you waiting to grab a Pentest-Tools.com T-shirt was a massive compliment. We hope you wear them while you hunt your next bug.
Weโre already looking forward to the next one!
#DefCamp2025 #OffensiveSecurity #InfosecCommunity #Cybersecurity #Pentesting
-
๐ป This Halloween, make sure *you* haunt vulnerabilities - not the other way around. ๐
October updates are here, and theyโre a real treat for security teams.
Check out the new powers you can use to keep monsters out:
๐ธ๏ธ Catch 2 new RCEs before attackers do (Fortra GoAnywhere & SolarWinds).
๐ฏ Validate #SessionReaper safely with Sniper: Auto-Exploiter.
โ๏ธ Scan private Azure environments securely with our new VPN Agent.
๐ Download multiple reports in one go (no more manual horrors).
๐ See how we help MSPs, consultants & internal teams - and hear it from them if we do a good job (or not).๐ญ Check the changelog for the full basket: https://pentest-tools.com/change-log
#cybersecurity #vulnerabilitymanagement #offensivesecurity #azure
-
๐ Manual effort slows you down. Hereโs how we sped things up this September โก
๐น Sniper: Auto-Exploiter ๐ 4 new modules for Fortinet (CVE-2025-25256), SharePoint (CVE-2025-53771 & 49704), FreePBX (CVE-2025-57819), and OpenSSH (CVE-2018-15473)
๐น Network Scanner ๐ Targeted detection for SonicWall SonicOS (CVE-2024-40766).
๐น Vanta integration ๐ Automatic vulnerability syncing. 32 mapped tests, daily updates, zero manual uploads.
๐น Azure internal scans ๐ Run internal vulnerability scans directly in Azure.
๐น Customer Story ๐ Learn how Chill IT, a security-driven MSP, uses Pentest-Tools.com to qualify clients and strengthen proposals.๐ Check the video for the full details: https://youtu.be/1kNX9IsQg1o
#cybersecurity #vulnerabilitymanagement #offensivesecurity #vanta #azure
-
๐จโ๐ป Want to work at Epieos?
Meet us at Hexacon 2025!๐ก๏ธ Hexacon is a world-class event for enthusiasts of #OffensiveSecurity and #ReverseEngineering.
๐ค Weโll be there to meet exceptional talents, curious, rigorous, and driven by the desire to use their technical #skills, particularly in reverse engineering, to help us develop #OSINT 0days that protect and save human lives.
๐Hexacon in Paris, October 10โ11.
๐ฎ And if you canโt attend in person, feel free to send us your #CV for a #ReverseEngineer position or to learn more about our needs at: contact[at]epieos[dot]com.
-
Weโre at IT-SA 2025 in Nuremberg with our partner Allnet, starting today through Oct 9 ๐
๐๐ผ Find us at Booth 6-432 and come say hi to Robert (Product Manager) and Jan (Channel Account Manager).
Stop by for a live demo to see how Pentest-Tools.com helps you:
โข Simplify assessments by scanning network, web, and API in one toolkit
โข Prove real-world impact with automatically validated findings and actionable PoCs
โข Save hours with client-ready, customizable reportsMore info about the event โก๏ธ https://www.itsa365.de/en/it-sa-expo-congress/exhibition-info
๐๏ธ We still have a small batch of tickets available. First-come, first-served. DM us and weโll share a code ๐คซ
-
๐ค NightmareFactory drops at #DefCamp 2025 ๐ฑ
Live from Bucharest, on Nov 13โ14.After digging into Odoo, Gitea, and FileCloud in 2024, Matei Badanoiu and Catalin Iovita from our team at Pentest-Tools.com leveled up their 0-day hunting game.
๐จ In 2025 alone:
๐งฉ they reported ~15 new 0-days
โ๏ธ Built fresh vulnerability chains
๐ฅ And got one-click RCE from seemingly โlowโ bugsTheir talk breaks down:
๐ How the team evolved their approach
๐ง Why chaining bugs changes the impact game
๐ What they learned about turning niche findings into real-world exploitation pathsIf youโre into #offensivesecurity, vuln research, or just love a good โwaitโฆ that worked?!โ moment โ
๐ Donโt miss NightmareFactory at DefCamp! --> https://def.camp/
-
๐ง 100 Offensive Linux Security Tools โ Awareness & Research (Authorized Use Only) โ๏ธ
#OffensiveSecurity #RedTeam #PenTesting #Infosec #CyberSecurity #KaliLinux #EthicalHacking #BlueTeam #ThreatHunting #SecurityTools
-
Nach einer betriebsbedingten Kรผndigung bin ich derzeit auf Jobsuche im Bereich #itsecurity / #offensivesecurity / #penetrationtest
Ihr kennt jemanden, der jemanden kennt? Gern teilen, danke!
Verfรผgbarkeit: 01.01.2026
Modalitรคten: ca. 32h/Woche, Remote bzw. im Raum Magdeburg