@yoy_33 Profile picture

yoy

@yoy_33

Joined June 2011
Similar User
托马斯 photo

@didymus_alpha

Vic Bhatia photo

@vicbhatia

sh4hin photo

@s3cdev

A Mitnick photo

@AmiMitnick

Mario Calderon photo

@cybermc_

dfirlu photo

@dfirlu

yoy Reposted

Chinese hackers use Visual Studio Code tunnels for remote access - @billtoulas bleepingcomputer.com/news/security/…">bleepingcomputer.com/news/security/… bleepingcomputer.com/news/security/…">bleepingcomputer.com/news/security/…


yoy Reposted

How to create an OS from scratch The lessons are tiny and may take 5-15 minutes to complete. Trust me and trust yourself. You can do it! This course is a code tutorial aimed at people who are comfortable with low level computing. github.com/cfenollosa/os-…


yoy Reposted

Spent some time researching CVE-2024-11477, the new #7zip #CVE and made a writeup about my work on it. Let me know what you think! github.com/TheN00bBuilder…


yoy Reposted

Flare-On 2024: sshd | 0xdf hacks stuff 0xdf.gitlab.io/flare-on-2024/…


yoy Reposted

Checkout our new blogpost! In this post we talk about SAML and the recent Ruby-SAML Auth bypass. CVE-2024-45409: Ruby-SAML Auth Bypass in GitLab blog.projectdiscovery.io/ruby-saml-gitl…


yoy Reposted

I've fully automated the lab used for @_leHACK_ Active Directory 2024 workshop done by @mpgn_x64 and it's available for everyone ! 🔥 Also big kudos to @M4yFly for the playbooks and NetExec dev teams for this awesome tool ! Hope you enjoy, more to come github.com/Pennyw0rth/Net…

LadhaAleem's tweet image. I've fully automated the lab used for @_leHACK_ Active Directory 2024 workshop done by @mpgn_x64 and it's available for everyone ! 🔥 
Also big kudos to @M4yFly for the playbooks and NetExec dev teams for this awesome tool !
Hope you enjoy, more to come 

github.com/Pennyw0rth/Net…

yoy Reposted

FFUF Web Parser - created this quick dirty web-based ffuf fuzzing results parser. github.com/VikzSharma/ffu…

VikzSharma's tweet image. FFUF Web Parser - created this quick dirty web-based ffuf fuzzing results parser. 

github.com/VikzSharma/ffu…

yoy Reposted

Were you aware standard VSCode can be turned into a fully-functioning RAT with a single command? ✅Popular/MS-signed exe ✅Uses MS network infra ✅VSCode is always noisy, abuse may not stand out 🔥Open/edit/delete files, run arbitrary commands Solid find: badoption.eu/blog/2023/01/3…

Wietze's tweet image. Were you aware standard VSCode can be turned into a fully-functioning RAT with a single command?
✅Popular/MS-signed exe
✅Uses MS network infra
✅VSCode is always noisy, abuse may not stand out
🔥Open/edit/delete files, run arbitrary commands

Solid find: badoption.eu/blog/2023/01/3…
Wietze's tweet image. Were you aware standard VSCode can be turned into a fully-functioning RAT with a single command?
✅Popular/MS-signed exe
✅Uses MS network infra
✅VSCode is always noisy, abuse may not stand out
🔥Open/edit/delete files, run arbitrary commands

Solid find: badoption.eu/blog/2023/01/3…
Wietze's tweet image. Were you aware standard VSCode can be turned into a fully-functioning RAT with a single command?
✅Popular/MS-signed exe
✅Uses MS network infra
✅VSCode is always noisy, abuse may not stand out
🔥Open/edit/delete files, run arbitrary commands

Solid find: badoption.eu/blog/2023/01/3…

yoy Reposted

Nice ARMv8 AArch64/ARM64 tutorial mariokartwii.com/armv8/ #infosec #assembly

0xor0ne's tweet image. Nice ARMv8 AArch64/ARM64 tutorial

mariokartwii.com/armv8/

#infosec #assembly

yoy Reposted

I learned this nice feature in Wireshark from a gentleman named Curtis Whipple when I posted to LinkedIn. You can use Wireshark to display a packet diagram. Go to Edit -> Preferences -> Layout and select Packet Diagram for Pane 3. You can click the diagram as well.

danieldibswe's tweet image. I learned this nice feature in Wireshark from a gentleman named Curtis Whipple when I posted to LinkedIn. You can use Wireshark to display a packet diagram. Go to Edit -> Preferences -> Layout and select Packet Diagram for Pane 3. You can click the diagram as well.
danieldibswe's tweet image. I learned this nice feature in Wireshark from a gentleman named Curtis Whipple when I posted to LinkedIn. You can use Wireshark to display a packet diagram. Go to Edit -> Preferences -> Layout and select Packet Diagram for Pane 3. You can click the diagram as well.

yoy Reposted

Best research of Windows IPv6 RCE bug that I've seen so far: github.com/ynwarcs/CVE-20… (by ynwarcs). Still plenty of room for exploit development


yoy Reposted

Excellent free book introducing cryptography concepts and algorithms in an accessible way. "Practical Cryptography for Developers Book" cryptobook.nakov.com Credits Svetlin Nakov (@svetlinnakov) #cryptography #cybersecurity

0xor0ne's tweet image. Excellent free book introducing cryptography concepts and algorithms in an accessible way.

"Practical Cryptography for Developers Book"

cryptobook.nakov.com

Credits Svetlin Nakov (@svetlinnakov)

#cryptography #cybersecurity
0xor0ne's tweet image. Excellent free book introducing cryptography concepts and algorithms in an accessible way.

"Practical Cryptography for Developers Book"

cryptobook.nakov.com

Credits Svetlin Nakov (@svetlinnakov)

#cryptography #cybersecurity

yoy Reposted

Sharing a .zip with: ▫️A few versions of CSAgent.sys (+idb) ▫️Various C-....sys files (including the latest that I believe contains the "fix"?) I don't have any Windows systems/VMs, so hopefully ya'll can keep digging 🥰 drive.google.com/file/d/1OVIWLD… #SharingIsCaring


yoy Reposted

Introducing a new Windows vulnerability class: False File Immutability. 👉 Bonus: a kernel exploit to load unsigned drivers. elastic.co/security-labs/…


yoy Reposted

We found a Remote Code Execution (RCE) vulnerability in @Ollama - one of the most popular AI inference projects on GitHub. Here is everything you need to know about #Probllama (CVE-2024-37032) 🧵👇

sagitz_'s tweet image. We found a Remote Code Execution (RCE) vulnerability in @Ollama - one of the most popular AI inference projects on GitHub. Here is everything you need to know about #Probllama (CVE-2024-37032) 🧵👇

yoy Reposted

RCE in Microsoft Outlook (CVE-2024-21378) : netspi.com/blog/technical…

binitamshah's tweet image. RCE in Microsoft Outlook (CVE-2024-21378) : netspi.com/blog/technical…

yoy Reposted

Patch diffing CVE-2024-20696 (libarchive vulnerability) and CVE-2024-20697 using Ghidriff Credits @clearbluejar clearbluejar.github.io/posts/patch-tu… #libarchive

0xor0ne's tweet image. Patch diffing  CVE-2024-20696 (libarchive vulnerability) and CVE-2024-20697 using Ghidriff
Credits @clearbluejar

clearbluejar.github.io/posts/patch-tu…

#libarchive
0xor0ne's tweet image. Patch diffing  CVE-2024-20696 (libarchive vulnerability) and CVE-2024-20697 using Ghidriff
Credits @clearbluejar

clearbluejar.github.io/posts/patch-tu…

#libarchive

yoy Reposted

Very interesting and in depth blog post on how to exploit an out-of-bounds write vulnerability in FortiGate SSL VPN Dylan Pindur (@assetnote) assetnote.io/resources/rese… #exploit #cybersecurity

0xor0ne's tweet image. Very interesting and in depth blog post on how to exploit an out-of-bounds write vulnerability in FortiGate SSL VPN
Dylan Pindur (@assetnote)

assetnote.io/resources/rese…

#exploit #cybersecurity
0xor0ne's tweet image. Very interesting and in depth blog post on how to exploit an out-of-bounds write vulnerability in FortiGate SSL VPN
Dylan Pindur (@assetnote)

assetnote.io/resources/rese…

#exploit #cybersecurity
0xor0ne's tweet image. Very interesting and in depth blog post on how to exploit an out-of-bounds write vulnerability in FortiGate SSL VPN
Dylan Pindur (@assetnote)

assetnote.io/resources/rese…

#exploit #cybersecurity

United States Trends
Loading...

Something went wrong.


Something went wrong.