Advertisement · 728 × 90

Posts by Frycos

Fortunately, humans still learn to walk first, even though the car has been invented.

2 months ago 1 0 0 0

Highly recommend the writeup from our @fl0mb.bsky.social and congrats on this well-deserved achievement!

2 months ago 4 3 0 0

[RSS] [Blog] Unauthenticated RCE in NetSupport Manager - A Technical Deep Dive


code-white.com ->

CVE-2025-34164, CVE-2025-34165


Original->

2 months ago 2 2 0 0

Crazy work by my colleague Fabian. High impact target: one might be amazed at how widespread this product is in industrial networks.

2 months ago 3 2 0 0

Medical 🫣

4 months ago 0 0 0 0
Preview
CODE WHITE | Public Vulnerability List Public list of vulnerabilities, found by CODE WHITE

In 2025 my colleague and me pwned several widespread medial devices. Check our vuln list for some impressions and get ready for cool blog posts and hopefully conference talks in 2026. 🤞🏻

code-white.com/public-vulne...

4 months ago 2 1 1 0
Preview
CODE WHITE - Applicants Challenge Applicants Challenge! Face real-world vulns, earn trophies, First Bloods & epic swag!

Our 2024 applicants challenge is officially #roasted: the full BeanBeat × Maultaschenfabrikle walkthrough is now online. Unwrap the write-up at apply-if-you-can.com/walkthrough/... and revisit the hacks that escalated from cold brew to full breach.

4 months ago 6 6 0 0
Advertisement
Post image

Just sayin‘ 🤷

5 months ago 4 2 0 0

A somewhat wild internal story from the last few weeks

5 months ago 0 0 0 0
Preview
Im Dunkeln mit Ansage? Die Akte Blackout Podcast-Folge · Quarks Science Cops · 28.06.2025 · 1 Std. 5 Min.

podcasts.apple.com/de/podcast/q...

5 months ago 0 0 0 0
A Hands-On Edition: Will Supabase Be the Next Firebase (At Least in Terms of Security)? It all started with my good colleague @schniggie who’s got my attention with an X post earlier that year. Until then I rarely heared of Supabase, but let us start from the scratch. Firebase changed th...

Did you encounter the Supabase? Might wanna try my newest tooling or have a read about quickwins? There you go:
blog.m1tz.com/posts/2025/1...

6 months ago 2 1 0 0

On your way to @brucon! Are you interested in technical discussions or would you like to know what makes our company so unique? Just talk to us.

6 months ago 3 1 0 0

Tired of dull, standard interviews? Talk to Kurt. Also, a few of my colleagues and I will be attending BruCON next week. Feel free to come and talk to us.

7 months ago 6 1 0 0

New AI-generated "technical" blog posts are stealing my time. 🤬

7 months ago 2 0 0 0
Original post on infosec.exchange

Yes, there’s another phishing campaign contacting fediverse users to fill out a form to avoid being suspended or whatever. Stay calm and just report them and be sure to check the option to inform their home instance so the account gets suspended for everyone.

Also, please consider enabling […]

7 months ago 8 45 3 0
Advertisement
Preview
FAUST CTF 2025 | FAUST CTF 2025 FAUST CTF 2025 is an online attack-defense CTF competition run by FAUST, the CTF team of Friedrich-Alexander University Erlangen-Nürnberg

We always love a good challenge. That’s why we’re sponsoring the 10th FAUST CTF. Game on at 2025.faustctf.net

7 months ago 7 6 0 0

Today I have a more serious topic than usual, please consider reposting for reach:

My wife and I are urgently looking for a specialist in neuropediatrics or a similar field for our autistic child with a diagnosed, but not further specified, movement disorder [1/4]

8 months ago 4 23 1 0
Preview
GitHub - codewhitesec/NewRemotingTricks: New exploitation tricks for hardened .NET Remoting servers New exploitation tricks for hardened .NET Remoting servers - codewhitesec/NewRemotingTricks

We've added a new demo to NewRemotingTricks that makes deploying a MarshalByRefObject (e.g., WebClient) even easier: System.Lazy<T> creates an instance of T on serialization, which is probably more likely to be allowed than a XAML gadget getting through. github.com/codewhitesec...

8 months ago 4 4 0 1

Wow, I wrote with an author of a cool VR blog post yesterday. Just asked for some more explanations and maybe references. Tl;dr: he couldn’t explain or elaborate because exactly this part of the blog was written by GPT…

8 months ago 2 0 0 0
Post image

We have reproduced "ToolShell", the unauthenticated exploit chain for CVE-2025-49706 + CVE-2025-49704 used by @_l0gg (on X) to pop SharePoint at #Pwn2Own Berlin 2025, it's really just one request! Kudos to @mwulftange.bsky.social

9 months ago 4 5 1 1
Zyxel NWA50AX Pro - Discovery of an Nday Variant Today was an eventful day thanks to many interesting blog posts, e.g. from my friends at watchTowr. So I thought, why not publish a small quick-and-dirty blog post myself about a story from last week?...

A quick-and-dirty late night blog post on discovering an nday variant in Zyxel NWA50AX Pro devices

frycos.github.io/vulns4free/2...

10 months ago 3 2 0 0

Oh no, it's a variant of CVE-2024-29974...I accidentally found that a similar vuln affected Zyxel NWA50AX (Pro) and tested against devices (obviously) lacking the latest patches. This CVE was never publicly related to NWA50AX, though. Well, nice nday exercise then.

10 months ago 4 0 0 0

B03701066A0F762E75BAA67816EDB223F8681C9444C34E0B768DE518268025A0

Am I on vacation in the mountains? Yes. Do they have network equipment there? Yes. Can I refrain from doing VR? No.

You know the drill: disclosure and blog post planned. 😄

10 months ago 5 0 0 1
CODE WHITE | Analyzing the Attack Surface of Ivanti's DSM Ivanti's Desktop & Server Management (DSM) product is an old acquaintance that we have encountered in numerous red team and internal assessments. The main purpose of the product is the centralized dis...

Yes, we're beating a dead horse. But that horse still runs in corporate networks - and quietly gives attackers the keys to the kingdom. We're publishing what’s long been exploitable. Time to talk about it. #DSM #Ivanti code-white.com/blog/ivanti-...

11 months ago 8 8 0 1
Advertisement

If you are in the US and upset at the AfD being subject to more surveillance now:

The bar to be declared "in conflict with the democratic order" is *very* high. It is literally the AfD definition of "Germanness" by your ancestry, declaring ppl of other ancestries inferior, that did it, justifiedly.

11 months ago 60 7 1 0
GFI MailEssentials - Yet Another .NET Target What is this product GFI MailEssentials all about? We’re living the future, right? So let’s ask the GFI AI.

My blog post on some vulns in GFI MailEssentials

frycos.github.io/vulns4free/2...

11 months ago 7 7 0 0
Post image

🧵 THREAD: A federal whistleblower just dropped one of the most disturbing cybersecurity disclosures I’ve ever read.

He's saying DOGE came in, data went out, and Russians started attempting logins with new valid DOGE passwords

Media's coverage wasn't detailed enough so I dug into his testimony:

1 year ago 13994 7345 328 1005
Post image

That sums up my week's vacation pretty well. And I have to say, I like it.

1 year ago 2 0 0 0
Preview
CVE-2025-22457 | AttackerKB On April 3, 2025, Ivanti published an advisory for CVE-2025-22457, an unauthenticated remote code execution vulnerability due to a stack based buffer overflow.…

We have just published our AttackerKB @rapid7.com Analysis of CVE-2025-22457, an unauthenticated stack based buffer overflow in Ivanti Connect Secure. Difficult to exploit due to severe character restrictions, we detail our full RCE technique here: attackerkb.com/topics/0ybGQ...

1 year ago 3 4 1 0
Exploiting IngressNightmare: A Deep Dive Wiz recently discovered an unauthenticated remote code execution (RCE) vulnerability in the Ingress NGINX admission controller. I found the exploit chain particularly intriguing and decided to recreat...

blog.flomb.net/posts/ingres...

1 year ago 5 3 0 0