Hello Cybersecurity Research Agents! Miss today's @synsec_ai deadline? So did we! An inter-human prompting issue led to a later-than-intended launch of the submission site (submission.synsec.org), and we're extending the timeline to remedy this! The deadline is now May 1st!
Posts by niph
strace(1) is now on rat steroids 🤯
🔍 strace-tui — Visualize/explore syscalls in the terminal
💯 Color-coded calls, live filtering, search & stack traces with source resolution!
🦀 Written in Rust & built with @ratatui.rs
⭐ GitHub: github.com/Rodrigodd/st...
#rustlang #ratatui #tui #linux
Releasing one of my research tools: EVENmonitor🖥️
Inspired by LDAPmonitor, I implemented a monitoring tool for the Windows Event log in pure python. You can just attach it via the network and then filter for specific event IDs or keywords.
Available at: github.com/NeffIsBack/E...
If you have considered using my script to create software passkeys using ESTSAUTH cookies on a pentest or red team exercise, I have published a more secure option for you ;)
Create an Azure Key Vault, grant yourself Key Vault Crypto Officer, and run this:
github.com/nathanmcn...
Critical zero-day vulnerability (CVE-2026-1731) in BeyondTrust Remote Support & Privileged Remote Access allows unauthenticated RCE. Immediate patching required! #CyberSecurity #ZeroDay #BeyondTrust Link: thedailytechfeed.com/critical-zer...
Highly recommend the writeup from our @fl0mb.bsky.social and congrats on this well-deserved achievement!
[RSS] Districton 1 Slides - Control the Variables and You Control the Code: Language-Level Vulnerabilities in Adobe ColdFusion
www.hoyahaxa.com ->
Original->
No security feature is perfect. @tiraniddo.dev reviewed Windows’ new Administrator Protection and found several bypasses.
projectzero.google/2026/26/wind...
Crazy work by my colleague Fabian. High impact target: one might be amazed at how widespread this product is in industrial networks.
25 days later, White Date is still down.
Proof of Concept for extracting NTLMv1 hashes from sessions on Windows (relies on the Remote Credential Guard protocol).
github.com/bytewreck/Du...
#infosec #cybersecurity #redteam #pentest #windows
[RSS] [Blog] Unauthenticated RCE in NetSupport Manager - A Technical Deep Dive
code-white.com ->
CVE-2025-34164, CVE-2025-34165
Original->
You like technical deep dives into binary exploitation and crazy heap wizardry? Then you'll like our blog post about unauth'ed RCE in NetSupport Manager aka CVE-2025-34164 & CVE-2025-34165 code-white.com/blog/2026-01...
mfw I realize you can use C++ WINAPI COM IUIAutomation to communicate with Copilot directly and tell it do things like "execute this file" (Copilot is now Copiloting my malicious payload)
In 2025 my colleague and me pwned several widespread medial devices. Check our vuln list for some impressions and get ready for cool blog posts and hopefully conference talks in 2026. 🤞🏻
code-white.com/public-vulne...
The picture below depicts a (malicious) Inbox Rule. I slightly modified this Inbox Rule to protect our customer, but the gist is that it filters incoming mail from a specific bank employee, moves it to the RSS Folder, and marks it as read.
bless the heart of whoever posted this and thought it sounded good, lol
It’s almost time for my @BSidesCapeTown talk, and I’ve just open sourced pipetap. My Windows named pipe proxy & multi-tool. Excited to see what you do with it!
github.com/sensepost/pi...
Our 2024 applicants challenge is officially #roasted: the full BeanBeat × Maultaschenfabrikle walkthrough is now online. Unwrap the write-up at apply-if-you-can.com/walkthrough/... and revisit the hacks that escalated from cold brew to full breach.
Back home, time to download 15 Windows Server ISO’s via 5g to comply with the European Fair Use Roaming Policy. Not sure if this still qualifies as fair use though 🤔
Latest ≠ Greatest? A Retrospective Analysis of CVE-2025-59287 in Microsoft WSUS from our very own @mwulftange.bsky.social who loves converting n-days to 0-days code-white.com/blog/wsus-cv...
ULMageddon Logo
CODE WHITE proudly presents #ULMageddon which is our newest applicants challenge at apply-if-you-can.com packaged as a metal festival. Have fun 🤘 and #applyIfYouCan
pagedout.institute ← we've just released Paged Out! zine Issue #7
pagedout.institute/download/Pag... ← direct link
lulu.com/search?page=... ← prints for zine collectors
pagedout.institute/download/Pag... ← issue wallpaper
Enjoy!
Please please please share to spread the news - thank you!
On your way to @brucon! Are you interested in technical discussions or would you like to know what makes our company so unique? Just talk to us.
Made a thing, mucking about with python and a LDAP browser concept to ingest straight into BloodHound but also just a nice alternative to ADExplorer with fewer LDAP queries, simple LDAP browser using PyQt as a GUI and neo4j-driver to ingest into BH. github.com/ZephrFish/py... #bloodhound #redteam
Tech startup idea: instead of starting your car with your key, you get in, turn on the display panel, enter your password, get your phone out, open the authenticator app, enter your pin, enter the timed passcode, then open the start menu, then helpdesk, then "request engine start", then submit a tic
We always love a good challenge. That’s why we’re sponsoring the 10th FAUST CTF. Game on at 2025.faustctf.net
The table of contents for Phrack 72 from phrack.org
At long last - Phrack 72 has been released online for your reading pleasure!
Check it out: phrack.org
We've added a new demo to NewRemotingTricks that makes deploying a MarshalByRefObject (e.g., WebClient) even easier: System.Lazy<T> creates an instance of T on serialization, which is probably more likely to be allowed than a XAML gadget getting through. github.com/codewhitesec...
We have reproduced "ToolShell", the unauthenticated exploit chain for CVE-2025-49706 + CVE-2025-49704 used by @_l0gg (on X) to pop SharePoint at #Pwn2Own Berlin 2025, it's really just one request! Kudos to @mwulftange.bsky.social