Advertisement · 728 × 90

Posts by niph

Hello Cybersecurity Research Agents! Miss today's @synsec_ai deadline? So did we! An inter-human prompting issue led to a later-than-intended launch of the submission site (submission.synsec.org), and we're extending the timeline to remedy this! The deadline is now May 1st!

2 weeks ago 2 3 1 0
Video

strace(1) is now on rat steroids 🤯

🔍 strace-tui — Visualize/explore syscalls in the terminal

💯 Color-coded calls, live filtering, search & stack traces with source resolution!

🦀 Written in Rust & built with @ratatui.rs

⭐ GitHub: github.com/Rodrigodd/st...

#rustlang #ratatui #tui #linux

1 month ago 75 21 0 0
Video

Releasing one of my research tools: EVENmonitor🖥️

Inspired by LDAPmonitor, I implemented a monitoring tool for the Windows Event log in pure python. You can just attach it via the network and then filter for specific event IDs or keywords.

Available at: github.com/NeffIsBack/E...

1 month ago 0 2 0 0
Post image

If you have considered using my script to create software passkeys using ESTSAUTH cookies on a pentest or red team exercise, I have published a more secure option for you ;)

Create an Azure Key Vault, grant yourself Key Vault Crypto Officer, and run this:
github.com/nathanmcn...

1 month ago 4 1 0 0
Post image

Critical zero-day vulnerability (CVE-2026-1731) in BeyondTrust Remote Support & Privileged Remote Access allows unauthenticated RCE. Immediate patching required! #CyberSecurity #ZeroDay #BeyondTrust Link: thedailytechfeed.com/critical-zer...

2 months ago 1 1 0 0

Highly recommend the writeup from our @fl0mb.bsky.social and congrats on this well-deserved achievement!

2 months ago 4 3 0 0

[RSS] Districton 1 Slides - Control the Variables and You Control the Code: Language-Level Vulnerabilities in Adobe ColdFusion


www.hoyahaxa.com ->


Original->

2 months ago 0 3 0 0
Bypassing Windows Administrator Protection - Project Zero A headline feature introduced in the latest release of Windows 11, 25H2 is Administrator Protection. The goal of this feature is to replace User Account Cont...

No security feature is perfect. @tiraniddo.dev reviewed Windows’ new Administrator Protection and found several bypasses.

projectzero.google/2026/26/wind...

2 months ago 5 5 0 0
Advertisement

Crazy work by my colleague Fabian. High impact target: one might be amazed at how widespread this product is in industrial networks.

2 months ago 3 2 0 0

25 days later, White Date is still down.

2 months ago 80 15 1 0
Preview
GitHub - bytewreck/DumpGuard: Proof-of-Concept tool for extracting NTLMv1 hashes from sessions on modern Windows systems. Proof-of-Concept tool for extracting NTLMv1 hashes from sessions on modern Windows systems. - bytewreck/DumpGuard

Proof of Concept for extracting NTLMv1 hashes from sessions on Windows (relies on the Remote Credential Guard protocol).

github.com/bytewreck/Du...

#infosec #cybersecurity #redteam #pentest #windows

2 months ago 4 1 0 0

[RSS] [Blog] Unauthenticated RCE in NetSupport Manager - A Technical Deep Dive


code-white.com ->

CVE-2025-34164, CVE-2025-34165


Original->

2 months ago 2 2 0 0
Preview
CODE WHITE | Unauthenticated RCE in NetSupport Manager - A Technical Deep Dive NetSupport Manager is a remote control and support software that we find surprisingly often utilized in sensitive *Operational Technology (OT)* environments, such as production plant networks. Besides...

You like technical deep dives into binary exploitation and crazy heap wizardry? Then you'll like our blog post about unauth'ed RCE in NetSupport Manager aka CVE-2025-34164 & CVE-2025-34165 code-white.com/blog/2026-01...

2 months ago 7 9 0 1

mfw I realize you can use C++ WINAPI COM IUIAutomation to communicate with Copilot directly and tell it do things like "execute this file" (Copilot is now Copiloting my malicious payload)

3 months ago 24 6 1 0
Preview
CODE WHITE | Public Vulnerability List Public list of vulnerabilities, found by CODE WHITE

In 2025 my colleague and me pwned several widespread medial devices. Check our vuln list for some impressions and get ready for cool blog posts and hopefully conference talks in 2026. 🤞🏻

code-white.com/public-vulne...

4 months ago 2 1 1 0
Advertisement
Post image

The picture below depicts a (malicious) Inbox Rule. I slightly modified this Inbox Rule to protect our customer, but the gist is that it filters incoming mail from a specific bank employee, moves it to the RSS Folder, and marks it as read.

4 months ago 2 1 1 0
Post image

bless the heart of whoever posted this and thought it sounded good, lol

4 months ago 21 4 6 0

It’s almost time for my @BSidesCapeTown talk, and I’ve just open sourced pipetap. My Windows named pipe proxy & multi-tool. Excited to see what you do with it!

github.com/sensepost/pi...

4 months ago 12 4 0 1
Preview
CODE WHITE - Applicants Challenge Applicants Challenge! Face real-world vulns, earn trophies, First Bloods & epic swag!

Our 2024 applicants challenge is officially #roasted: the full BeanBeat × Maultaschenfabrikle walkthrough is now online. Unwrap the write-up at apply-if-you-can.com/walkthrough/... and revisit the hacks that escalated from cold brew to full breach.

4 months ago 6 6 0 0

Back home, time to download 15 Windows Server ISO’s via 5g to comply with the European Fair Use Roaming Policy. Not sure if this still qualifies as fair use though 🤔

4 months ago 3 0 0 0
Preview
CODE WHITE | A Retrospective Analysis of CVE-2025-59287 in Microsoft WSUS How the n-day research for a suspected vulnerability in Microsoft WSUS (CVE-2025-59287) led to the surprising discovery of a new `SoapFormatter` vulnerability added by the Patch Tuesday updates of Oct...

Latest ≠ Greatest? A Retrospective Analysis of CVE-2025-59287 in Microsoft WSUS from our very own @mwulftange.bsky.social who loves converting n-days to 0-days code-white.com/blog/wsus-cv...

5 months ago 8 6 0 1
ULMageddon Logo

ULMageddon Logo

CODE WHITE proudly presents #ULMageddon which is our newest applicants challenge at apply-if-you-can.com packaged as a metal festival. Have fun 🤘 and #applyIfYouCan

7 months ago 6 7 0 1
Advertisement

pagedout.institute ← we've just released Paged Out! zine Issue #7
pagedout.institute/download/Pag... ← direct link
lulu.com/search?page=... ← prints for zine collectors
pagedout.institute/download/Pag... ← issue wallpaper
Enjoy!

Please please please share to spread the news - thank you!

6 months ago 20 17 1 3

On your way to @brucon! Are you interested in technical discussions or would you like to know what makes our company so unique? Just talk to us.

6 months ago 3 1 0 0
Preview
GitHub - ZephrFish/pyLDAPGui: Python based GUI for browsing LDAP Python based GUI for browsing LDAP. Contribute to ZephrFish/pyLDAPGui development by creating an account on GitHub.

Made a thing, mucking about with python and a LDAP browser concept to ingest straight into BloodHound but also just a nice alternative to ADExplorer with fewer LDAP queries, simple LDAP browser using PyQt as a GUI and neo4j-driver to ingest into BH. github.com/ZephrFish/py... #bloodhound #redteam

7 months ago 8 1 0 0

Tech startup idea: instead of starting your car with your key, you get in, turn on the display panel, enter your password, get your phone out, open the authenticator app, enter your pin, enter the timed passcode, then open the start menu, then helpdesk, then "request engine start", then submit a tic

7 months ago 803 133 50 16
Preview
FAUST CTF 2025 | FAUST CTF 2025 FAUST CTF 2025 is an online attack-defense CTF competition run by FAUST, the CTF team of Friedrich-Alexander University Erlangen-Nürnberg

We always love a good challenge. That’s why we’re sponsoring the 10th FAUST CTF. Game on at 2025.faustctf.net

7 months ago 7 6 0 0
The table of contents for Phrack 72 from phrack.org

The table of contents for Phrack 72 from phrack.org

At long last - Phrack 72 has been released online for your reading pleasure!

Check it out: phrack.org

8 months ago 121 63 0 4
Preview
GitHub - codewhitesec/NewRemotingTricks: New exploitation tricks for hardened .NET Remoting servers New exploitation tricks for hardened .NET Remoting servers - codewhitesec/NewRemotingTricks

We've added a new demo to NewRemotingTricks that makes deploying a MarshalByRefObject (e.g., WebClient) even easier: System.Lazy<T> creates an instance of T on serialization, which is probably more likely to be allowed than a XAML gadget getting through. github.com/codewhitesec...

8 months ago 4 4 0 1
Post image

We have reproduced "ToolShell", the unauthenticated exploit chain for CVE-2025-49706 + CVE-2025-49704 used by @_l0gg (on X) to pop SharePoint at #Pwn2Own Berlin 2025, it's really just one request! Kudos to @mwulftange.bsky.social

9 months ago 4 5 1 1