πš‘πšπŸΎ's Avatar

πš‘πšπŸΎ

@hg8.sh.bsky.social

Security Researcher & Privacy Activist. DM are welcome for any questions. -- Website: https://hg8.sh Post history on Twitter: @_hg8_

15 Followers  |  105 Following  |  31 Posts  |  Joined: 18.11.2024  |  2.0184

Latest posts by hg8.sh on Bluesky

oss-security - CVE-2025-32463: sudo local privilege escalation via chroot option

"CVE-2025-32463: sudo local privilege escalation via chroot option"

An attacker can leverage sudo's -R (--chroot) option to run
arbitrary commands as root, even if they are not listed in the sudoers file.

Sudo versions 1.9.14 to 1.9.17 affected.

www.openwall.com/lists/oss-se... #infosec #cve

02.07.2025 07:40 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
TensorFlow Remote Code Execution with Malicious Model | CyberBlog The purpose of this article is to show how to get RCE when a crafted malicious Tensorflow model is loaded. Remember all of this is for educational purposes only! Don't be mean!

"TensorFlow Remote Code Execution with Malicious Model"

Old technique but good writeup

splint.gitbook.io/cyberblog/se... #ctf #tensorflow #ai #infosec

25.06.2025 18:21 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

"Funky chunks: abusing ambiguous chunk line terminators for request smuggling"

w4ke.info/2025/06/18/f... #infosec

19.06.2025 08:44 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Getting RCE on Monero forums with wrapwrap breakpoint of no return

"Getting RCE on Monero forums with wrapwrap"

Cool finding. This would make a cool CTF challenge πŸ‘

swap.gs/posts/monero... #rce #ctf

12.06.2025 18:04 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Riding The Time Machine: Journey Through An Old vBulletin PHP Object Injection | Karma(In)Security This is the personal website of Egidio Romano, a very curious guy from Sicily, Italy. He's a computer security enthusiast, particularly addicted to webapp security.

"Riding The Time Machine: Journey Through An Old vBulletin PHP Object Injection"

Another good potential for a CTF challenge! πŸ‘€

karmainsecurity.com/riding-the-t... #infosec #rce #ctf

09.06.2025 08:06 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Weaponizing Dependabot: Pwn Request at its finest Learn how Dependabot can be co-opted to exploit some sensitive workflows, through the Confused Deputy Problem and branch name injections.

"Weaponizing Dependabot: Pwn Request at its finest"

TL;DR: Through "Confused Deputy" attacks Dependabot (and other GitHub bots), can be tricked into merging malicious code. It can escalate to full command injection via crafted branch names.

boostsecurity.io/blog/weaponi... #infosec

06.06.2025 17:34 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Root Shell on Credit Card Terminal

"Root Shell on Credit Card Terminal"

stefan-gloor.ch/yomani-hack #infosec #re #reverseengineering

04.06.2025 07:51 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Part 2 - From Reverse ... | ADMinions Introduction In this guide, we’ll walk step-by-step through building a fully functional internal che...

"From Reverse Engineering to Cheat Development: Internal Game Hacks with AssaultCube"

Bit outdated (DirectX9) but still some very valuable info and a great writeup πŸ‘

adminions.ca/books/articl... #infosec #re

29.05.2025 07:55 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
cve-2025-26817 netwrix rce Authenticated Remote Code Execution Vulnerability in Netwrix Password Secure

"Authenticated Remote Code Execution in Netwrix Password Secure (CVE-2025-26817)"

That will make a nice CTF challenge ^

www.8com.de/cyber-securi... #infosec #cve #rce

28.05.2025 08:21 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
GitHub MCP Exploited: Accessing private repositories via MCP We showcase a critical vulnerability with the official GitHub MCP server, allowing attackers to access private repository data. The vulnerability is among the first discovered by Invariant's security ...

"GitHub MCP Exploited: Accessing private repositories via Model Context Protocol"

invariantlabs.ai/blog/mcp-git...

28.05.2025 08:19 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Uncovering a crazy privilege escalation from Chrome extensions What's the worst thing a Chrome extension could do to you?

"Uncovering a crazy privilege escalation from Chrome extensions - CVE-2023-4369" (2023)

0x44.xyz/blog/cve-202... #infosec #cve #privesc

28.05.2025 08:18 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Fixing Security Vulnerabilities with AI in OSS-Fuzz Critical open source software systems undergo significant validation in the form of lengthy fuzz campaigns. The fuzz campaigns typically conduct a biased random search over the domain of program input...

"Fixing Security Vulnerabilities with AI in OSS-Fuzz"

arxiv.org/abs/2411.03346 #infosec #ai #fuzzing #oss-fuzz

24.05.2025 12:17 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
One-Click RCE in ASUS's Preinstalled Driver Software One-Click RCE in ASUS’s Preinstalled Driver Software Part Two of this series on ASUS will be dropping within a week, yes it somehow manages to get worse Introduction This story begins with a conversat...

"One-Click RCE in ASUS’s Preinstalled Driver Software"

mrbruh.com/asusdriverhub/ #infosec #re

24.05.2025 11:16 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Don't Call That "Protected" Method: Dissecting an N-Day vBulletin RCE | Karma(In)Security This is the personal website of Egidio Romano, a very curious guy from Sicily, Italy. He's a computer security enthusiast, particularly addicted to webapp security.

"Don't Call That "Protected" Method: Dissecting an N-Day vBulletin RCE"

karmainsecurity.com/dont-call-th... #infosec #rce #vbulletin

23.05.2025 16:34 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
GitHub - ZathuraDbg/ZathuraDbg: An emulation based tool for learning and debugging assembly. An emulation based tool for learning and debugging assembly. - ZathuraDbg/ZathuraDbg

ZathuraDbg: An emulation based tool for learning and debugging assembly.

github.com/ZathuraDbg/Z... #infosec

22.05.2025 16:53 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

"Compromising Real-WorldLLM-Integrated Applications with Indirect Prompt Injection"

arxiv.org/pdf/2302.12173

21.05.2025 15:34 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Google's Approach for Secure AI Agents

"An Introduction to Google's Approach for Secure AI Agents"

research.google/pubs/an-intr... #infosec

21.05.2025 09:18 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
What a Binance CAPTCHA solver tells us about today’s bot threats In this post, we analyze an open-source CAPTCHA solver designed to bypass a custom challenge deployed on Binance, one of the most popular crypto platforms. While the solver is publicly available, we’v...

"What a Binance CAPTCHA solver tells us about today’s bot threats"

blog.castle.io/what-a-binan... #infosec #captcha

20.05.2025 13:18 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Go Cryptography Security Audit Go's cryptography libraries underwent an audit by Trail of Bits. Read more about the scope and results.

Three Trail of Bits engineers audited core Go cryptography for a month and found only one low-sev security issue... in unsupported Go+BoringCrypto! 🍾

Years of efforts on testing, limiting complexity, safe APIs, and readability have paid off! ✨

Yes I am taking a victory lap. No I am not sorry. πŸ†

19.05.2025 19:07 β€” πŸ‘ 580    πŸ” 85    πŸ’¬ 15    πŸ“Œ 4
Preview
DDoSecrets publishes 410 GB of heap dumps, hacked from TeleMessage's archive server This morning, Distributed Denial of Secrets published 410 GB of data hacked from TeleMessage, the Israeli firm that makes modified versions of Signal, WhatsApp, Telegram, and WeChat that centrally arc...

"DDoSecrets publishes 410 GB of heap dumps, hacked from TeleMessage's archive server"

micahflee.com/ddosecrets-p...

20.05.2025 10:36 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

"Dolla dolla bill, y'all" - Reverse engineering a banknote validator.

something.fromnothing.blog/posts/dolla-... #infosec #reverseengineering

19.05.2025 08:28 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Statistical Analysis to Detect Uncommon CodeStatistical Analysis to Detect Uncommon Code

"Statistical Analysis to Detect Uncommon Code (2023)"

synthesis.to/2023/01/26/u...

19.05.2025 08:14 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Prodaft CATALYST

"Skitnet(Bossnet) Malware Analysis"

catalyst.prodaft.com/public/repor... #infosec #malware

19.05.2025 08:13 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Commit Stomping Manipulating Git Histories to Obscure the Truth

"Commit Stomping: Manipulating Git Histories to Obscure the Truth"

blog.zsec.uk/commit-stomp... #infosec #redteam

19.05.2025 08:11 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Stateful Connection With Spoofed Source IPβ€Šβ€”β€ŠNetImpostor Overview

"Stateful Connection With Spoofed Source IP β€” NetImpostor"

Tl;Dr: Writeup reviews the technique for establishing a full stateful TCP connection with a spoofed source IP address from the same subnet using ARP poisoning.

tastypepperoni.medium.com/stateful-con... #infosec

18.05.2025 09:12 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
CVE-2024-11477- 7-Zip ZSTD Buffer Overflow Vulnerability - Crowdfense CVE-2024-11477, a buffer overflow vulnerability in 7-Zip's ZSTD decompression algorithm; explore the technical details.

7-Zip ZSTD Buffer Overflow Vulnerability (CVE-2024-11477)

www.crowdfense.com/cve-2024-114... #infosec #cve

Full write-up: github.com/TheN00bBuild...

15.05.2025 07:51 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
MrBruh's Epic Blog One-Click RCE in ASUS’s Preinstalled Driver Software Part Two of this series on ASUS will be dropping within a week, yes it somehow manages to get worse Introduction This story begins with a conversat...

"One-Click RCE in ASUS’s Preinstalled Driver Software"

mrbruh.com/asusdriverhub/ #infosec #rce

15.05.2025 07:48 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
GitHub - reveng007/DarkWidow: Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird + Spawns a sacrificial Process as... Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird + Spawns a sacrificial Process as target process + (ACG+Bloc...

DarkWidow: Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird + Spawns a sacrificial Process as target process + (ACG+BlockDll) mitigation policy on spawned process

github.com/reveng007/Da... #infosec

15.05.2025 07:45 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

"Drag and Pwnd: Leverage ASCII characters to exploit VS Code"

portswigger.net/research/dra...

14.05.2025 08:38 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Can You Really Trust That Permission Pop-Up On macOS? (CVE-2025-31250) | Watch This Space A security research blog.

CVE-2025-31250 - Great research and vulnerability write-up on the MacOS permission pop-up. It's time for Apple to make improvement to the terrible UX here.

"Can you trust that permission pop-up on macOS?" - wts.dev/posts/tcc-who/

13.05.2025 09:45 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

@hg8.sh is following 20 prominent accounts