Frycos's Avatar

Frycos

@frycos.bsky.social

Private account! Red teamer @codewhitesec. @frycos@infosec.exchange @frycos@X

763 Followers  |  131 Following  |  30 Posts  |  Joined: 31.10.2024  |  1.5504

Latest posts by frycos.bsky.social on Bluesky

Fortunately, humans still learn to walk first, even though the car has been invented.

07.02.2026 22:19 β€” πŸ‘ 1    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Highly recommend the writeup from our @fl0mb.bsky.social and congrats on this well-deserved achievement!

05.02.2026 16:15 β€” πŸ‘ 4    πŸ” 3    πŸ’¬ 0    πŸ“Œ 0

[RSS] [Blog] Unauthenticated RCE in NetSupport Manager - A Technical Deep Dive


code-white.com ->

CVE-2025-34164, CVE-2025-34165


Original->

24.01.2026 23:10 β€” πŸ‘ 2    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0

Crazy work by my colleague Fabian. High impact target: one might be amazed at how widespread this product is in industrial networks.

23.01.2026 12:33 β€” πŸ‘ 3    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0

Medical 🫣

20.12.2025 12:40 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
CODE WHITE | Public Vulnerability List Public list of vulnerabilities, found by CODE WHITE

In 2025 my colleague and me pwned several widespread medial devices. Check our vuln list for some impressions and get ready for cool blog posts and hopefully conference talks in 2026. 🀞🏻

code-white.com/public-vulne...

20.12.2025 12:34 β€” πŸ‘ 2    πŸ” 1    πŸ’¬ 1    πŸ“Œ 0
Preview
CODE WHITE - Applicants Challenge Applicants Challenge! Face real-world vulns, earn trophies, First Bloods & epic swag!

Our 2024 applicants challenge is officially #roasted: the full BeanBeat Γ— Maultaschenfabrikle walkthrough is now online. Unwrap the write-up at apply-if-you-can.com/walkthrough/... and revisit the hacks that escalated from cold brew to full breach.

05.12.2025 12:47 β€” πŸ‘ 6    πŸ” 6    πŸ’¬ 0    πŸ“Œ 0
Post image

Just sayinβ€˜ 🀷

15.11.2025 08:57 β€” πŸ‘ 4    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0

A somewhat wild internal story from the last few weeks

29.10.2025 13:08 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Im Dunkeln mit Ansage? Die Akte Blackout Podcast-Folge Β· Quarks Science Cops Β· 28.06.2025 Β· 1Β Std. 5Β Min.

podcasts.apple.com/de/podcast/q...

26.10.2025 08:19 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
A Hands-On Edition: Will Supabase Be the Next Firebase (At Least in Terms of Security)? It all started with my good colleague @schniggie who’s got my attention with an X post earlier that year. Until then I rarely heared of Supabase, but let us start from the scratch. Firebase changed th...

Did you encounter the Supabase? Might wanna try my newest tooling or have a read about quickwins? There you go:
blog.m1tz.com/posts/2025/1...

07.10.2025 20:01 β€” πŸ‘ 2    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0

On your way to @brucon! Are you interested in technical discussions or would you like to know what makes our company so unique? Just talk to us.

24.09.2025 04:42 β€” πŸ‘ 3    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0

Tired of dull, standard interviews? Talk to Kurt. Also, a few of my colleagues and I will be attending BruCON next week. Feel free to come and talk to us.

15.09.2025 07:44 β€” πŸ‘ 6    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0

New AI-generated "technical" blog posts are stealing my time. 🀬

03.09.2025 07:35 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Original post on infosec.exchange

Yes, there’s another phishing campaign contacting fediverse users to fill out a form to avoid being suspended or whatever. Stay calm and just report them and be sure to check the option to inform their home instance so the account gets suspended for everyone.

Also, please consider enabling […]

29.08.2025 14:05 β€” πŸ‘ 8    πŸ” 47    πŸ’¬ 3    πŸ“Œ 0
Preview
FAUST CTF 2025 | FAUST CTF 2025 FAUST CTF 2025 is an online attack-defense CTF competition run by FAUST, the CTF team of Friedrich-Alexander University Erlangen-NΓΌrnberg

We always love a good challenge. That’s why we’re sponsoring the 10th FAUST CTF. Game on at 2025.faustctf.net

28.08.2025 12:22 β€” πŸ‘ 7    πŸ” 6    πŸ’¬ 0    πŸ“Œ 0

Today I have a more serious topic than usual, please consider reposting for reach:

My wife and I are urgently looking for a specialist in neuropediatrics or a similar field for our autistic child with a diagnosed, but not further specified, movement disorder [1/4]

19.08.2025 08:34 β€” πŸ‘ 4    πŸ” 23    πŸ’¬ 1    πŸ“Œ 0
Preview
GitHub - codewhitesec/NewRemotingTricks: New exploitation tricks for hardened .NET Remoting servers New exploitation tricks for hardened .NET Remoting servers - codewhitesec/NewRemotingTricks

We've added a new demo to NewRemotingTricks that makes deploying a MarshalByRefObject (e.g., WebClient) even easier: System.Lazy<T> creates an instance of T on serialization, which is probably more likely to be allowed than a XAML gadget getting through. github.com/codewhitesec...

05.08.2025 15:11 β€” πŸ‘ 4    πŸ” 4    πŸ’¬ 0    πŸ“Œ 1

Wow, I wrote with an author of a cool VR blog post yesterday. Just asked for some more explanations and maybe references. Tl;dr: he couldn’t explain or elaborate because exactly this part of the blog was written by GPT…

29.07.2025 06:08 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

We have reproduced "ToolShell", the unauthenticated exploit chain for CVE-2025-49706 + CVE-2025-49704 used by @_l0gg (on X) to pop SharePoint at #Pwn2Own Berlin 2025, it's really just one request! Kudos to @mwulftange.bsky.social

14.07.2025 13:00 β€” πŸ‘ 4    πŸ” 5    πŸ’¬ 1    πŸ“Œ 1
Zyxel NWA50AX Pro - Discovery of an Nday Variant Today was an eventful day thanks to many interesting blog posts, e.g. from my friends at watchTowr. So I thought, why not publish a small quick-and-dirty blog post myself about a story from last week?...

A quick-and-dirty late night blog post on discovering an nday variant in Zyxel NWA50AX Pro devices

frycos.github.io/vulns4free/2...

17.06.2025 21:12 β€” πŸ‘ 3    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0

Oh no, it's a variant of CVE-2024-29974...I accidentally found that a similar vuln affected Zyxel NWA50AX (Pro) and tested against devices (obviously) lacking the latest patches. This CVE was never publicly related to NWA50AX, though. Well, nice nday exercise then.

16.06.2025 21:34 β€” πŸ‘ 4    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

B03701066A0F762E75BAA67816EDB223F8681C9444C34E0B768DE518268025A0

Am I on vacation in the mountains? Yes. Do they have network equipment there? Yes. Can I refrain from doing VR? No.

You know the drill: disclosure and blog post planned. πŸ˜„

14.06.2025 05:53 β€” πŸ‘ 5    πŸ” 0    πŸ’¬ 0    πŸ“Œ 1
CODE WHITE | Analyzing the Attack Surface of Ivanti's DSM Ivanti's Desktop & Server Management (DSM) product is an old acquaintance that we have encountered in numerous red team and internal assessments. The main purpose of the product is the centralized dis...

Yes, we're beating a dead horse. But that horse still runs in corporate networks - and quietly gives attackers the keys to the kingdom. We're publishing what’s long been exploitable. Time to talk about it. #DSM #Ivanti code-white.com/blog/ivanti-...

13.05.2025 06:45 β€” πŸ‘ 8    πŸ” 8    πŸ’¬ 0    πŸ“Œ 1

If you are in the US and upset at the AfD being subject to more surveillance now:

The bar to be declared "in conflict with the democratic order" is *very* high. It is literally the AfD definition of "Germanness" by your ancestry, declaring ppl of other ancestries inferior, that did it, justifiedly.

03.05.2025 07:22 β€” πŸ‘ 60    πŸ” 7    πŸ’¬ 1    πŸ“Œ 0
GFI MailEssentials - Yet Another .NET Target What is this product GFI MailEssentials all about? We’re living the future, right? So let’s ask the GFI AI.

My blog post on some vulns in GFI MailEssentials

frycos.github.io/vulns4free/2...

28.04.2025 17:34 β€” πŸ‘ 7    πŸ” 7    πŸ’¬ 0    πŸ“Œ 0
Post image

🧡 THREAD: A federal whistleblower just dropped one of the most disturbing cybersecurity disclosures I’ve ever read.

He's saying DOGE came in, data went out, and Russians started attempting logins with new valid DOGE passwords

Media's coverage wasn't detailed enough so I dug into his testimony:

18.04.2025 00:10 β€” πŸ‘ 14025    πŸ” 7381    πŸ’¬ 331    πŸ“Œ 1008
Post image

That sums up my week's vacation pretty well. And I have to say, I like it.

16.04.2025 20:46 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
CVE-2025-22457 | AttackerKB On April 3, 2025, Ivanti published an advisory for CVE-2025-22457, an unauthenticated remote code execution vulnerability due to a stack based buffer overflow.…

We have just published our AttackerKB @rapid7.com Analysis of CVE-2025-22457, an unauthenticated stack based buffer overflow in Ivanti Connect Secure. Difficult to exploit due to severe character restrictions, we detail our full RCE technique here: attackerkb.com/topics/0ybGQ...

10.04.2025 18:19 β€” πŸ‘ 3    πŸ” 4    πŸ’¬ 1    πŸ“Œ 0
Exploiting IngressNightmare: A Deep Dive Wiz recently discovered an unauthenticated remote code execution (RCE) vulnerability in the Ingress NGINX admission controller. I found the exploit chain particularly intriguing and decided to recreat...

blog.flomb.net/posts/ingres...

31.03.2025 14:28 β€” πŸ‘ 5    πŸ” 3    πŸ’¬ 0    πŸ“Œ 0

@frycos is following 19 prominent accounts