Frycos's Avatar

Frycos

@frycos.bsky.social

Private account! Red teamer @codewhitesec. @frycos@infosec.exchange @frycos@X

762 Followers  |  131 Following  |  26 Posts  |  Joined: 31.10.2024  |  1.6585

Latest posts by frycos.bsky.social on Bluesky

Post image

Just sayinβ€˜ 🀷

15.11.2025 08:57 β€” πŸ‘ 4    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0

A somewhat wild internal story from the last few weeks

29.10.2025 13:08 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
Im Dunkeln mit Ansage? Die Akte Blackout Podcast-Folge Β· Quarks Science Cops Β· 28.06.2025 Β· 1Β Std. 5Β Min.

podcasts.apple.com/de/podcast/q...

26.10.2025 08:19 β€” πŸ‘ 0    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
A Hands-On Edition: Will Supabase Be the Next Firebase (At Least in Terms of Security)? It all started with my good colleague @schniggie who’s got my attention with an X post earlier that year. Until then I rarely heared of Supabase, but let us start from the scratch. Firebase changed th...

Did you encounter the Supabase? Might wanna try my newest tooling or have a read about quickwins? There you go:
blog.m1tz.com/posts/2025/1...

07.10.2025 20:01 β€” πŸ‘ 2    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0

On your way to @brucon! Are you interested in technical discussions or would you like to know what makes our company so unique? Just talk to us.

24.09.2025 04:42 β€” πŸ‘ 3    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0

Tired of dull, standard interviews? Talk to Kurt. Also, a few of my colleagues and I will be attending BruCON next week. Feel free to come and talk to us.

15.09.2025 07:44 β€” πŸ‘ 6    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0

New AI-generated "technical" blog posts are stealing my time. 🀬

03.09.2025 07:35 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Original post on infosec.exchange

Yes, there’s another phishing campaign contacting fediverse users to fill out a form to avoid being suspended or whatever. Stay calm and just report them and be sure to check the option to inform their home instance so the account gets suspended for everyone.

Also, please consider enabling […]

29.08.2025 14:05 β€” πŸ‘ 8    πŸ” 48    πŸ’¬ 3    πŸ“Œ 0
Preview
FAUST CTF 2025 | FAUST CTF 2025 FAUST CTF 2025 is an online attack-defense CTF competition run by FAUST, the CTF team of Friedrich-Alexander University Erlangen-NΓΌrnberg

We always love a good challenge. That’s why we’re sponsoring the 10th FAUST CTF. Game on at 2025.faustctf.net

28.08.2025 12:22 β€” πŸ‘ 7    πŸ” 6    πŸ’¬ 0    πŸ“Œ 0

Today I have a more serious topic than usual, please consider reposting for reach:

My wife and I are urgently looking for a specialist in neuropediatrics or a similar field for our autistic child with a diagnosed, but not further specified, movement disorder [1/4]

19.08.2025 08:34 β€” πŸ‘ 4    πŸ” 23    πŸ’¬ 1    πŸ“Œ 0
Preview
GitHub - codewhitesec/NewRemotingTricks: New exploitation tricks for hardened .NET Remoting servers New exploitation tricks for hardened .NET Remoting servers - codewhitesec/NewRemotingTricks

We've added a new demo to NewRemotingTricks that makes deploying a MarshalByRefObject (e.g., WebClient) even easier: System.Lazy<T> creates an instance of T on serialization, which is probably more likely to be allowed than a XAML gadget getting through. github.com/codewhitesec...

05.08.2025 15:11 β€” πŸ‘ 4    πŸ” 4    πŸ’¬ 0    πŸ“Œ 1

Wow, I wrote with an author of a cool VR blog post yesterday. Just asked for some more explanations and maybe references. Tl;dr: he couldn’t explain or elaborate because exactly this part of the blog was written by GPT…

29.07.2025 06:08 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Post image

We have reproduced "ToolShell", the unauthenticated exploit chain for CVE-2025-49706 + CVE-2025-49704 used by @_l0gg (on X) to pop SharePoint at #Pwn2Own Berlin 2025, it's really just one request! Kudos to @mwulftange.bsky.social

14.07.2025 13:00 β€” πŸ‘ 4    πŸ” 5    πŸ’¬ 1    πŸ“Œ 2
Zyxel NWA50AX Pro - Discovery of an Nday Variant Today was an eventful day thanks to many interesting blog posts, e.g. from my friends at watchTowr. So I thought, why not publish a small quick-and-dirty blog post myself about a story from last week?...

A quick-and-dirty late night blog post on discovering an nday variant in Zyxel NWA50AX Pro devices

frycos.github.io/vulns4free/2...

17.06.2025 21:12 β€” πŸ‘ 3    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0

Oh no, it's a variant of CVE-2024-29974...I accidentally found that a similar vuln affected Zyxel NWA50AX (Pro) and tested against devices (obviously) lacking the latest patches. This CVE was never publicly related to NWA50AX, though. Well, nice nday exercise then.

16.06.2025 21:34 β€” πŸ‘ 4    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

B03701066A0F762E75BAA67816EDB223F8681C9444C34E0B768DE518268025A0

Am I on vacation in the mountains? Yes. Do they have network equipment there? Yes. Can I refrain from doing VR? No.

You know the drill: disclosure and blog post planned. πŸ˜„

14.06.2025 05:53 β€” πŸ‘ 5    πŸ” 0    πŸ’¬ 0    πŸ“Œ 1
CODE WHITE | Analyzing the Attack Surface of Ivanti's DSM Ivanti's Desktop & Server Management (DSM) product is an old acquaintance that we have encountered in numerous red team and internal assessments. The main purpose of the product is the centralized dis...

Yes, we're beating a dead horse. But that horse still runs in corporate networks - and quietly gives attackers the keys to the kingdom. We're publishing what’s long been exploitable. Time to talk about it. #DSM #Ivanti code-white.com/blog/ivanti-...

13.05.2025 06:45 β€” πŸ‘ 8    πŸ” 8    πŸ’¬ 0    πŸ“Œ 1

If you are in the US and upset at the AfD being subject to more surveillance now:

The bar to be declared "in conflict with the democratic order" is *very* high. It is literally the AfD definition of "Germanness" by your ancestry, declaring ppl of other ancestries inferior, that did it, justifiedly.

03.05.2025 07:22 β€” πŸ‘ 60    πŸ” 7    πŸ’¬ 1    πŸ“Œ 0
GFI MailEssentials - Yet Another .NET Target What is this product GFI MailEssentials all about? We’re living the future, right? So let’s ask the GFI AI.

My blog post on some vulns in GFI MailEssentials

frycos.github.io/vulns4free/2...

28.04.2025 17:34 β€” πŸ‘ 7    πŸ” 7    πŸ’¬ 0    πŸ“Œ 0
Post image

🧡 THREAD: A federal whistleblower just dropped one of the most disturbing cybersecurity disclosures I’ve ever read.

He's saying DOGE came in, data went out, and Russians started attempting logins with new valid DOGE passwords

Media's coverage wasn't detailed enough so I dug into his testimony:

18.04.2025 00:10 β€” πŸ‘ 14068    πŸ” 7411    πŸ’¬ 332    πŸ“Œ 1016
Post image

That sums up my week's vacation pretty well. And I have to say, I like it.

16.04.2025 20:46 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Preview
CVE-2025-22457 | AttackerKB On April 3, 2025, Ivanti published an advisory for CVE-2025-22457, an unauthenticated remote code execution vulnerability due to a stack based buffer overflow.…

We have just published our AttackerKB @rapid7.com Analysis of CVE-2025-22457, an unauthenticated stack based buffer overflow in Ivanti Connect Secure. Difficult to exploit due to severe character restrictions, we detail our full RCE technique here: attackerkb.com/topics/0ybGQ...

10.04.2025 18:19 β€” πŸ‘ 3    πŸ” 4    πŸ’¬ 1    πŸ“Œ 0
Exploiting IngressNightmare: A Deep Dive Wiz recently discovered an unauthenticated remote code execution (RCE) vulnerability in the Ingress NGINX admission controller. I found the exploit chain particularly intriguing and decided to recreat...

blog.flomb.net/posts/ingres...

31.03.2025 14:28 β€” πŸ‘ 5    πŸ” 3    πŸ’¬ 0    πŸ“Œ 0
Post image

This was a pretty cool online course by @voidstarsec I can recommend.

30.03.2025 08:35 β€” πŸ‘ 2    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0

Our crew members @mwulftange.bsky.social & @frycos.bsky.social discovered & responsibly disclosed several new RCE gadgets that bypass #Veeam 's blacklist for CVE-2024-40711 & CVE-2025-23120 + further entry points after @sinsinology.bsky.social & @chudypb.bsky.social 's blog. Replace BinaryFormatter!

28.03.2025 16:35 β€” πŸ‘ 9    πŸ” 6    πŸ’¬ 0    πŸ“Œ 2

If you think code audits are driving you to the brink of insanity, try hardware hacking...

12.03.2025 22:21 β€” πŸ‘ 6    πŸ” 0    πŸ’¬ 0    πŸ“Œ 0
Walkthrough 2023

Ever wondered how Kurts Maultaschenfabrikle got hacked in 2023? The full story, all technical details, out now ;-) apply-if-you-can.com/walkthrough/...

21.02.2025 10:31 β€” πŸ‘ 7    πŸ” 10    πŸ’¬ 0    πŸ“Œ 0

This is a very unique, nice and small conference I can recommend. Good networking opportunities. ✌️

07.02.2025 07:18 β€” πŸ‘ 6    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Post image

First blog post draft for 2025 queued for release. Waiting for patches then…

05.02.2025 22:52 β€” πŸ‘ 11    πŸ” 0    πŸ’¬ 1    πŸ“Œ 0

Q: have you heard of this math theorum? No? Okay well intuit how it will work in code anyway.

Me: ......no.

Dodged that bullet.

24.01.2025 04:47 β€” πŸ‘ 7    πŸ” 1    πŸ’¬ 3    πŸ“Œ 0

@frycos is following 19 prominent accounts