's Avatar

@droner.bsky.social

researcher. exploit dev. pdx. hacking @ atredis https://dronesec.net/

133 Followers  |  204 Following  |  23 Posts  |  Joined: 02.10.2023
Posts Following

Posts by (@droner.bsky.social)

Phrack Prophile on FX Click to read the article on phrack

phrack.org/issues/68/2#...
Another legend has crossed over. Thank you @fxv2.bsky.social for being your kind, brilliant self, whose contributions are too many to name, not just in hacking, but in being a superconnector who I now know is responsible for so many friendships & marriages. You are missed.

02.03.2026 19:09 β€” πŸ‘ 20    πŸ” 3    πŸ’¬ 1    πŸ“Œ 1
Preview
proof-of-concept/cve-2025-36632 at main Β· atredispartners/proof-of-concept Proof of concepts and other snippets. Contribute to atredispartners/proof-of-concept development by creating an account on GitHub.

On a recent engagement, we exploited a previously disclosed privilege escalation bug in Tenable's Nessus Agent. No public PoC was available, so we made one; check it out here github.com/atredispartn...

26.02.2026 18:43 β€” πŸ‘ 3    πŸ” 4    πŸ’¬ 0    πŸ“Œ 0
A Deep Dive into the GetProcessHandleFromHwnd API - Project Zero In my previous blog post I mentioned the GetProcessHandleFromHwnd API. This was an API I didn’t know existed until I found a publicly disclosed UAC bypass us...

In the final part of his blog series, @tiraniddo.dev tells the story of how a bug was introduced into a Windows API.

Code re-writes can improve security, but it’s important not to forget the security properties the code needs to enforce in the process.

projectzero.google/2026/02/gphf...

26.02.2026 19:41 β€” πŸ‘ 5    πŸ” 4    πŸ’¬ 0    πŸ“Œ 0
Preview
WOOT '26 Call for Papers The 20th USENIX WOOT Conference on Offensive Technologies (WOOT '26) will take place at the Baltimore Marriott Waterfront in Baltimore, MD, USA, on August 10–11, 2026. The USENIX WOOT Conference aims ...

The Cycle 2 deadline for the USENIX WOOT Conference is in just one week (March 3, 2026).

Full details are available in the Call for Papers:
www.usenix.org/conference/w...

24.02.2026 21:20 β€” πŸ‘ 2    πŸ” 3    πŸ’¬ 0    πŸ“Œ 0

[RSS] Discovery & Analysis of CVE-2025-29969


www.safebreach.com ->

(Windows MS-EVEN RPC Remote Code Execution Vulnerability)


Original->

20.02.2026 18:46 β€” πŸ‘ 0    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0

Guess what's out :)

19.02.2026 14:10 β€” πŸ‘ 5    πŸ” 3    πŸ’¬ 0    πŸ“Œ 0
Post image

We have disclosed CVE-2026-2329, a critical unauth stack-based buffer overflow vuln affecting the Grandstream GXP1600 series of VoIP phones. Read our disclosure on the @rapid7.com blog, including technical details for unauth RCE, and accompanying @metasploit-r7.bsky.social modules: r-7.co/4tIzope

18.02.2026 14:39 β€” πŸ‘ 3    πŸ” 5    πŸ’¬ 0    πŸ“Œ 0
Preview
UNC6201 Exploiting a Dell RecoverPoint for Virtual Machines Zero-Day | Google Cloud Blog UNC6201 utilizes a newly discovered zero-day in Dell RecoverPoint for Virtual Machines to deliver BRICKSTORM and subsequently backdoors.

A suspected Chinese APT, UNC6201, is exploiting a zero-day in Dell RecoverPoint for Virtual Machines

cloud.google.com/blog/topics/...

17.02.2026 19:26 β€” πŸ‘ 8    πŸ” 3    πŸ’¬ 0    πŸ“Œ 0
Post image Post image

Three-part series Binarly on Supermicro BMC firmware authentication bypasses

Part 1: www.binarly.io/blog/ghost-i...
Part 2: www.binarly.io/blog/broken-...
Part 3: www.binarly.io/blog/have-yo...

#infosec

15.02.2026 12:45 β€” πŸ‘ 14    πŸ” 4    πŸ’¬ 0    πŸ“Œ 0

[RSS] IDA Pro 9.3 released


docs.hex-rays.com ->


Original->

15.02.2026 13:06 β€” πŸ‘ 0    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
Reconnaissance Has Begun for the New BeyondTrust RCE (CVE-2026-1731): Here's What We See So Far A PoC for CVE-2026-1731 hit GitHub on Feb 10. Within 24 hours, GreyNoise observed reconnaissance probing for vulnerable BeyondTrust instances.

It took less than a day. A PoC for BeyondTrust CVE-2026-1731 hit GitHub, and GreyNoise immediately started seeing reconnaissance from multi-exploit actors hiding behind VPNs + custom tooling. See what our data reveals about who’s mapping targets + how.

12.02.2026 18:13 β€” πŸ‘ 2    πŸ” 2    πŸ’¬ 0    πŸ“Œ 1

The February 2026 security updates are available:

10.02.2026 21:17 β€” πŸ‘ 2    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0
Preview
CVE-2026-1731 | AttackerKB On February 6, 2026, BeyondTrust published an advisory for a new critical command injection vulnerability, CVE-2026-1731, affecting their products Remote Suppo…

We just published our @rapid7.com analysis of CVE-2026-1731, a critical command injection affecting BeyondTrust Privileged Remote Access (PRA) & Remote Support (RS). Unauthenticated RCE, with a root cause due to Bash arithmetic evaluation. Analysis/PoC here: attackerkb.com/topics/jNMBc...

10.02.2026 15:07 β€” πŸ‘ 3    πŸ” 1    πŸ’¬ 0    πŸ“Œ 1

Atredis identified a vulnerability in the way Rapid7's Nexpose was generating passwords to protect its Java KeyStore which is used to encrypt saved credentials. This vulnerability was reported to Rapid7 and a patch is being rolled out today! Check out the details here: github.com/atredispartn...

09.02.2026 19:27 β€” πŸ‘ 0    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0
Preview
What Really Killed Flash Player: A Six-Year Campaign of Deliberate Platform Work This is what it actually took. From the person who architected and drove Chrome’s Flash deprecation from proposal to the final removal in…

The remarkable true story of how Flash was deprecated

medium.com/@aglaforge/w...

06.02.2026 21:56 β€” πŸ‘ 5    πŸ” 3    πŸ’¬ 1    πŸ“Œ 0

AMD updates installed without signature checking (from an HTTP link, no less)? /via @drwhax


mrbruh.com ->

Recent report about a nation-state implant that would be useful to exploit this:


blog.talosintelligence.com ->


Original->

06.02.2026 16:12 β€” πŸ‘ 2    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
Zero Day Initiative β€” CVE-2025-6978: Arbitrary Code Execution in the Arista NG Firewall In this excerpt of a TrendAI Research Services vulnerability report, Jonathan Lein and Simon Humbert of the TrendAI Research team detail a recently patched command injection vulnerability in the Arist...

CVE-2025-6978: Arbitrary Code Execution in the #Arista NG Firewall - our researchers took a deep dive into this recently patched RCE to provide root cause and detection guidance. Read all the details at www.zerodayinitiative.com/blog/2026/2/...

05.02.2026 16:48 β€” πŸ‘ 4    πŸ” 3    πŸ’¬ 0    πŸ“Œ 0
Preview
The Chrysalis Backdoor: A Deep Dive into Lotus Blossom’s toolkit Rapid7 Labs, together with the Rapid7 MDR team, has uncovered a sophisticated campaign attributed to the Chinese APT group Lotus Blossom.

Some IOCs for the Notepad++ backdoors from Rapid7, they're good. www.rapid7.com/blog/post/tr...

I will drop more later.

02.02.2026 18:50 β€” πŸ‘ 23    πŸ” 14    πŸ’¬ 1    πŸ“Œ 0
Post image

Registration is open to all RECon classes!

As usual, I’ll be teaching Windows Internals. This is the only time this year that the class is offered in North America 😊

And if windows isn’t your thing, there are lots of other great classes!

recon.cx/2026/en/trai...

31.01.2026 15:34 β€” πŸ‘ 4    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0
Breaking the Sound Barrier, Part II: Exploiting CVE-2024-54529 - Project Zero In the first part of this series, I detailed my journey into macOS security research, which led to the discovery of a type confusion vulnerability (CVE-2024-...

Our intrepid 20%-er Dillon Franke exploited a vulnerability in CoreAudio. See his process for gaining privilege escalation on a Mac:

projectzero.google/2026/01/soun...

30.01.2026 18:37 β€” πŸ‘ 7    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Samstung Part 1 :: Remote Code Execution in MagicINFO 9 Server One weekend, I decided to unpack some of the patches that Samsung have been sending out for their MagicINFO 9 solution. During this process, I discovered mul...

@steven.srcincite.io did some cool stuff, check it out!

srcincite.io/blog/2026/01...

29.01.2026 13:21 β€” πŸ‘ 3    πŸ” 2    πŸ’¬ 0    πŸ“Œ 0

Hadn't realised that the third party review of Twitter's chat protocol had been published and wow github.com/trailofbits/...

28.01.2026 18:21 β€” πŸ‘ 119    πŸ” 35    πŸ’¬ 2    πŸ“Œ 6
Preview
General Graboids: Worms and Remote Code Execution in Command & Conquer β€” Atredis Partners [this work was conducted collaboratively by Bryan Alexander and Jordan Whitehead] This post details several vulnerabilities discovered in the popular online game Command & Conquer: Generals. We…

Command & Conquer'd: worming RCEs through a classic multiplayer game. Check out the full writeup from our @districtcon.bsky.social Junkyard submission here:
www.atredis.com/blog/2026/1/...
By @droner.bsky.social and @jordan9001.bsky.social

#Security #modding #rce

28.01.2026 15:42 β€” πŸ‘ 9    πŸ” 7    πŸ’¬ 0    πŸ“Œ 2
Post image

New blog post is live! Xusheng tears apart a tiny Linux binary that really does not want to be reversed. Malformed ELF headers, segment tricks, layered XOR and RC4, plus a bunch of Binary Ninja tricks along the way. Read it here: binary.ninja/2026/01/23/r...

27.01.2026 15:31 β€” πŸ‘ 7    πŸ” 3    πŸ’¬ 0    πŸ“Œ 0

[RSS] Districton 1 Slides - Control the Variables and You Control the Code: Language-Level Vulnerabilities in Adobe ColdFusion


www.hoyahaxa.com ->


Original->

27.01.2026 08:10 β€” πŸ‘ 0    πŸ” 3    πŸ’¬ 0    πŸ“Œ 0

Demystifying CVE-2025-47987 [Heap-based buffer overflow in Windows Cred SSProvider Protocol LPE]


kryptoenix.github.io ->


Original->

25.01.2026 09:22 β€” πŸ‘ 1    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
CODE WHITE | Unauthenticated RCE in NetSupport Manager - A Technical Deep Dive NetSupport Manager is a remote control and support software that we find surprisingly often utilized in sensitive *Operational Technology (OT)* environments, such as production plant networks. Besides...

You like technical deep dives into binary exploitation and crazy heap wizardry? Then you'll like our blog post about unauth'ed RCE in NetSupport Manager aka CVE-2025-34164 & CVE-2025-34165 code-white.com/blog/2026-01...

23.01.2026 12:28 β€” πŸ‘ 7    πŸ” 9    πŸ’¬ 0    πŸ“Œ 1
Cisco Security Advisory: Cisco Unified Communications Products Remote Code Execution Vulnerability A vulnerability in Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), Cisco Unified Communications Manager IM & Presen...

New Cisco zero-day, CVE-2026-20045

sec.cloudapps.cisco.com/security/cen...

21.01.2026 21:43 β€” πŸ‘ 6    πŸ” 5    πŸ’¬ 1    πŸ“Œ 0

This may be the only offering of my fuzzing class at a conference this year and includes updates for targeting edge devices and arm64!

20.01.2026 20:01 β€” πŸ‘ 2    πŸ” 1    πŸ’¬ 0    πŸ“Œ 0
Preview
oss-sec: GNU InetUtils Security Advisory: remote authentication by-pass in telnetd

Days since somebody dropped a huge 0-day on the oss-security mailing list: 0

seclists.org/oss-sec/2026...

20.01.2026 20:41 β€” πŸ‘ 5    πŸ” 2    πŸ’¬ 1    πŸ“Œ 0