Latest β Greatest? A Retrospective Analysis of CVE-2025-59287 in Microsoft WSUS from our very own @mwulftange.bsky.social who loves converting n-days to 0-days code-white.com/blog/wsus-cv...
29.10.2025 13:05 β π 7 π 5 π¬ 0 π 1@codewhitesec.bsky.social
Red Teaming. Security Research. Continuous Penetration Testing. Threat Intelligence.
Latest β Greatest? A Retrospective Analysis of CVE-2025-59287 in Microsoft WSUS from our very own @mwulftange.bsky.social who loves converting n-days to 0-days code-white.com/blog/wsus-cv...
29.10.2025 13:05 β π 7 π 5 π¬ 0 π 1ULMageddon Logo
CODE WHITE proudly presents #ULMageddon which is our newest applicants challenge at apply-if-you-can.com packaged as a metal festival. Have fun π€ and #applyIfYouCan
15.09.2025 07:40 β π 5 π 6 π¬ 0 π 1We always love a good challenge. Thatβs why weβre sponsoring the 10th FAUST CTF. Game on at 2025.faustctf.net
28.08.2025 12:22 β π 7 π 6 π¬ 0 π 0We've added a new demo to NewRemotingTricks that makes deploying a MarshalByRefObject (e.g., WebClient) even easier: System.Lazy<T> creates an instance of T on serialization, which is probably more likely to be allowed than a XAML gadget getting through. github.com/codewhitesec...
05.08.2025 15:11 β π 4 π 4 π¬ 0 π 1To clarify: we did not discover these bugs - all credit goes to @_l0gg (on X). We diffed the patches, quickly built a working exploit internally (and identified another auth bypass afterwards)
21.07.2025 08:30 β π 0 π 0 π¬ 0 π 0We have reproduced "ToolShell", the unauthenticated exploit chain for CVE-2025-49706 + CVE-2025-49704 used by @_l0gg (on X) to pop SharePoint at #Pwn2Own Berlin 2025, it's really just one request! Kudos to @mwulftange.bsky.social
14.07.2025 13:00 β π 4 π 5 π¬ 1 π 2Yes, we're beating a dead horse. But that horse still runs in corporate networks - and quietly gives attackers the keys to the kingdom. We're publishing whatβs long been exploitable. Time to talk about it. #DSM #Ivanti code-white.com/blog/ivanti-...
13.05.2025 06:45 β π 8 π 8 π¬ 0 π 1Our crew members @mwulftange.bsky.social & @frycos.bsky.social discovered & responsibly disclosed several new RCE gadgets that bypass #Veeam 's blacklist for CVE-2024-40711 & CVE-2025-23120 + further entry points after @sinsinology.bsky.social & @chudypb.bsky.social 's blog. Replace BinaryFormatter!
28.03.2025 16:35 β π 9 π 6 π¬ 0 π 2Ever wondered how Kurts Maultaschenfabrikle got hacked in 2023? The full story, all technical details, out now ;-) apply-if-you-can.com/walkthrough/...
21.02.2025 10:31 β π 7 π 10 π¬ 0 π 0