π The swag: We knew our new merch was cool, but that line?! Seeing so many of you waiting to grab a Pentest-Tools.com T-shirt was a massive compliment. We hope you wear them while you hunt your next bug.
20.11.2025 14:29 β π 0 π 0 π¬ 0 π 0
πΊ Missed them live? Don't worry, we'll be sharing the recordings on our YouTube channel soon, so keep an eye out!
20.11.2025 14:29 β π 0 π 0 π¬ 1 π 0
Our Offensive Security Research Lead, Matei "CVE Jesus" BΔdΔnoiu, took us deep into the "Nightmare Factory," breaking down the process behind the 15 fresh 0-days the team found this year.
20.11.2025 14:28 β π 0 π 0 π¬ 1 π 0
π€ The talks: It was a big year for our research team on stage!
Our Founder & CEO, Adrian FurtunΔ, explored how LLMs are changing the game in "VIBE Pentesting" (enhancing the human hacker, not replacing them!).
20.11.2025 14:28 β π 0 π 0 π¬ 1 π 0
Huge kudos to the organizers for pulling off such a great gathering. It was a blast seeing so many familiar faces and meeting so many new people who share our passion for breaking things (for the right reasons).
A few highlights from our team:
20.11.2025 14:27 β π 0 π 0 π¬ 1 π 0
Pentest-Tools.com team @ DefCamp 2025
DefCamp 2025, you were so awesome! β‘οΈ
Another year, another incredible edition in the books. We are so proud to have been part of this event once again and to see the community showing up in full force in Bucharest.
#DefCamp2025 #OffensiveSecurity #InfosecCommunity #Cybersecurity #Pentesting
20.11.2025 14:27 β π 2 π 0 π¬ 1 π 0
Youβll also get an actionable follow-up asset to help you apply these ideas in your own testing and client work.
Because even when AI changes how we build, the best way to secure what we create is still to think like someone trying to break it.
18.11.2025 13:49 β π 0 π 0 π¬ 0 π 0
In this webinar, youβll learn:
π‘ Why logic flaws and insecure assumptions still drive critical risks in AI-heavy stacks
βοΈ Where human reasoning fills the gaps scanners and code reviewers miss
π How to use attacker workflows alongside AI tools to test faster and smarter
18.11.2025 13:49 β π 0 π 0 π¬ 1 π 0
Razvan Ionescu - How attackers think (and why it's still the best way to test AI products)
Last chance to register to the webinar - How attackers think (and why it's still the best way to test AI products)
Attackers donβt care what built your app. They care how it breaks.
18.11.2025 13:47 β π 0 π 0 π¬ 1 π 0
No noise. No guesswork. Just proof.
Old vulns still do new damage - if you let them.
π CVE-2025-61882 specs: pentest-tools.com/vulnerabilit...
ποΈ Read the news: www.securityweek.com/nearly-30-al...
17.11.2025 13:56 β π 0 π 0 π¬ 0 π 0
Use Pentest-Tools.com to stay ahead:
β
Detect Oracle EBS servers exposed to this RCE with the Network Scanner.
β
Recreate the attack safely in Sniper: Auto-Exploiter to confirm impact.
β
Verify your fixes and make sure no asset stays vulnerable.
17.11.2025 13:55 β π 1 π 0 π¬ 1 π 0
Itβs already on CISAβs KEV list and spreading fast.
Hereβs what most security teams face:
π© Patching doesnβt prove youβre safe.
π© Banner scans miss real exposure.
π© You need proof of exploitability, not assumptions.
17.11.2025 13:55 β π 0 π 0 π¬ 1 π 0
Cl0p just listed nearly 30 new victims, from major companies to universities.
They use CVE-2025-61882, a pre-auth RCE in Oracle E-Business Suite (12.2.3 β 12.2.14) with a CVSS β 9.8.
17.11.2025 13:55 β π 0 π 0 π¬ 1 π 0
CVE-2025-61882
π¨ Old vuln, fresh damage - attackers hit Oracle EBS again.
#infosec #cybersecurity #offensivesecurity #ransomware #incidentresponse
17.11.2025 13:55 β π 2 π 0 π¬ 1 π 0
How attackers think
Join our webinar to learn how human pentesters uncover AI app flaws that tools miss, and how to balance automation with real attacker insight.
π
Join Razvan live on November 19! Sign up below β¬οΈ
ποΈ Webinar: How attackers think (and why itβs still the best way to test AI products)
π Fill in the form to book your spot: pentest-tools.com/webinars/how...
12.11.2025 13:06 β π 0 π 0 π¬ 0 π 0
In our next webinar, heβll share why the pentester mindset hasnβt changed, even as AI reshapes the surface of security, and how to apply that mindset to modern testing workflows.
12.11.2025 13:06 β π 1 π 0 π¬ 1 π 0
πͺͺ Heβs also GSE-certified (#298)! One of the few professionals worldwide to earn this advanced credential. Itβs proof of deep, practical expertise built through real-world exploitation, analysis, and problem-solving.
12.11.2025 13:05 β π 0 π 0 π¬ 1 π 0
As Head of Offensive Security Services at Pentest-Tools.com, Razvan leads high-impact pentests that turn complex vulnerabilities into clear, actionable guidance teams can actually use.
12.11.2025 13:05 β π 0 π 0 π¬ 1 π 0
βοΈ Before AI could write code, Razvan-Costin IONESCU was already breaking it.
#vulnerabilityassessment #informationsecurity #cybersecurity #pentesting
12.11.2025 13:05 β π 2 π 0 π¬ 1 π 0
Authenticated web app scanning
Run authenticated web app scans to uncover hidden flaws behind logins. ML-assisted authentication ensures reliable and deep vulnerability coverage.
β
Simulate real logins (headers, tokens, or credentials)
β
Test session handling and authenticated flows
β
Detect vulnerabilities in the pages users actually access
Wanna know how we do it?
π§° See how it works: pentest-tools.com/features/aut...
11.11.2025 12:16 β π 0 π 0 π¬ 0 π 0
If your web app assessments donβt follow real user journeys, youβre missing what actually matters.
Authenticated scanning is a particular area of focus for us because we want to make sure you can:
2/3
11.11.2025 12:16 β π 0 π 0 π¬ 1 π 0
π The riskiest vulnerabilities live behind the login - and most scanners donβt go there. Howeverrrrr...
Attackers donβt stop at the login screen.
π΄ββ οΈ They target whatβs behind it: broken access controls, IDORs, insecure password policies, and privilege escalation paths.
1/3
11.11.2025 12:16 β π 0 π 0 π¬ 1 π 0
Learn more about our presence: pentest-tools.com/events/defca...
Register for the event: def.camp/tickets
10.11.2025 14:50 β π 0 π 0 π¬ 0 π 0
π‘ Why visit our booth?
Because our tools are built by breakers - for people who want proof, not promises.
π Come to watch live demos;
π Talk to the makers;
π Grab limited-edition swag that turns heads;
π We might even recruit you in our team.
10.11.2025 14:49 β π 0 π 0 π¬ 1 π 0
π― Nightmare Factory
πΉ Matei βCVE Jesusβ BΔdΔnoiu, Offensive Security Research Lead
π Thu, Nov 13 | Track 2 β BΔlcescu
A deep dive into our 0-day hunting process - from CVEs in Odoo and Gitea to 15 fresh 0-days found this year (and counting).
10.11.2025 14:49 β π 0 π 0 π¬ 1 π 0
This year, two of our own are taking the stage:
π― VIBE Pentesting - Enhancing the Human Hacker with LLMs
πΉ Adrian Furtuna, Founder & CEO
π Thu, Nov 13 | Track 1 β Rosetti
How AI is changing pentesting: real examples of how LLMs boost discovery, validation, exploitation, and reporting.
10.11.2025 14:49 β π 0 π 0 π¬ 1 π 0
We build the tools we wish we had in the field.
Last yearβs DefCamp reminded us what this community is all about: real talks, real bugs, and real people who love breaking things for the right reasons. www.youtube.com/watch?v=QcVF...
10.11.2025 14:48 β π 1 π 0 π¬ 1 π 0
How attackers think
Join our webinar to learn how human pentesters uncover AI app flaws that tools miss, and how to balance automation with real attacker insight.
Save your spot π pentest-tools.com/webinars/how...
Discover why attacker creativity and contextual reasoning canβt be automated (yet).
Because no matter how advanced the tech, security still comes down to one thing: understanding how things break and thinking like someone who wants to break them.
07.11.2025 14:26 β π 0 π 0 π¬ 0 π 0
Pentest-Tools.com webinar
βοΈβπ₯ AI can write your app. But it still canβt think like someone trying to break it.
βΆοΈ Join our live webinar "How attackers think (and why itβs still the best way to test AI products)", to see how vulnerabilities still slip into modern stacks, from logic flaws to familiar risks hidden in new AI code
07.11.2025 14:26 β π 0 π 0 π¬ 1 π 0
CTO at Bluesky.
I'm on Germ DM π
https://ger.mx/A6lLhakn-kJcja1Rlx6gOuwFvCEyrvK4y9lDSo6anFmU#did:plc:ragtjsm2j2vknwkz3zp4oxrd
(he/him) Comms for @eff.org; formerly with @ericswalwell.bsky.social, Oakland Tribune/Mercury News, Express-Times, Mizzou Journalism. Booze, books, cats. Opinions here are mine all mine. https://linktr.ee/joshrichman
Editor and writer. Tech critic. Doing work stuff for my local Center for Migrant Worker Rights (which isn't on Bsky). If you like anything I've posted, donate to this family: https://chuffed.org/project/116311-protect-an-open-source-engineer-and-his-family
Editor-in-Chief, Rest of World. Alum of The Washington Post, BuzzFeed News, Roads & Kingdoms, and The Kathmandu Post. Eater of goats.π³π΅
Freelance Science Journalist. Fact Checker.
NatGeo, BBC, SciAm, NBC News, PopSci, WIRED, and others.
Hire me to fact check your book.
I post about Jewish stuff, disability, Star Trek, and The Buffalo Bills.
Jersey girl.
cyberpunk is a warning, not a manual
she/her. dayjob & usual location: City & County of San Francisco (this is a personal account)
ex-18F; on the board @ Technologists for the Public Good; wrote a small book about doing this: https://cydharrell.com/book/
Senior Editor @theverge.com β Sign up to Notepad, my weekly newsletter on Microsoft's big bets at http://theverge.com/notepad β Tips? msg me on Signal: tomwarren.01
ο£Ώ Cryptographic & Security Engineering
www.fredericjacobs.com
https://ger.mx/A-RGsldmQt0iXfnzPgXNzLzA5_jvDbWHabqz1yJrt2ma#did:plc:oxwmqopgbm3driwzues7odpz
Threat Intelligence for Silent Push. Digital security for at-risk people.
Researcher, reader, runner. Eternal traveler, serial migrant, music blogger, lapsed mathematician.
https://lapsedordinary.net/
Signal: martijngrooten.37
Breaker of software, responder of incidents, IANS Faculty, VP R&D Hunter Strategy.
Philadelphian in Cascadia. Vociferous champion for Oxford commas, two spaces after a period, and ellipses. I break into buildings. π
"Even if the world were ending tomorrow, I would still plant a tree." π²
(he/they)
CISO of SentinelOne, teaching at Stanford.
Hacking/crime/privacy journalist. Author of DARK WIRE, buy here: https://www.hachettebookgroup.com/titles/joseph-cox/dark-wire/9781541702691/#preorder Co-founder of 404 Media. Signal: joseph.404 Email: joseph@404media.co
Secure Code Trainer - Best-selling author of Alice and Bob Learn Secure Coding & Alice and Bob Learn Application Security. #AppSec she/her
https://shehackspurple.ca π»
Security Researcher at Google Project Zero. 0-days all day. Love all things reverse engineering. she/her
Writer for WIRED. Author of SANDWORM. New book, TRACERS IN THE DARK: The Global Hunt for the Crime Lords of Cryptocurrency, out now. agreenberg@wired.com. Andy.01 on Signal.
Journalist, currently at The New York Times. I cover privacy, technology, A.I., and the strange times we live in. Named after the Led Zeppelin song. Author of YOUR FACE BELONGS TO US. (Yes, in my head it will always be All Your Face Are Belong To Us)
I am eminently qualified to speak from experience about a variety of dumpster fires.
ICS DFIR at Dragos, martial artist, marksman, humanist, level 14 Neutral Good rogue, USAF retired. I post *very serious* things about infosec. Thoughts my own. Enby. π³οΈβπ