Critical zero-day vulnerability (CVE-2026-1731) in BeyondTrust Remote Support & Privileged Remote Access allows unauthenticated RCE. Immediate patching required! #CyberSecurity #ZeroDay #BeyondTrust Link: thedailytechfeed.com/critical-zer...
08.02.2026 15:01 β π 1 π 1 π¬ 0 π 0
Highly recommend the writeup from our @fl0mb.bsky.social and congrats on this well-deserved achievement!
05.02.2026 16:15 β π 4 π 3 π¬ 0 π 0
[RSS] Districton 1 Slides - Control the Variables and You Control the Code: Language-Level Vulnerabilities in Adobe ColdFusion
www.hoyahaxa.com ->
Original->
27.01.2026 08:10 β π 0 π 3 π¬ 0 π 0
Crazy work by my colleague Fabian. High impact target: one might be amazed at how widespread this product is in industrial networks.
23.01.2026 12:33 β π 3 π 2 π¬ 0 π 0
25 days later, White Date is still down.
23.01.2026 15:42 β π 83 π 15 π¬ 1 π 0
[RSS] [Blog] Unauthenticated RCE in NetSupport Manager - A Technical Deep Dive
code-white.com ->
CVE-2025-34164, CVE-2025-34165
Original->
24.01.2026 23:10 β π 2 π 2 π¬ 0 π 0
mfw I realize you can use C++ WINAPI COM IUIAutomation to communicate with Copilot directly and tell it do things like "execute this file" (Copilot is now Copiloting my malicious payload)
10.01.2026 00:51 β π 25 π 7 π¬ 1 π 0
CODE WHITE | Public Vulnerability List
Public list of vulnerabilities, found by CODE WHITE
In 2025 my colleague and me pwned several widespread medial devices. Check our vuln list for some impressions and get ready for cool blog posts and hopefully conference talks in 2026. π€π»
code-white.com/public-vulne...
20.12.2025 12:34 β π 2 π 1 π¬ 1 π 0
The picture below depicts a (malicious) Inbox Rule. I slightly modified this Inbox Rule to protect our customer, but the gist is that it filters incoming mail from a specific bank employee, moves it to the RSS Folder, and marks it as read.
13.12.2025 09:39 β π 2 π 1 π¬ 1 π 0
bless the heart of whoever posted this and thought it sounded good, lol
12.12.2025 14:26 β π 21 π 4 π¬ 6 π 0
Itβs almost time for my @BSidesCapeTown talk, and Iβve just open sourced pipetap. My Windows named pipe proxy & multi-tool. Excited to see what you do with it!
github.com/sensepost/pi...
06.12.2025 13:56 β π 12 π 4 π¬ 0 π 1
CODE WHITE - Applicants Challenge
Applicants Challenge! Face real-world vulns, earn trophies, First Bloods & epic swag!
Our 2024 applicants challenge is officially #roasted: the full BeanBeat Γ Maultaschenfabrikle walkthrough is now online. Unwrap the write-up at apply-if-you-can.com/walkthrough/... and revisit the hacks that escalated from cold brew to full breach.
05.12.2025 12:47 β π 6 π 6 π¬ 0 π 0
Back home, time to download 15 Windows Server ISOβs via 5g to comply with the European Fair Use Roaming Policy. Not sure if this still qualifies as fair use though π€
22.11.2025 15:17 β π 3 π 0 π¬ 0 π 0
ULMageddon Logo
CODE WHITE proudly presents #ULMageddon which is our newest applicants challenge at apply-if-you-can.com packaged as a metal festival. Have fun π€ and #applyIfYouCan
15.09.2025 07:40 β π 6 π 7 π¬ 0 π 1
pagedout.institute β we've just released Paged Out! zine Issue #7
pagedout.institute/download/Pag... β direct link
lulu.com/search?page=... β prints for zine collectors
pagedout.institute/download/Pag... β issue wallpaper
Enjoy!
Please please please share to spread the news - thank you!
04.10.2025 10:40 β π 20 π 17 π¬ 1 π 3
On your way to @brucon! Are you interested in technical discussions or would you like to know what makes our company so unique? Just talk to us.
24.09.2025 04:42 β π 3 π 1 π¬ 0 π 0
GitHub - ZephrFish/pyLDAPGui: Python based GUI for browsing LDAP
Python based GUI for browsing LDAP. Contribute to ZephrFish/pyLDAPGui development by creating an account on GitHub.
Made a thing, mucking about with python and a LDAP browser concept to ingest straight into BloodHound but also just a nice alternative to ADExplorer with fewer LDAP queries, simple LDAP browser using PyQt as a GUI and neo4j-driver to ingest into BH. github.com/ZephrFish/py... #bloodhound #redteam
13.09.2025 11:31 β π 8 π 1 π¬ 0 π 0
Tech startup idea: instead of starting your car with your key, you get in, turn on the display panel, enter your password, get your phone out, open the authenticator app, enter your pin, enter the timed passcode, then open the start menu, then helpdesk, then "request engine start", then submit a tic
05.09.2025 12:30 β π 807 π 133 π¬ 50 π 16
The table of contents for Phrack 72 from phrack.org
At long last - Phrack 72 has been released online for your reading pleasure!
Check it out: phrack.org
18.08.2025 21:33 β π 121 π 63 π¬ 0 π 4
GitHub - codewhitesec/NewRemotingTricks: New exploitation tricks for hardened .NET Remoting servers
New exploitation tricks for hardened .NET Remoting servers - codewhitesec/NewRemotingTricks
We've added a new demo to NewRemotingTricks that makes deploying a MarshalByRefObject (e.g., WebClient) even easier: System.Lazy<T> creates an instance of T on serialization, which is probably more likely to be allowed than a XAML gadget getting through. github.com/codewhitesec...
05.08.2025 15:11 β π 4 π 4 π¬ 0 π 1
We have reproduced "ToolShell", the unauthenticated exploit chain for CVE-2025-49706 + CVE-2025-49704 used by @_l0gg (on X) to pop SharePoint at #Pwn2Own Berlin 2025, it's really just one request! Kudos to @mwulftange.bsky.social
14.07.2025 13:00 β π 4 π 5 π¬ 1 π 1
Tomorrow's a new month. Is your AWS bill ready?
30.06.2025 16:20 β π 35 π 3 π¬ 3 π 0
Ash?
18.04.2025 14:30 β π 2 π 0 π¬ 0 π 0
Bringing AI to offensive security by autonomously finding and exploiting web vulnerabilities. Watch XBOW hack things: https://xbow.com/traces
Retro tech, early web & vintage computing. 80s, 90s, 2000s nostalgia. Follow for daily posts.
You build it, we break it.
https://recurity-labs.com
Red Teaming. Security Research. Continuous Penetration Testing. Threat Intelligence.
Senior Principal Security Researcher at @rapid7.com. Specializing in software vulnerabilities and exploitation. stephenfewer.github.io
Principal Vulnerability Researcher at the watchTowr | Previously: @thezdi | https://chudypb.github.io
I'll talk about APIs, Security and building applications in #dotnet
https://svrooij.io | Microsoft MVP Security & Graph | wintuner.app | https://mvp.microsoft.com/en-US/mvp/profile/cc128f12-003f-ed11-bba3-000d3a197333
Hermetic Initiate. Exploring conscience and the nature of reality. I also hack things.
Pentester | Maintainer of NetExec
By the power of truth, I, while living, have conquered the universe - /OS(C(P|E)|EE)/ -- Red teamer @codewhitesec.bsky.social | @dhn@infosec.exchange | @dhn_ on X
Security enthusiast, likes Windows internals, AD & Azure.
Blogging at: https://csandker.io
Security researcher/programmer β Managing director @ HexArcana β @DragonSectorCTF founder β he/him
Infosec professional, beverage snob, and fantasy book consumer. Vice President @ Atredis Partners. Forever terrified of Kithicor.