Hacking Brasil
241 subscribers
74 photos
21 videos
20 files
219 links
Think correctly about hacking!
By: @hxcking
Download Telegram
CVE-2025-6389
is a Critical (CVSS 9.8) vulnerability
in the Sneeit Framework WordPress plugin (≤ 8.3)
exploit
👍2
Microsoft Web Deploy RCE Exploit - CVE-2025-53772

https://github.com/sailay1996/CVE-2025-53772/tree/main
On the clock: Escaping VMware Workstation at Pwn2Own Berlin 2025

🔗 Link
Bypass Azure Admin Approval Mode for User Consent Workflow When Enumerating

https://pgj11.com/posts/Bypass-Azure-Admin-Approval-Mode-Enumeration/
This media is not supported in your browser
VIEW IN TELEGRAM
Evil-Cardputer - Wi-Fi Spycam detection and CCTV Toolkit

Ever wanted a pocket-size toolkit with Wi-Fi Spycam detection and CCTV Toolkit? 📸

A major update that brings CCTV Toolkit 🎥 directly on the device. You can now check for your badly configured camera and check for hidden one with direct stream view when found !!!

Key features (v1.4.3)
💎CCTV Toolkit: LAN/WAN IP-camera recon → port scan, brand fingerprint + CVE hints, login finder, default-creds test, stream discovery, reporting.
💎MJPEG Viewer: cycle through discovered MJPEG streams, adjust resolution/compression.
💎Spycam Detector: detect hidden Wi-Fi cameras via SSID/OUI heuristics that know for being SpyCamera.


GitHub
👍1
Windows Kernel Debugging Fundamentals @hackingbra.zip
739.3 MB
Windows Kernel Debugging Fundamentals

◽️ Introduction to Windows Crashes and Hangs
◽️ Getting Started With the Windows Debugger
◽️ Getting Help in the Windows Debugger
◽️ Configuring the Windows Debugger
◽️ Starting Your Crash Dump Analysis
◽️ Understanding Stack Traces
◽️ Debugging Processes and Threads
◽️ Understanding Processors and Disassembled Code
◽️ Investigating Locks and Spinlocks
◽️ Exploring Windows Virtual Memory
◽️ Windows Drivers and Interrupts
◽️ Forcing Windows Memory Dumps
VENOM 1.0.17 - metasploit Shellcode generator/compiller

https://github.com/r00t-3xp10it/venom
A 32-Year-Old Bug Walks Into A Telnet Server (GNU inetutils Telnetd CVE-2026-32746 Pre-Auth RCE)

Original textby watchTowr Labs

The article emphasizes the historical aspect of the bug: the vulnerable code path originates from legacy Telnet implementations and remained unnoticed for over three decades, illustrating how long-standing protocol features and old code can persist in modern software. The researchers walk through the debugging process, protocol analysis, and memory-corruption behavior, showing…

https://core-jmp.org/2026/03/a-32-year-old-bug-walks-into-a-telnet-server-gnu-inetutils-telnetd-cve-2026-32746-pre-auth-rce/
METATRON

AI-powered penetration testing assistant using local LLM on GNU/Linux (Parrot OS)

Link
PoC of DarkSword iOS exploit tested on iOS 17.1.1 - 26.0.1
https://github.com/rooootdev/lara
WOW
Pack2TheRoot - CVE-2026-4165
1

make Exploit