CVE-2025-6389
is a Critical (CVSS 9.8) vulnerability
in the Sneeit Framework WordPress plugin (≤ 8.3)
exploit
is a Critical (CVSS 9.8) vulnerability
in the Sneeit Framework WordPress plugin (≤ 8.3)
exploit
👍2
Microsoft Web Deploy RCE Exploit - CVE-2025-53772
https://github.com/sailay1996/CVE-2025-53772/tree/main
https://github.com/sailay1996/CVE-2025-53772/tree/main
Bypass Azure Admin Approval Mode for User Consent Workflow When Enumerating
https://pgj11.com/posts/Bypass-Azure-Admin-Approval-Mode-Enumeration/
https://pgj11.com/posts/Bypass-Azure-Admin-Approval-Mode-Enumeration/
This media is not supported in your browser
VIEW IN TELEGRAM
Evil-Cardputer - Wi-Fi Spycam detection and CCTV Toolkit
Ever wanted a pocket-size toolkit with Wi-Fi Spycam detection and CCTV Toolkit? 📸
A major update that brings CCTV Toolkit 🎥 directly on the device. You can now check for your badly configured camera and check for hidden one with direct stream view when found !!!
✨ Key features (v1.4.3)
💎CCTV Toolkit: LAN/WAN IP-camera recon → port scan, brand fingerprint + CVE hints, login finder, default-creds test, stream discovery, reporting.
💎MJPEG Viewer: cycle through discovered MJPEG streams, adjust resolution/compression.
💎Spycam Detector: detect hidden Wi-Fi cameras via SSID/OUI heuristics that know for being SpyCamera.
GitHub
Ever wanted a pocket-size toolkit with Wi-Fi Spycam detection and CCTV Toolkit? 📸
A major update that brings CCTV Toolkit 🎥 directly on the device. You can now check for your badly configured camera and check for hidden one with direct stream view when found !!!
✨ Key features (v1.4.3)
💎CCTV Toolkit: LAN/WAN IP-camera recon → port scan, brand fingerprint + CVE hints, login finder, default-creds test, stream discovery, reporting.
💎MJPEG Viewer: cycle through discovered MJPEG streams, adjust resolution/compression.
💎Spycam Detector: detect hidden Wi-Fi cameras via SSID/OUI heuristics that know for being SpyCamera.
GitHub
👍1
Como hackeei hackers no leHack-2025 (use o tradutor, esta em russo esse artigo)
https://habr.com/ru/companies/flant/articles/943426/
https://habr.com/ru/companies/flant/articles/943426/
Хабр
Как я хакнул хакеров на leHack-2025
TL;DR Перевели статью, автор которой на конференции leHack-2025 развернул систему, состоящую из 8 микроконтроллеров ESP32-C3 и 2 устройств Cardputer под управлением Evil-M5Project . Идея была в...
Windows Kernel Debugging Fundamentals @hackingbra.zip
739.3 MB
Windows Kernel Debugging Fundamentals
◽️ Introduction to Windows Crashes and Hangs
◽️ Getting Started With the Windows Debugger
◽️ Getting Help in the Windows Debugger
◽️ Configuring the Windows Debugger
◽️ Starting Your Crash Dump Analysis
◽️ Understanding Stack Traces
◽️ Debugging Processes and Threads
◽️ Understanding Processors and Disassembled Code
◽️ Investigating Locks and Spinlocks
◽️ Exploring Windows Virtual Memory
◽️ Windows Drivers and Interrupts
◽️ Forcing Windows Memory Dumps
A 32-Year-Old Bug Walks Into A Telnet Server (GNU inetutils Telnetd CVE-2026-32746 Pre-Auth RCE)
Original textby watchTowr Labs
The article emphasizes the historical aspect of the bug: the vulnerable code path originates from legacy Telnet implementations and remained unnoticed for over three decades, illustrating how long-standing protocol features and old code can persist in modern software. The researchers walk through the debugging process, protocol analysis, and memory-corruption behavior, showing…
https://core-jmp.org/2026/03/a-32-year-old-bug-walks-into-a-telnet-server-gnu-inetutils-telnetd-cve-2026-32746-pre-auth-rce/
Original textby watchTowr Labs
The article emphasizes the historical aspect of the bug: the vulnerable code path originates from legacy Telnet implementations and remained unnoticed for over three decades, illustrating how long-standing protocol features and old code can persist in modern software. The researchers walk through the debugging process, protocol analysis, and memory-corruption behavior, showing…
https://core-jmp.org/2026/03/a-32-year-old-bug-walks-into-a-telnet-server-gnu-inetutils-telnetd-cve-2026-32746-pre-auth-rce/
PoC of DarkSword iOS exploit tested on iOS 17.1.1 - 26.0.1
https://github.com/rooootdev/lara
https://github.com/rooootdev/lara