ManuFuzzer is an LLVM-based binary, coverage-guided fuzzing framework for macOS
https://github.com/ant4g0nist/ManuFuzzer
https://github.com/ant4g0nist/ManuFuzzer
GitHub
GitHub - ant4g0nist/ManuFuzzer: Binary code-coverage fuzzer for macOS, based on libFuzzer and LLVM
Binary code-coverage fuzzer for macOS, based on libFuzzer and LLVM - ant4g0nist/ManuFuzzer
1day practice - Escape macOS sandbox (partial) using RemoteViewServices
https://github.com/wh1te4ever/CVE-2025-31258-PoC
https://www.youtube.com/watch?v=GlReVUh_4W4
https://github.com/wh1te4ever/CVE-2025-31258-PoC
https://www.youtube.com/watch?v=GlReVUh_4W4
GitHub
GitHub - wh1te4ever/CVE-2025-31258-PoC: 1day practice - Escape macOS sandbox (partial) using RemoteViewServices
1day practice - Escape macOS sandbox (partial) using RemoteViewServices - wh1te4ever/CVE-2025-31258-PoC
XINTRA Writeup.
This lab emulates a targeted intrusion aligned with Mustang Panda’s TTPs — leveraging spear-phishing, DLL sideloading, and C2 over Dropbox to steal sensitive diplomatic data.
https://cham1ndux.github.io/posts/Mustand-Panda-APT-Analysis/
This lab emulates a targeted intrusion aligned with Mustang Panda’s TTPs — leveraging spear-phishing, DLL sideloading, and C2 over Dropbox to steal sensitive diplomatic data.
https://cham1ndux.github.io/posts/Mustand-Panda-APT-Analysis/
ChamX
Council of Tropical Affairs APT-Inspired Threat Hunting Walkthrough
The Threat Actor in focus is Mustang Panda a.k.a. Stately Taurus, a well-documented Chinese APT group known for cyber-espionage campaigns targeting governments, NGOs, and political entities across Southeast Asia. This lab emulates a targeted intrusion aligned…
Fuzzing Windows Defender with loadlibrary in 2025
https://scrapco.de/blog/fuzzing-windows-defender-with-loadlibrary-in-2025.html
https://scrapco.de/blog/fuzzing-windows-defender-with-loadlibrary-in-2025.html
scrapco.de
Lingua Diabolis | Fuzzing Windows Defender with loadlibrary in 2025
Improving AFD Socket Visibility for Windows Forensics & Troubleshooting
https://www.huntandhackett.com/blog/improving_afd_socket_visibility
https://www.huntandhackett.com/blog/improving_afd_socket_visibility
Huntandhackett
Improving AFD Socket Visibility for Windows Forensics & Troubleshooting
This blog post explains the basics of Ancillary Function Driver API and how it can help explore networking activity on Windows systems.
Eclipse on Next.js: Conditioned exploitation of an intended race-condition
https://zhero-web-sec.github.io/research-and-things/eclipse-on-nextjs-conditioned-exploitation-of-an-intended-race-condition
https://zhero-web-sec.github.io/research-and-things/eclipse-on-nextjs-conditioned-exploitation-of-an-intended-race-condition
zhero_web_security
Eclipse on Next.js: Conditioned exploitation of an intended race-condition
CVE-2025-32421
Frame by Frame, Kernel Streaming Keeps Giving Vulnerabilities
https://devco.re/blog/2025/05/17/frame-by-frame-kernel-streaming-keeps-giving-vulnerabilities-en/
https://devco.re/blog/2025/05/17/frame-by-frame-kernel-streaming-keeps-giving-vulnerabilities-en/
DEVCORE 戴夫寇爾
Frame by Frame, Kernel Streaming Keeps Giving Vulnerabilities | DEVCORE 戴夫寇爾
In-depth research into Windows Kernel Streaming vulnerabilities, revealing MDL misuse, buffer misalignment, and exploitation techniques used in CVE-2024-38238 and others.
IDA Python Script to Get All function names from Event Constructor (VCL) (IDA 9)
https://github.com/Coldzer0/IDA-For-Delphi
https://github.com/Coldzer0/IDA-For-Delphi
GitHub
GitHub - Coldzer0/IDA-For-Delphi: IDA Python Script to Get All function names from Event Constructor (VCL)
IDA Python Script to Get All function names from Event Constructor (VCL) - Coldzer0/IDA-For-Delphi
How I used o3 to find CVE-2025-37899, a remote zeroday vulnerability in the Linux kernel’s SMB implementation
https://sean.heelan.io/2025/05/22/how-i-used-o3-to-find-cve-2025-37899-a-remote-zeroday-vulnerability-in-the-linux-kernels-smb-implementation/
https://sean.heelan.io/2025/05/22/how-i-used-o3-to-find-cve-2025-37899-a-remote-zeroday-vulnerability-in-the-linux-kernels-smb-implementation/
Sean Heelan's Blog
How I used o3 to find CVE-2025-37899, a remote zeroday vulnerability in the Linux kernel’s SMB implementation
In this post I’ll show you how I found a zeroday vulnerability in the Linux kernel using OpenAI’s o3 model. I found the vulnerability with nothing more complicated than the o3 API ̵…
Пятничный опрос.
Вы пробовали наркотики? (кроме алкоголя, никотина, кофеина, марихуаны)
Вы пробовали наркотики? (кроме алкоголя, никотина, кофеина, марихуаны)
Final Results
21%
Да
79%
Нет
готовлю доклад для 2600 на тему использования AI для malware analysis/vuln research (в частности MCP серверов) 😀
Please open Telegram to view this post
VIEW IN TELEGRAM
Order of Six Angles
Пятничный опрос.
Вы пробовали наркотики? (кроме алкоголя, никотина, кофеина, марихуаны)
Вы пробовали наркотики? (кроме алкоголя, никотина, кофеина, марихуаны)
Я пробовал: кетамин, трамадол, амфетамин, MDMA, 2cb, бакласан, циклодол, диазепам, спайс
C2 Redirectors: Advanced Infrastructure for Modern Red Team Operations
https://xbz0n.sh/blog/c2-redirectors
https://xbz0n.sh/blog/c2-redirectors
xbz0n.sh
C2 Redirectors: Advanced Infrastructure for Modern Red Team Operations
Let's talk about Command and Control (C2) infrastructure. It's the backbone of any red team operation, letting you talk to your implants in target environmen...