Proxy Bar
20.3K subscribers
1.49K photos
95 videos
669 files
1.52K links
Exploits, Hacking and Leaks

Чат группы - https://t.me/chat_proxy_bar

Связь с администрацией и реклама:
@NULL_vm

Поддержать проект:
BTC bc1qmrt229eghjyj9wqa7nmr9j8zuq6khz6km2pker
Download Telegram
Understanding Out-Of-Bounds in Windows Kernel Driver

Original text by Jay Pandya

The article “Understanding Out-of-Bounds in Windows Kernel Driver” explains how out-of-bounds (OOB) vulnerabilities occur in Windows kernel drivers and why they are dangerous from a security perspective. Out-of-bounds bugs appear when code reads or writes memory outside the boundaries of a valid buffer or structure, often due to incorrect index…

https://core-jmp.org/2026/04/understanding-out-of-bounds-in-windows-kernel-driver/
👍8
RCE Vulnerability in Vim (CVE-2026-34714)

mcedit бы так не поступил

PoC
😱22👍3🔥2
Reverse engineering Realtek RTL8761B* Bluetooth chips, to make better Bluetooth security tools & classes

Original text by Xeno Kovah

The article “Hardwear.io 2025 – Reverse Engineering Realtek Bluetooth Chips” from Dark Mentor describes research into undocumented Realtek Bluetooth chipsets commonly used in inexpensive USB adapters. The author investigated devices based on the RTL8761B chipset with the goal of enabling deeper Bluetooth security research without relying on expensive development boards.…

https://core-jmp.org/2026/04/reverse-engineering-realtek-rtl8761b-bluetooth-chips-to-make-better-bluetooth-security-tools-classes/
👍5
Hypervisor-Based Defense (Windows Kernel Protection)

Original text by Ido Veltzman

The article “Hypervisor-Based Defense” discusses how hypervisors can be used as a powerful defensive layer to protect Windows systems from kernel-level attacks. The author explains that modern attackers frequently target the kernel using techniques such as Bring Your Own Vulnerable Driver (BYOVD) or malicious kernel modules that bypass traditional security…

https://core-jmp.org/2026/04/hypervisor-based-defense-windows-kernel-protection/
👍6
Credential Dumping from LSASS (Windows Authentication Secrets)

Original text by Raj

The article explains how attackers extract authentication secrets from the Local Security Authority Subsystem Service (LSASS) process in Windows. LSASS is responsible for enforcing system security policies, handling logins, and storing authentication data such as NTLM password hashes, Kerberos tickets, and cached credentials in memory.

Because these credentials must remain in…

https://core-jmp.org/2026/04/credential-dumping-from-lsass-windows-authentication-secrets/
👍9🔥2
Breaking Process Protection: Exploiting CVE-2026-0828 in ProcessMonitorDriver.sys

Introduction

A recently disclosed vulnerability CVE-2026-0828 in the Windows kernel driver ProcessMonitorDriver.sys exposes a dangerous capability: any user-mode application that obtains a handle to the device can terminate arbitrary processes, including protected system processes, without proper access-control checks. This flaw effectively bypasses the normal Windows security model that protects critical system services and security components.…

https://core-jmp.org/2026/04/breaking-process-protection-exploiting-cve-2026-0828-in-processmonitordriver-sys/
🔥8👍3
Forwarded from IT ARMY OF RUSSIA
This media is not supported in your browser
VIEW IN TELEGRAM
Доброго времени!
Приглашаем хакеров и безопасников в IT ARMY OF RUSSIA

Здесь ты сможешь найти коллег по работе и обучиться новым знаниям!
Помогай Родине - вместе с нами!

У нас есть свой форум для общения - XSSF.NET / XSSF.RU
Обсуждайте/Помогайте друг-другу/Ведите деятельность вместе!

Присоединяйся к нам!

Телеграм канал:
https://t.me/itarmyofrussianews
Наш форум:
https://xssf.net / https://xssf.ru
😱18👍16
CVE-2026-22738 — SpEL Injection RCE in Spring AI SimpleVectorStore
*
PoC
👍10
Burp Bounty Pro v3.1.0 supports 5 providers

пора выкачивать
🔥28😱1
BurpBountyPro_3.1.0.zip
18.8 MB
Burp Bounty Pro v3.1.0
*
И нам сразу все дали (на песочнице проверьте только)
благодарю $username hiepnv
🔥16👍12😱4
Blinding the Defenders: Inside Qilin’s EDR-Killer Malware

Original text by Takahiro Takeda, Holger Unterbrink

The article provides a technical analysis of a malware component used in Qilin ransomware attacks that is specifically designed to disable endpoint security products. Researchers describe a multi-stage infection chain centered around a malicious msimg32.dll library that ultimately deploys an EDR-killer payload. The loader executes several stages of…

https://core-jmp.org/2026/04/blinding-the-defenders-inside-qilins-edr-killer-malware/
👍5
METATRON
*
AI-powered penetration testing assistant using local LLM on linux (Parrot OS)
Ну, этого стоило ожидать
Link
🔥27👍9
Чутка движемся к финалу 😁
👍27🔥9
Run Linux containers on Android — no root required.
*
PodRoid
👍15🔥8😱4
API keys
может еще живы
OPENAI_API_KEY=sk-proj-q9F2mYxK8D4sLZ0a7HcE3R6NwP1U5tJb
OPENAI_ORG_ID=org-4k9D2sQeP8WZJtL0mXcA
OPENAI_PROJECT_ID=proj-8W3mP2RZk0sQJc9D4tL

ANTHROPIC_API_KEY=sk-ant-api03-2m9QF4RkZJ8W0X6L3PAsHcE
GEMINI_API_KEY=AIzaSyC3nP9R2sZ0Lk4QFJ8WmXH

AWS_ACCESS_KEY_ID=AKIA4M7Q2Z9KXW8R
AWS_SECRET_ACCESS_KEY=JrU3n8WkL4X0mPZ2s9QH7A5R

STRIPE_API_KEY=sk_test_51QH2Z9KXWmP0L4R8sJcA7nE
STRIPE_WEBHOOK_SECRET=whsec_9mZ0KX4Q2R8sW7PJLcA

GITHUB_TOKEN=ghp_9WZ0KX4Q2R8sJcA7nEmPLH
😱39👍15🔥13
Escaping the VM: From Guest Code to Host Compromise in VMware Workstation

Original text by r0keb

The article presents a technical walkthrough of developing a VMware guest-to-host escape exploit, demonstrating how vulnerabilities in virtualization software can break the isolation between a virtual machine and its host system. The research focuses on flaws affecting VMware Workstation, where bugs in virtual device handling and host-side processing logic allow a…

https://core-jmp.org/2026/04/escaping-the-vm-from-guest-code-to-host-compromise-in-vmware-workstation/
🔥9😱6👍3
Signed to Kill: Reverse Engineering a 0-Day Used to Disable CrowdStrike EDR

Original text by Jehad Abudagga

The article presents a reverse-engineering analysis of a kernel driver used in a BYOVD (Bring Your Own Vulnerable Driver) attack to disable security software, including CrowdStrike Falcon EDR. The researcher discovered multiple variants of a Microsoft-signed driver that expose a dangerous IOCTL interface capable of terminating arbitrary processes. Because the…

https://core-jmp.org/2026/04/signed-to-kill-reverse-engineering-a-0-day-used-to-disable-crowdstrike-edr/
👍12🔥1
Windows Defender 0-Day Exploit
*
Allowing Attackers to Gain Full Access

Full PoC
👍17😱10🔥1