reconcore
1.93K subscribers
1.16K photos
164 videos
298 files
2.5K links
#pentest #vulnerability #research #malware #analysis #redteam #blueteam #tools #cve #rce #lpe

#offensivesecurity #methods #technique

The channel does not call for any action.
The posts are taken from public sources.
The @reconcore is not responsible.
Download Telegram
LOTP
Living Off the Pipeline
The idea of the LOTP project is to inventory how development tools (typically CLIs), commonly used in CI/CD pipelines, have lesser-known RCE-By-Design features ("foot guns"), or more generally, can be used to achieve arbitrary code execution by running on untrusted code changes or following a workflow injection.

#cli #njection #config #input #env #var #js #sh #py #groovy #kotlin #go @reconcore
Operation Artemis: Analysis of HWP-Based DLL Side Loading Attacks
#report #methods #apt #edr @reconcore
2
TaskHound
TaskHound hunts for Windows scheduled tasks that run with privileged accounts and stored credentials. It enumerates tasks over SMB, parses XMLs, and identifies high-value attack opportunities through BloodHound integration.

For backstory/lore and detailed explanations: see the associated Blog Posts - Part 1 and Part 2.

#windows #ad #bloodhound #schedtasks @reconcore
1
CVE-2025-12674: KiotViet Sync <= 1.8.5 - Unauthenticated Arbitrary File Upload
The KiotViet Sync plugin for WordPress (versions up to and including 1.8.5) is vulnerable to arbitrary file uploads, due to missing file type validation in the create_media() function.
This vulnerability allows unauthenticated attackers to upload arbitrary files to the server, which may lead to remote code execution.

#cve #wordpress #rce @reconcore
Media is too big
VIEW IN TELEGRAM
cheatengine-mcp-bridge
Connect Cursor, Copilot & Claude directly to Cheat Engine via MCP. Automate reverse engineering, pointer scanning, and memory analysis using natural language.

#engine #code #llm #python #debugging #automation #mcp #re #pentest #memory #analysis #ctf #tools @reconcore
Ashwesker-CVE-2026-21440: CVE-2026-21440 is a critical path traversal vulnerability affecting the AdonisJS framework, specifically its multipart file upload handling.
#vulnerability #cve @reconcore
WerDump
A Beacon Object File (BOF) for Havoc/CS to Bypass PPL and Dump Lsass

By default this BOF, writes WerFaultSecure.exe to the temp directory of the user's context with a random filename and saves the dump in the same directory as .dll. This is a POC Bof, It could be extended and modified the way you like and add many improvements like remote dump. All temporary files gets cleaned up after the dump.

#poc #bof #c2 #lsass @reconcore
CVE-2026-21858 + CVE-2025-68613 n8n Full Chain
n8n Ni8mare - Unauthenticated Arbitrary File Read to RCE Chain (CVSS 10.0)
www.cyera.com/research-labs/ni8mare-unauthenticated-remote-code-execution-in-n8n-cve-2026-21858

FOFA: app="n8n"
HUNTER: product.name="N8n"
ZoomEye: app="n8n"
#security #exploit #poc #rce #vulnerability #injection #sandbox #bypass #n8n @reconcore
Livewire Component Property Hydration Remote Code Execution (CVE-2025-54068)
Livewire is a full-stack framework for Laravel that makes building dynamic interfaces simple, without leaving the comfort of Laravel.
A critical remote code execution vulnerability (CVE-2025-54068) exists in Livewire versions before 3.6.4. The vulnerability is caused by improper control of code generation during component property update hydration. When a Livewire component processes user input from the snapshot, the framework fails to properly sanitize object types, allowing attackers to inject malicious payloads that get executed on the server. If an attacker knows the APP_KEY of the Laravel application, the exploitation becomes even more straightforward.

#vulnerability #cve #rce #exploit @reconcore
Intercept: How MITM attacks work in Ethernet, IPv4 & IPv6
A deep technical dive into how MITM attacks actually work in Ethernet, IPv4, and IPv6 networks from ARP and DHCP to IPv6 RA, DNS, and FHRP spoofing.

#blog #netsec #technique #protocol #mitm @reconcore
Inside 0Day Today: Infrastructure, Mirrors, and Exposure Patterns