Ralf Hacker Channel
28.2K subscribers
467 photos
17 videos
503 files
592 links
Download Telegram
Как круто развивается BloodHound... Теперь и сетевые ресурсы можно отображать

Blog: https://specterops.io/blog/2025/10/30/sharehound-an-opengraph-collector-for-network-shares/

Soft: https://github.com/p0dalirius/sharehound

#pentest #ad #bloodhound
🔥61👍14🤔3😢2
Forwarded from 1N73LL1G3NC3
Conquest

A feature-rich and malleable command & control/post-exploitation framework developed in Nim.

Blog: https://jakobfriedl.github.io/blog/nim-c2-traffic/
👍12🔥9🤔1
Определенно стоит почитать

https://www.synacktiv.com/en/publications/site-unseen-enumerating-and-attacking-active-directory-sites

Sites did not receive much attention by the Active Directory offensive research community, comparatively to other ACL-based attack vectors. This article aims to demonstrate that not only do attack vectors targeting Active Directory sites exist, but that they can lead to impactful privilege escalation scenarios and to domain(s) compromise.


#ad #pentest #redteam #bloodhound
👍24🔥17
Недавно у моего любимого инструмента bloodyAD появился новый модуль msldap.

https://github.com/CravateRouge/bloodyAD/wiki/User-Guide#msldap-commands

Кто юзает, обновляйтесь. А если не слышали о bloodyAD, советую попробовать)

#ad #pentest #redteam
👍25🔥15🤔5
Forwarded from 1N73LL1G3NC3
This media is not supported in your browser
VIEW IN TELEGRAM
Fortinet 0day

An auth bypass + path traversal in Fortinet FortiWeb to create new administrative users on exposed devices without requiring authentication.

Blog: https://www.rapid7.com/blog/post/etr-critical-vulnerability-in-fortinet-fortiweb-exploited-in-the-wild/

Dork:
ZoomEye Dork: app="FortiWeb"
HUNTER: product.name="FortiWeb"
🔥25😁17👍6🥰3😱3🤔2
Целая пачка ресерчей уязвимостей в разной блотвари:
* Asus DriverHub: 1-click RCE
* MSI Center: LPE
* Acer Control Centre: LPE, RCE
* Razer Synapse 4: LPE

И все в одном посте: https://sensepost.com/blog/2025/pwning-asus-driverhub-msi-center-acer-control-centre-and-razer-synapse-4/

#cve
1🔥14👍9🤔2
И автор статьи выше, опубликовал свой инструмент... В описании все сказано))

Pipetap helps you observe, intercept, and replay traffic over Windows Named Pipes.


https://github.com/sensepost/pipetap

#soft #git
1🔥31👍16🤔2😱2
Forwarded from Offensive Xwitter
📞 Microsoft fixed an authenticated RCE in Windows Telephony Service (CVE-2026-20931), discovered by researcher Sergey Bliznyuk.

Read the write-up:

🔗 https://swarm.ptsecurity.com/whos-on-the-line-exploiting-rce-in-windows-telephony-service/
🔗 https://habr.com/ru/companies/pt/articles/984934/
1🔥20😁12🤔1
Решил выходить с творчекого перерыва, и заметки снова сюда писать))

Утилита для SCCM CRED1 (PXE boot media)

https://github.com/leftp/SharpPXE

Питонов много есть, шарп пусть будет тоже, а там и BOF появится😁

#sccm #soft #git
👍20🔥8🤔4🎉3😁1