Vulnerabilities in LUKS2 disk encryption for confidential VMs
#blog #cryptography #vulnerability #linux #exploit @reconcore
#blog #cryptography #vulnerability #linux #exploit @reconcore
The Trail of Bits Blog
Vulnerabilities in LUKS2 disk encryption for confidential VMs
Trail of Bits is disclosing vulnerabilities in confidential computing systems that use LUKS2 for disk encryption. These vulnerabilities allow attackers with access to storage disks to extract confidential data and modify contents.
CVE-2025-50168-pwn2own-berlin-2025
Vulnerability in Win32kbase! DirectComposition
#github #vulnerability @reconcore
Vulnerability in Win32kbase! DirectComposition
#github #vulnerability @reconcore
1 2
Attacking AWS
Current methods of attacking AWS:
#methods #aws #devsecops @reconcore
Current methods of attacking AWS:
• Insufficient Security Configuration
• Insecure Data storage
• Insecure Deployment and Configuration Management
• Backdoor Lambda Function Through Resource-Based Policy
• Overwrite Lambda Function Code
• Create an IAM Roles Anywhere trust anchor
• Exfiltrate RDS Snapshot by Sharing
• Backdoor an S3 Bucket via its Bucket Policy
• Exfiltrate an AMI by Sharing It
• Exfiltrate EBS Snapshot by Sharing It
• Execute Discovery Commands on an EC2 Instance
• Download EC2 Instance User Data
• Execute Commands on EC2 Instance via User Data
• Noncompliant Code
• Compliant Code
• Retrieve EC2 Password Data
• Noncompliant Code
• Compliant Code
• Insecure Deployment and Configuration Management
• Local Filesystem
• AWS Security Token
• AWS Security Token Permission enumeration
• ec2:CreateSnapshot and ec2:DescribeVolumes
• Amazon Cognito
• References
#methods #aws #devsecops @reconcore
1🔥2
Sleak-Crypter-FUD
#github #fud #obfuscation #malware @reconcore
Sleak Crypter is a simple obfuscate tool that allows you to encrypt and obfuscate your files.
#github #fud #obfuscation #malware @reconcore
Vert-Stealer
#github #stealer #rat #fud #obfuscate @reconcore
VERT-STEALER Token Stealer, Discord Token Grabber , Discord Injection , Password Stealer, Cookie Stealer, File Stealer, Crypto wallet Stealer etc.
#github #stealer #rat #fud #obfuscate @reconcore
N8N Remote Code Execution CVE-2025-62726 POC/Exploit
#github #vulnerability #rce #n8n #burpsuite #exploit #poc @reconcore
#github #vulnerability #rce #n8n #burpsuite #exploit #poc @reconcore
Openstack pentest
Articles:
Tool: openstack-security-tool
#pentest #tools @reconcore
Articles:
OpenStack from a penetration tester perspective
Part 1
Part 2
Part 3
Tool: openstack-security-tool
#pentest #tools @reconcore
Medium
OpenStack from a penetration tester perspective: Part 1
Hello everyone,
LibrePGP_CMS_Downgrade_Attacks.pdf
736.6 KB
Legacy Encryption Downgrade Attacks against LibrePGP and CMS 2024
Test tool for LibrePGP v5 AEAD-to-CFB downgrade attacks
#github #tools #cryptography @reconcore
Test tool for LibrePGP v5 AEAD-to-CFB downgrade attacks
This work describes vulnerabilities in the specification of AEAD modes and Key Wrap in two cryptographic message formats. Firstly, this applies to AEAD packets as introduced in the novel LibrePGP specification that is implemented by the widely used GnuPG application. Secondly, we describe vulnerabilities in the AES-based AEAD schemes as well as the Key Wrap Algorithm specified in the Cryptographic Message Syntax (CMS)
#github #tools #cryptography @reconcore
SSD Secure Disclosure
LPE via refcount imbalance in the af_unix of Ubuntu's Kernel - SSD Secure Disclosure
Affected Versions Vendor Response The vendor has released an updated kernel on the 18th of September Credit The vulnerability was disclosed during our TyphoonPWN 2025 Linux category and won first place. Vulnerability Details The vulnerability is caused by…
LPE via refcount imbalance in the af_unix of Ubuntu’s Kernel
#vulnerability #exploitation #lpe #linux #kernel @reconcore
#vulnerability #exploitation #lpe #linux #kernel @reconcore
1 1
SilentButDeadly
#github #tools #wfp #av #edr @reconcore
A network communication blocker specifically designed to neutralize EDR/AV software by preventing their cloud connectivity using Windows Filtering Platform (WFP). This version focuses solely on network isolation without process termination. Blog
#github #tools #wfp #av #edr @reconcore
🔥2😱1
DefenseDroid MH-1M: A 1.34 Million-Sample Comprehensive Multi-Feature Android Malware Dataset for ML, Deep Learning, LLMs, and Threat Intelligence Research
#github #research #android #malware @reconcore
Through DefenseDroid, we tend to gift a machine learning-based system for the detection of malware on android devices. DefenseDroid will effectively identify, detect, categorize apps and safeguard android mobile devices from malicious apps thus avoiding any stealing or misuse of the user’s data by using an easy user interface. In our project, a code behavior signature-based malware detection framework mistreatment associate degree LSTM rule is planned, which might sight malicious code and their variants effectively in runtime and extend malware characteristics information dynamically.
#github #research #android #malware @reconcore
GitHub
GitHub - DefenseDroid/DefenseDroid
Contribute to DefenseDroid/DefenseDroid development by creating an account on GitHub.
HexStrike AI MCP Agents
#github #offensivesecurity #tools #llm @reconcore
advanced MCP server that lets AI agents (Claude, GPT, Copilot, etc.) autonomously run 150+ cybersecurity tools for automated pentesting, vulnerability discovery, bug bounty automation, and security research. Seamlessly bridge LLMs with real-world offensive security capabilities. www.hexstrike.com/
#github #offensivesecurity #tools #llm @reconcore
GitHub
GitHub - 0x4m4/hexstrike-ai: HexStrike AI MCP Agents is an advanced MCP server that lets AI agents (Claude, GPT, Copilot, etc.)…
HexStrike AI MCP Agents is an advanced MCP server that lets AI agents (Claude, GPT, Copilot, etc.) autonomously run 150+ cybersecurity tools for automated pentesting, vulnerability discovery, bug b...
CVE-2025-12463 Unauthenticated SQL Injection in Guetebruck G-Cam Series Cameras
#blog #sql #injection @reconcore
#blog #sql #injection @reconcore
Blacklanternsecurity
CVE-2025-12463— 9.8 Unauthenticated SQL Injection in Guetebruck G-Cam Series Cameras
Smile, you’re on camera.
Machine_Learning_Systems.pdf
40.9 MB
Machine Learning Systems:
Principles and Practices of Engineering Artificially Intelligent Systems
School of Engineering and Applied Sciences Harvard University. Nov 2025
#aiops #secops #mlsecops #book #engineering @reconcore
Principles and Practices of Engineering Artificially Intelligent Systems
School of Engineering and Applied Sciences Harvard University. Nov 2025
This book bridges the gap between theoretical foundations and practical engineering, emphasizing the systems perspective required to build effective AI solutions. Unlike resources that focus primarily on algorithms and model architectures, this book highlights the broader context in which ML systems operate, including data engineering, model optimization, hardware-aware training, and inference acceleration
#aiops #secops #mlsecops #book #engineering @reconcore
2 2