reconcore
1.82K subscribers
1.08K photos
159 videos
296 files
2.4K links
#pentest #vulnerability #research #malware #analysis #redteam #blueteam #tools #cve #rce #lpe

#offensivesecurity #methods #technique

The channel does not call for any action.
The posts are taken from public sources.
The @reconcore is not responsible.
Download Telegram
Bypassing CDN WAFs With Alternate Domain Routing

I will provide a summary, and please read the full blog post to learn the concept. This technique is inspired by the idea in this tweet.

How this attack works?
Imagine that the #CDN acts as a trusted proxy between you and the target web server (the "origin"). In this setup the origin server trusts requests coming from the CDN’s IP range, so it only accepts traffic that appears to come from the CDN. If you (the attacker) want to talk to the origin, you must route your request through the CDN. The CDN receives your request, filters and checks it (to ensure it isn’t flagged as malicious), then forwards it to the origin server.

Now imagine a scenario where you’ve found the origin’s IP, but direct communication won’t work, because the origin expects only requests coming from the CDN’s IP range. However, if you register an account with the same CDN provider, turn off the WAF in your account, and point your CDN configuration at that origin IP, then you can send requests via the CDN to the origin (WAF IS OFF!). Since the origin sees that the request appears to come from the CDN, it will accept it!


Tools for deploying the infrastructure and scanning for affected origins:

cdn-proxy & cdn-scanner: Github

#infosec #cybersecurity #bypass #tools #bugbounty #waf @reconcore
11
CVE-2025-50168: Windows 11 LPE Exploit
Windows win32kbase Type Confusion Local Privilege Escalation Vulnerability (CVSS 8.8). Pwn2Own Berlin 2025 winning bug. Blog

#cve #lpe #exploit @reconcore
🔥1
A Chrome zero-day (CVE-2025-2783) was exploited to deliver spyware built by Memento Labs — the firm behind past government surveillance tools.

One click in Chromium = full sandbox escape.
#analysis #zeroday #offensivesecurity @reconcore
🤯2
Containerized Red Team Tools
Containers are an effective way to configure, deploy, and use Red Team tools

#github #redteam #tools @reconcore
OPEN SOURCE MALWARE
A community database, API and collaboration platform to help identify and protect against open source malware

#opensource #malware #cybersecurity @reconcore
Fuzz Forge
AI-powered workflow automation and AI Agents for AppSec, Fuzzing & Offensive Security Official site

#appsec #fuzz #fuzzing #llm #tools #offensivesecurity @reconcore
GhostBuilder
GhostBuilder is a payload generator tool for creating Android, Windows, Linux, macOS, and iOS payloads using Metasploit. It can also inject payloads into existing APK files and sign them automatically


Features:
– Create payloads for Android, Windows, Linux, macOS, and iOS
– Inject payloads into real APKs
– Auto-install and check missing dependencies
– Sign and zipalign Android APKs
– Simple menu-based interface

#github #payload #metasploit #tools @reconcore
🔥1
HackTools – The all-in-one browser extension for offensive security professionals
is a web extension facilitating your web application penetration tests, it includes cheat sheets as well as all the tools used during a test such as XSS payloads, Reverse shells and much more Hacktools Offical site

#github #tools #reverse #shells #xss #payload @reconcore
❤‍🔥1🎄1
venom
Venom C2 is a dependency‑free Python3 Command & Control framework for redteam persistence
A dependency‑free Python3 Command & Control framework for redteam persistence, built to run on systems without installing packages. It comprises a Flask team server, an Electron operator GUI, and a single‑file Python agent that communicates over HTTP/HTTPS using configurable AES‑encrypted JSON messages. Use it to execute commands, manage files, maintain access, and create SSH reverse tunnels from compromised systems.

#github #redteam #c2 @reconcore
😢1
Bypassing The Cloudflare mTLS Protection
#Cloudflare has started blocking proxy tools like Burp Suite. If you encounter this error, download the Bypass Bot Detection extension from the BApp Store in Burp Suite. It should resolve the issue for Burp Suite.

#bypass #infosec #cybersecurity #waf #bugbounty @reconcore
👍1