Claude Pirate: Abusing Anthropic's File API For Data Exfiltration
#injection #api #llm @reconcore
High-Level Attack Idea - AI Kill Chain + Demo
#injection #api #llm @reconcore
Embrace The Red
Claude Pirate: Abusing Anthropic's File API For Data Exfiltration
Claude's Code Interpreter recently got network access, and the default allow-list enables an interesting novel exploit chain that allows an adversary to exfiltrate large amounts of data by uploading files via the Anthropic API to their own account.
Next.js Server Actions Analyzer for Burp Suite
#analysis #burpsuite #tools #offensivesecurity @reconcore
Burp Suite ext. for analyzing Next.js Server Actions - server-side functions identified by hash IDs and "Next-Action" headers
#analysis #burpsuite #tools #offensivesecurity @reconcore
GitHub
GitHub - Adversis/NextjsServerActionAnalyzer: A Burp Suite extension for analyzing Next.js Server Actions - server-side functions…
A Burp Suite extension for analyzing Next.js Server Actions - server-side functions identified by hash IDs and `Next-Action` headers. - Adversis/NextjsServerActionAnalyzer
Critical RCE Vulnerability CVE-2025-11953 Puts React Native Developers at Risk
#vulnerability #blog #cve #rce #offensivesecurity @reconcore
RCE in react-native-community/cli allows arbitrary OS commands via unsanitized input and exposed development server, requiring updates and secure configurations to mitigate
#vulnerability #blog #cve #rce #offensivesecurity @reconcore
JFrog
Critical RCE Vulnerability CVE-2025-11953 Puts React Native Developers at Risk
Learn how the JFrog Security research team discovered and disclosed CVE-2025-11953 which poses a threat to developers using the popular React Native CLI.
SilentButDeadly - network communication blocker to neutralize EDR/AV software
#github #av #edr #tools #offensivesecurity @reconcore
SilentButDeadly neutralizes EDR/AV by blocking their network access via WFP without terminating processes, enabling network isolation and preventing updates or telemetry
#github #av #edr #tools #offensivesecurity @reconcore
GitHub
GitHub - loosehose/SilentButDeadly: SilentButDeadly is a network communication blocker specifically designed to neutralize EDR/AV…
SilentButDeadly is a network communication blocker specifically designed to neutralize EDR/AV software by preventing their cloud connectivity using Windows Filtering Platform (WFP). This version fo...
🔥1 1
A Chrome zero-day (CVE-2025-2783) was exploited to deliver spyware built by Memento Labs — the firm behind past government surveillance tools.
One click in Chromium = full sandbox escape.
#analysis #zeroday #offensivesecurity @reconcore
One click in Chromium = full sandbox escape.
#analysis #zeroday #offensivesecurity @reconcore
🤯2
Containerized Red Team Tools
#github #redteam #tools @reconcore
Containers are an effective way to configure, deploy, and use Red Team tools
#github #redteam #tools @reconcore
OPEN SOURCE MALWARE
#opensource #malware #cybersecurity @reconcore
A community database, API and collaboration platform to help identify and protect against open source malware
#opensource #malware #cybersecurity @reconcore
Fuzz Forge
#appsec #fuzz #fuzzing #llm #tools #offensivesecurity @reconcore
AI-powered workflow automation and AI Agents for AppSec, Fuzzing & Offensive Security Official site
#appsec #fuzz #fuzzing #llm #tools #offensivesecurity @reconcore
GhostBuilder
Features:
#github #payload #metasploit #tools @reconcore
GhostBuilder is a payload generator tool for creating Android, Windows, Linux, macOS, and iOS payloads using Metasploit. It can also inject payloads into existing APK files and sign them automatically
Features:
– Create payloads for Android, Windows, Linux, macOS, and iOS
– Inject payloads into real APKs
– Auto-install and check missing dependencies
– Sign and zipalign Android APKs
– Simple menu-based interface
#github #payload #metasploit #tools @reconcore
🔥1
HackTools – The all-in-one browser extension for offensive security professionals
#github #tools #reverse #shells #xss #payload @reconcore
is a web extension facilitating your web application penetration tests, it includes cheat sheets as well as all the tools used during a test such as XSS payloads, Reverse shells and much more Hacktools Offical site
#github #tools #reverse #shells #xss #payload @reconcore
❤🔥1🎄1
EtwLeakKernel
#github #kernel #poc @reconcore
This repository contains a PoC for a program that utilizes ETW to leak kernel memory addresses
#github #kernel #poc @reconcore
GitHub
GitHub - Idov31/EtwLeakKernel: Leaking kernel addresses from ETW consumers. Required Administrator privileges.
Leaking kernel addresses from ETW consumers. Required Administrator privileges. - Idov31/EtwLeakKernel
👍1
gopeed
#github #go #tools @reconcore
A modern download manager that supports all platforms. Built with Golang and Flutter.
#github #go #tools @reconcore
GitHub
GitHub - GopeedLab/gopeed: A modern download manager that supports all platforms. Built with Golang and Flutter.
A modern download manager that supports all platforms. Built with Golang and Flutter. - GopeedLab/gopeed
venom
Venom C2 is a dependency‑free Python3 Command & Control framework for redteam persistence
#github #redteam #c2 @reconcore
Venom C2 is a dependency‑free Python3 Command & Control framework for redteam persistence
A dependency‑free Python3 Command & Control framework for redteam persistence, built to run on systems without installing packages. It comprises a Flask team server, an Electron operator GUI, and a single‑file Python agent that communicates over HTTP/HTTPS using configurable AES‑encrypted JSON messages. Use it to execute commands, manage files, maintain access, and create SSH reverse tunnels from compromised systems.
#github #redteam #c2 @reconcore
😢1
CVE-2025-64095-DotNetNuke-DNN_PoC
proof of concept (PoC) For CVE-2025-64095 DotNetNuke (DNN)
#github #cve #poc @reconcore
proof of concept (PoC) For CVE-2025-64095 DotNetNuke (DNN)
#github #cve #poc @reconcore
GitHub
GitHub - NationalServices/CVE-2025-64095-DotNetNuke-DNN_PoC: proof of concept (PoC) For CVE-2025-64095 DotNetNuke (DNN)
proof of concept (PoC) For CVE-2025-64095 DotNetNuke (DNN) - GitHub - NationalServices/CVE-2025-64095-DotNetNuke-DNN_PoC: proof of concept (PoC) For CVE-2025-64095 DotNetNuke (DNN)
Bypassing The Cloudflare mTLS Protection
#bypass #infosec #cybersecurity #waf #bugbounty @reconcore
#Cloudflare has started blocking proxy tools like Burp Suite. If you encounter this error, download the Bypass Bot Detection extension from the BApp Store in Burp Suite. It should resolve the issue for Burp Suite.
#bypass #infosec #cybersecurity #waf #bugbounty @reconcore
👍1
Exodus Intelligence
Microsoft Windows Cloud Files Minifilter TOCTOU Privilege Escalation - Exodus Intelligence
By Michele Campa Overview In this blog post we take a look at a race condition we found in Microsoft Windows Cloud Minifilter (i.e. cldflt.sys ) in March 2024. This vulnerability was patched in October 2025 and assigned CVE-2025-55680 . The vulnerability…
Microsoft Windows Cloud Files Minifilter TOCTOU Privilege Escalation
OCTOBER 20, 2025
#blog #windows #kernel
#vulnerability #analysis #exploit #techniques #research @reconcore
OCTOBER 20, 2025
#blog #windows #kernel
#vulnerability #analysis #exploit #techniques #research @reconcore
❤1🔥1
PromptJacking: Critical RCEs in Claude Desktop That Turn Questions Into Exploits
#blog #appsec #vulnerability #rce #exploit @reconcore
RCE vulnerabilities in three extensions that were written, published, and promoted by Anthropic themselves - the Chrome, iMessage, and Apple Notes connectors
#blog #appsec #vulnerability #rce #exploit @reconcore
www.koi.ai
PromptJacking: The Critical RCEs in Claude Desktop That Turn Questions Into Exploits
Critical RCE flaws in Claude Desktop (“PromptJacking”) let attackers turn simple user questions into dangerous exploits, risking data security.
Code execution via prompt injection in GitHub Copilot Chat
#vulnerability #llm #injection #pe #poc @reconcore
Since v0.32.2, editing requires user approval
#vulnerability #llm #injection #pe #poc @reconcore