reverse engineering
3.4K subscribers
73 photos
11 videos
25 files
122 links
◉ A channel for learning and discussing about reverse engineering

◉ We aren't accepting any illegal works, we are here to help, learn and gain new skills
◉ Owner @Mohamed_Abozaid1
◉ Egypt 🇪🇬

Please don't PM ask in discussion group except in necessity
Download Telegram
Prompt injection

Nowadays AI security is crucial, you see most of the websites now add a chat bot based on an AI model and jail breaking it can really leak sensitive data

@reverseengineer101
8
Orbstack is a docker alternative

OrbStack is the fast, light, and easy way to run Docker containers and Linux. Develop at lightspeed with our Docker Desktop alternative.

https://orbstack.dev/
@reverseengineer101
4👏3🔥2
Chatgpt 😑😐

Don't worry if it's down with you it's not your problem
6🤔2
If you have a target that relay on GraphQL always test if the introspection is enabled or not (it shall not be in production systems but sometimes it is) once you enumerate the schema you can go to something like Graphql voyager for better understanding and getting all the relations between the objects or you can read the schema by yourself if it's small, then try to observe the most sensitive fields like users chats or passwords or ... then try to get it then you will find that GraphQL is just returning that to you

The reason why I am writing this because I recently found a massive leakage (user ip addresses, feedback chats, ...)in some crypto wallet

#Cyber_tips
@reverseengineer101
5
Cloudflare is down again taking down the all sites that's relying on it

They were celebrating that they have stopped the biggest DDoS ever happened some days before, they should wait for some time before celebrating 😂😂😂
😁9👍2
Well, I am proud enough and happy to say I got my first ACE (Arbitrary Code Execution)

It started with only exposed debugging point then I was able to execute JS over a Sandbox then I managed to escape it and if you are asking how the answer is I found another vulnerability which is prototype pollution and I was able to invoke some native JS as well like the constructor (like react2shell constructor.constructor but mine is not the same vulnerability) this gave me the ability to explore some internals, I trying to leverage it more now maybe to get the full RCE (Remote Code Execution)

Finally what I want to say that wasn't an easy thing to do I passed more than three days just trying and failing and trying. Nothing comes easy as you think

@reverseengineer101
🔥11❤‍🔥65
Happy to share with that I have completed Try Hack Me -THM- advent of cyber security for 2025 and officially certified
17👍6🍾3🔥2👏2
Tiny XSS Payloads

In case of your target is vulnerable to xss but you have some limitations due to the WAF or filtering you can try them and you can costumize them as well

tinyxss.terjanq.me

Shared by @reverseengineer101
From intigriti on X (formally Twitter)
🔥21
Forwarded from Darksec
CVE-2026-21858 + CVE-2025-68613: n8n Ni8mare - Full Chain Exploit

Unauthenticated to Root RCE:
- LFI via Content-Type confusion
- Read /proc/self/environ to find HOME
- Steal encryption key + database
- Forge admin JWT token
- Expression injection sandbox bypass
- RCE as root

CVSS 10.0

https://github.com/Chocapikk/CVE-2026-21858
❤‍🔥5🔥4🥰1