Rado RC1

1.2K posts

Rado RC1 banner
Rado RC1

Rado RC1

@RabbitPro

Exploitation, hardware, embedded, reverse engineering, automotive security. Pwn2Own Master of Pwn Flashback team (@FlashbackPwn).

انضم Kasım 2011
665 يتبع5K المتابعون
Rado RC1 أُعيد تغريده
Kuba Gretzky
Kuba Gretzky@mrgretzky·
Open source is dying a slow, painful death. For the time being, the AI-related issues in the open-source space have been largely attributed to the flood of AI-slop-generated code contributions, which human project maintainers were unable to process because the effort required to validate each contribution far exceeded the quality of those contributions. Now Cloudflare, by slop-forking Next.js, has just validated that it's okay to take an open-source project, shove it into an LLM, and have it vibe-code a completely new product based on the source code the engine was fed. The question arises: if AI regenerates the source code of an open-source project entirely, does the original open-source license still apply? We're approaching the Slop Ages, where protecting your IP from AI heists becomes virtually impossible. We've seen it in the music industry, and the time has come for the software industry. I am a software developer myself, and Evilginx has been open-sourced for over 8 years. That's why this news story rubs me the wrong way on a personal level. Evilginx is an offensive security tool - a phishing framework focused on bypassing MFA. Due to its dual-use nature, it can be used either by the good guys to demonstrate the weaknesses of the company's MFA implementation or by the bad guys for malicious purposes, mainly to harm others. I had countless second thoughts since the release of the open-source version, whether it was a good idea to put it out there, and later update it with new features, knowing that on one hand it will popularise the problems around weak MFA, and on the other hand give the bad guys a jump-start to expand their criminal enterprise. It was no surprise to me to learn later that APT groups like Scattered Spider or Void Blizzard reportedly created their own phishing toolkits, based on publicly exposed Evilginx source code. The main reason I launched Evilginx Pro as a closed-source, paid product last year was a combination of wanting to aid the good guys while gatekeeping the tool from the bad guys (and, of course, building a business out of it). It has always been important to me to make the community version of the tool accessible to everyone. Still, I was not a fan of the collateral; this decision also carried. Getting back to my original point. We now live in a world where a threat actor can feed the GitHub source code of any offensive security tool into an AI and prompt it to create something completely different from scratch, with more features and easier to use. Security issues arising from vibe-coding become a secondary concern in this scenario and can be largely disregarded. Over the last 2 years, I've been making significant improvements to the Evilginx proxy engine. The majority of these changes have now been implemented in Evilginx Pro. One of the upcoming major updates is the introduction of the new Phishlets 2.0 format. The plan is to release Phishlets 2.0, together with the proxy engine improvements, as part of the major update to the Evilginx community edition and make it accessible to everyone. As you may've guessed by now, my main concern is whether to release it as open-source or closed-source. Going the open-source route, I risk threat actors spending a few hundred bucks on a Claude subscription to create their own derivatives of Evilginx, which they can later rebrand and sell on the dark web. The closed-source route allows me to still release the tool to the public, with proper guardrails to prevent misuse, while keeping it accessible to people who want to use Evilginx to learn hands-on how MFA is bypassed in phishing engagements. I don't feel that open source is the proper delivery method for offensive security tooling anymore. The AI has completely reshaped the open-source ecosystem. Writing code is no longer dark magic; it is more accessible than ever, but it has also introduced the cancer we will have to learn to live with. I use AI to generate small helper libraries, while the rest of the Evilginx code is written by hand. Not because I reject the new AI-oriented reality we live in, but because I really enjoy programming. My love of programming brought me to this point in life. I also enjoy the concept of ownership. By releasing your work into the world, you let everyone know that you made it, that you personally vouch for its quality, and that you own any mistakes you make. This is what builds trust and reputation. With AI-generated software, there is neither. - Kuba P.S. I refrained from using an LLM to correct this post to avoid adding to the irony of the matter.
Kuba Gretzky tweet media
English
9
22
103
14.5K
Rado RC1
Rado RC1@RabbitPro·
@iamAlexGalvan We’re planning something special for this year! I’m sure you will like it. Watch this space or subscribe to our mailing list so you won’t miss it. 😎
English
0
0
1
61
Alex Galván
Alex Galván@iamAlexGalvan·
@RabbitPro Was waiting for you end of the year online training last year but I think it never happened. 😭 Are you planning something online this year?
English
1
0
2
177
Rado RC1
Rado RC1@RabbitPro·
We can’t promise you will be able to jailbreak a F-35 but maybe at least you can find the 0day! Last places to our flagship Hunting Zero-Days in Embedded Devices training! Unlock your potential. offensivecon.org/trainings/2026…
Tom's Hardware@tomshardware

Dutch Secretary of Defense threatens to 'jailbreak' nation's F-35 jet fighters — says it's just like jailbreaking an iPhone, in response to questions over software independence tomshardware.com/tech-industry/…

English
1
5
30
5.3K
Rado RC1
Rado RC1@RabbitPro·
@nmatt0 xchg x0,x0 It’s yours now!
English
0
0
0
178
Rado RC1
Rado RC1@RabbitPro·
@FuzzySec Oh wow! Keeping my fingers crossed for your new quests!
English
0
0
1
173
b33f | 🇺🇦✊
b33f | 🇺🇦✊@FuzzySec·
After 6+ years at IBM it’s time for me to say goodbye! When I joined Adversary Services the team was small, over my tenure it x²’d in size. It’s been an interesting ride, many shells in many places, cool tradecraft and some of the best operators in the business. Now the time has come to take on a new, exciting, challenge! But first, I’m taking an unstructured detour, catching up on some side-quests and touching grass in the real world ✌️
GIF
English
19
5
175
8.5K
Rado RC1
Rado RC1@RabbitPro·
We are returning with our training to Offensivecon 2026. This time tickets can also be purchased with a conference access bundle. Don’t wait. This will most likely be our only training for 2026.
offensivecon@offensive_con

🚨 In 2026, Pedro Ribeiro (@pedrib1337) and Radek Domanski (@RabbitPro) return to OffensiveCon with a training on "Hunting Zero-Days in Embedded Devices". ☝️Learn to identify and exploit vulnerabilities in embedded devices like routers, cameras, and microcontrollers through hands-on training in debugging, firmware extraction, and exploitation techniques for ARM and MIPS architecture. This training equips you with skills to uncover zero-day vulnerabilities through in-depth study and practical exercises on various vulnerabilities across different CPU architectures. Whether you're interested in hacking embedded devices or enhancing security testing, this training bridges hardware hacking and exploitation, preparing you for expertise in security, reverse engineering, or vulnerability research. Find more details here🔗buff.ly/VU2Ynjt 🚀 Don't miss this chance to improve your skills—sign up now!

English
0
1
9
1.6K
Rado RC1 أُعيد تغريده
offensivecon
offensivecon@offensive_con·
🚨 Save the Date for #offensivecon26 Mark your calendars, spread the word, and stay tuned for when registrations open! 📍 Hilton Berlin 🧠 Trainings: 11–14 May 2026 🎤 Conference: 15–16 May 2026 Visit 🔗offensivecon.org for more details.
offensivecon tweet media
English
0
28
87
10.4K
Rado RC1
Rado RC1@RabbitPro·
Inspired by tweet from our new YouTube subscriber I looked at our statistics. We have passed 2 million views and have over 65k subs. It’s impressive for me considering we only have 10 videos on our channel. My personal favourite is the DNS exploitation series. And yours?
Rado RC1 tweet media
English
6
7
63
6.3K
Faith 🇧🇩🇦🇺
Faith 🇧🇩🇦🇺@farazsth98·
Been binge watching @pedrib1337's videos on Youtube. Some really good content on VR / exploit dev right here: @FlashbackTeam/videos" target="_blank" rel="nofollow noopener">youtube.com/@FlashbackTeam… Can't believe I didn't know about these, they're already a few years old by now but very entertaining 😄
English
1
7
49
9.9K
Rado RC1 أُعيد تغريده
Pedro Ribeiro
Pedro Ribeiro@pedrib1337·
Our flagship Hunting Zero-Days in Embedded Devices training returns to Rome, September 23-26! In 4 intensive days, you'll learn to inspect devices, find hidden debug interfaces, extract firmware, analyze it, find a remote vulnerability, and exploit it! romhack.io/training/2025/… See you in Rome @cybersaiyanIT
English
1
11
45
6.5K
Rado RC1
Rado RC1@RabbitPro·
So many good memories! 🪳
Rado RC1 tweet media
English
1
0
40
1.9K
Rado RC1 أُعيد تغريده
Jimmy
Jimmy@0x4a47·
Hey @offensive_con, Trenchant has a challenge for you, be the first to solve during the conference and you get a pretty epic prize - come find one of us if you solve it !!
Jimmy tweet media
English
0
4
18
4.6K
acez
acez@amatcama·
Today marks the end of my time at @vigilant_labs. Grateful for the lessons learned, experiences gained and all the friends I made along the way. Looking forward to the new beginnings ahead!
English
15
1
126
10.8K