sailay(valen)

4.3K posts

sailay(valen) banner
sailay(valen)

sailay(valen)

@404death

Just an idiot, a tiny presence in an infinite universe. S-1-5-7

Beigetreten Nisan 2013
693 Folgt4.6K Follower
Angehefteter Tweet
sailay(valen)
sailay(valen)@404death·
I just created the tool which can help to get NT AUTHORITY\SYSTEM from arbitrary directory creation bugs. github.com/binderlabs/Dir…
sailay(valen) tweet media
English
7
284
836
0
Jonas Vestberg
Jonas Vestberg@bugch3ck·
@404death Does that include arbitrary read of locked files? 🤔
English
1
0
2
597
sailay(valen)
sailay(valen)@404death·
just weaponized ... arb file read to nt system. xD
sailay(valen) tweet media
English
5
5
111
23.5K
sailay(valen) retweetet
Chaotic Eclipse
Chaotic Eclipse@ChaoticEclipse0·
In response to CVE-2026-33825 (BlueHammer patch), The RedSun, a new unpatched windows defender EoP vulnerability has been publicly disclosed and can be found here - deadeclipse666.blogspot.com/2026/04/public…
English
9
85
340
54.3K
sailay(valen) retweetet
Co11ateral
Co11ateral@co11ateral·
New Mimikatz Researchers took an old version of Mimikatz and taught it how to dump credentials from the latest operating systems! The research: @tanrikuluatahan/fixing-mimikatz-sekurlsa-logonpasswords-on-windows-11-24h2-25h2-253e82866197" target="_blank" rel="nofollow noopener">medium.com/@tanrikuluatah… The repo: github.com/tanrikuluataha… #redteam #pentesting
Co11ateral tweet media
English
6
180
830
134.9K
sailay(valen)
sailay(valen)@404death·
I’ll drop the PoC once it’s stable to use.
English
0
0
6
432
sailay(valen)
sailay(valen)@404death·
Having AI feels like a cheat code, since we used to struggle to learn new things and get things done on our own.
English
0
0
1
242
sailay(valen)
sailay(valen)@404death·
Imagine leaked Claude code getting forked into tons of versions… what if some of them got C2 payloads slipped in?
English
0
0
2
304
sailay(valen) retweetet
gengstah
gengstah@_gengstah·
Released WinDbg MCP — attach Claude (or any LLM) to a live Windows process and let it poke around. set breakpoints, read memory, walk the stack, load crash dumps. 55 tools over MCP. github.com/gengstah/windb…
English
3
86
266
13K
sailay(valen) retweetet
Zellic
Zellic@zellic_io·
For a deeper look into this zero-day vulnerability, including the full root-cause analysis, proof of concept, exploitation, and patch analysis, check out our newly published blog post: zellic.io/blog/pwning-v8…
English
0
59
213
11.5K
sailay(valen) retweetet
0xMarioNawfal
0xMarioNawfal@RoundtableSpace·
SOMEONE DROPPED A FULLY JAILBROKEN, OPEN-SOURCE, PRE-BUILT IOS 26 VIRTUAL MACHINE Repo: github.com/34306/vphone-a…
0xMarioNawfal tweet media
English
75
615
5.8K
465.7K
sailay(valen) retweetet
SpecterOps
SpecterOps@SpecterOps·
Stop asking LLMs to “find vulns.” Start using them to understand code. @Sw4mp_f0x walks through using Claude Code as a force multiplier in app assessments - faster analysis, fewer false positives, better outcomes. Check it out: ghst.ly/4rA3uJd
English
4
168
829
50.6K
sailay(valen) retweetet
PwnFuzz
PwnFuzz@pwnfuzz·
An automated N-day research pipeline at PwnFuzz. Ghidra + Ollama + n8n →Diffs Patch Tuesday binaries → LLM analyzes the output → Structured vuln reports, monthly AI-generated reports gets you oriented fast! Blog: ghostbyt3.github.io/blog/nday-rese… Repo: github.com/ghostbyt3/nday…
PwnFuzz tweet media
English
0
115
493
26.1K
sailay(valen) retweetet
Shieldify Security
Shieldify Security@ShieldifySec·
Fuzzing for Security Researchers 🤠 Starting with basic and fuzz testing in Foundry, then moving to stateful fuzzing with Echidna, Alex shows how stateless and stateful fuzzing can uncover bugs that traditional imperative tests often miss youtu.be/3A7aa5B8aak
YouTube video
YouTube
English
0
11
43
3.6K