lapinousexy

346 posts

lapinousexy banner
lapinousexy

lapinousexy

@lapinousexy

OSCP / OSEP / CRTO I / CRTO II / https://t.co/zcub9fMkg7

Beigetreten Ocak 2013
440 Folgt89 Follower
lapinousexy retweetet
watchTowr
watchTowr@watchtowrcyber·
The Internet is falling down, falling down, falling down Welcome back to another disaster - this time, an Auth Bypass in cPanel/WHM, tracked as CVE-2026-41940 Enjoy with us.. labs.watchtowr.com/the-internet-i…
English
11
176
608
133.4K
lapinousexy retweetet
mpgn
mpgn@mpgn_x64·
Looks like the npm package bitwarden cli was compromised, you can see version 2026.4.0 was not published from a trusted publisher (green checkmark) 😬 @bitwarden/cli/v/2026.4.0" target="_blank" rel="nofollow noopener">npmjs.com/package/@bitwa
mpgn tweet media
English
15
82
553
93.3K
lapinousexy retweetet
GoToolSharing
GoToolSharing@GoToolSharing·
Meet vbkview 🔥 A tool built to browse and extract data from unencrypted Veeam backups (.vbk). Built on vbktoolkit, a Golang reimplementation of the logic behind dissect.tools. github.com/GoToolSharing/… 1/3
English
1
3
7
1.3K
lapinousexy retweetet
watchTowr
watchTowr@watchtowrcyber·
🫡 We’re back. Today, we’re publishing vulnerabilities we discovered, disclosed, and chained to achieve pre-auth RCE against Progress ShareFile. Enjoy the journey with us, while you sob into your hands 🫠 labs.watchtowr.com/youre-not-supp…
English
3
57
208
37.7K
lapinousexy retweetet
Alex Neff
Alex Neff@al3x_n3ff·
A new module just got merged into NetExec: get-scriptpath📜 This module queries all users for the scriptpath attribute. If you have privileges over one of these scripts (or they e.g. try to mount a network share) you can compromise this user on their next login. Made by @0xwyndo
Alex Neff tweet media
English
1
42
184
11.2K
lapinousexy retweetet
Justin Elze
Justin Elze@HackingLZ·
👀 "[Security]: CRITICAL: Malicious litellm_init.pth in litellm 1.82.8 — credential stealer via PyPI supply chain #24512" github.com/BerriAI/litell…
English
3
4
24
2.6K
lapinousexy retweetet
Bad Sector Labs
Bad Sector Labs@badsectorlabs·
🏟️ Ludus launched 2 years ago and the community embraced and extended it with write-ups, roles, configs, and environments. We're excited to see what you build with Ludus 2! (1/4)
English
3
21
82
8.1K
lapinousexy retweetet
SkelSec
SkelSec@SkelSec·
New pypykatz version 0.6.13 is out on pip and github. Supporting latest windows versions, fixed some bugs and quite a few PRs merged. Thank you for the contributors! Also new bugs added, so keep the issues coming pls. github.com/skelsec/pypyka…
English
0
24
103
9.5K
vx-underground
vx-underground@vxunderground·
Giveaway. Thank you @mrd0x for sponsoring this. We've got FIVE @MalDevAcademy vouchers. These vouchers are bundles. This vouchers give you: - Full access to malware source code database - Full access to malware development course Comment below for a chance to win.
English
906
62
733
49.2K
lapinousexy retweetet
Exegol
Exegol@exegogol·
You run #NixOS because reproducibility and declarative configs matter. You don't install, you define. Exegol matches that: reproducible, deterministic offensive environments for testing, labs or teaching. Consistent results every time.
Exegol tweet media
English
0
1
2
198
lapinousexy retweetet
Defused
Defused@DefusedCyber·
⚠️We are noting elevated rates of Citrix fingerprinting against the path /epa/scripts/win/nsepa_setup.exe, which contains an installer used in enumerating Citrix version numbers / build dates
Defused tweet mediaDefused tweet media
Defused@DefusedCyber

Ransomware vulns with highest exploit likelihood ⬆️ (past 30d): - CVE-2024-40766 (SonicOS SSL-VPN..) +64.88% - CVE-2022-27510 (NetScaler ADC..) +21.33% - CVE-2022-27510 (Gateway..) +21.33% - CVE-2021-27877 (Veritas Veritas..) +15.37% - CVE-2021-27876 (Veritas Veritas..) +14.32%

English
2
10
43
5.7K
lapinousexy retweetet
Alex Neff
Alex Neff@al3x_n3ff·
Dump DPAPI credentials via WinRM with NetExec🔥 A lot of sensitive data is stored in Windows DPAPI, such as the login credentials used in scheduled tasks. Thanks to tiagomanunes this is now also possible via WinRM!
Alex Neff tweet media
English
3
59
254
11.5K
lapinousexy retweetet
eversinc33 🤍🔪⋆。˚ ⋆
As a follow up to my last post, here is part II of driver reverse engineering 101, this time about dynamic analysis. We unpack a VMProtected kernel driver and restore its IAT with some emulation. Enjoy:) eversinc33.com/posts/driver-r…
English
5
67
263
28.8K
lapinousexy retweetet
Alex Neff
Alex Neff@al3x_n3ff·
Dumping juicy secrets from SAM/LSA is always nice right? I've added an implementation for the --sam and --lsa flags to the MSSQL protocol of NetExec🚀 No need for manual registry hive extraction anymore!
Alex Neff tweet media
English
9
65
318
12.8K