Atredis Partners

625 posts

Atredis Partners banner
Atredis Partners

Atredis Partners

@Atredis

Atredis is a 100% worker-owned team of world-class security researchers and consultants. We do risk-centric, research-driven security testing and consulting.

All over North America Katılım Ağustos 2013
1.3K Takip Edilen2.9K Takipçiler
Atredis Partners
Atredis Partners@Atredis·
We decided to revisit an old research problem with some new LLM powered tooling. Check out our latest blog post to see how we approached this research, and the new Java deserialization gadget chains it discovered in just two days! buff.ly/CeAQZ2B
English
3
34
100
9.7K
Atredis Partners
Atredis Partners@Atredis·
On a recent engagement, we exploited a previously disclosed privilege escalation bug in Tenable's Nessus Agent. No public PoC was available, so we made one; check it out here buff.ly/IMMQWEo
English
0
5
21
3.5K
Atredis Partners
Atredis Partners@Atredis·
Atredis identified a vulnerability in the way Rapid7's Nexpose was generating passwords to protect its Java KeyStore which is used to encrypt saved credentials. This vulnerability was reported to Rapid7 and a patch is being rolled out today! Details here: buff.ly/U7qaplX
English
1
6
9
2.9K
Atredis Partners retweetledi
KF
KF@d0tslash·
Kate got a drawing robot. My gut was to look into hacking it, sure enough my friends at @Atredis already had. atredis.com/blog/2025/9/30…
English
0
1
6
1.1K
Atredis Partners
Atredis Partners@Atredis·
Last week, hardware. This week, firmware! Sam is back with a deep dive into his LiDAR Detector and demos a couple prototypes! buff.ly/b1QnKt2
Atredis Partners tweet media
English
0
3
7
1.1K
Atredis Partners
Atredis Partners@Atredis·
Check out our latest blog from Matt Burch (@emptynebuli) detailing new supplemental findings from his DefCon32 talk Where's the Money: Defeating ATM Disk Encryption: buff.ly/lBtjQe7
English
0
3
7
1.4K
Atredis Partners
Atredis Partners@Atredis·
ICYMI, @synacktiv's Pwn2Own walkthrough, exploiting a Tesla Wall via the charging port is a good Friday read. After a firmware downgrade, they found a debug shell via the access point used during setup, ultimately using this to gain EIP. buff.ly/fnlgviX
English
0
2
3
441
Atredis Partners
Atredis Partners@Atredis·
We recently identified a number of privilege escalation vulnerabilities in Lenovo Vantage on Windows; check out our latest blog for a technical deep dive buff.ly/eKMcZLg
English
1
16
41
3.9K
Atredis Partners
Atredis Partners@Atredis·
Where do the Ads in Trackmania come from? In-game ads and reverse engineering tips in this mini-post from Jordan buff.ly/nTITAwc
English
0
2
1
405