Octagon Networks

20 posts

Octagon Networks banner
Octagon Networks

Octagon Networks

@OctagonNetworks

We are a global company made up of hackers and security researchers working together to tackle advanced vulnerabilities & techniques using AI. Building @pwn_ai

New York, USA Katılım Haziran 2025
1 Takip Edilen118 Takipçiler
Octagon Networks
Octagon Networks@OctagonNetworks·
Octagon Networks tweet media
pwn.ai@pwn_ai

🎄🎁 Here is a 0day unauthenticated root RCE affecting over 70,000 devices on the internet. pwn.ai/blog/cve-2025-… For our first post, we show how pwnai autonomously found a root rce affecting XSpeeder, over 8 months ago. To our knowledge, this is the first agent-found, remotely exploitable 0day RCE published. Merry Christmas & Happy New Year 🎅💥

English
25
2
22
779
Octagon Networks retweetledi
pwn.ai
pwn.ai@pwn_ai·
🎄🎁 Here is a 0day unauthenticated root RCE affecting over 70,000 devices on the internet. pwn.ai/blog/cve-2025-… For our first post, we show how pwnai autonomously found a root rce affecting XSpeeder, over 8 months ago. To our knowledge, this is the first agent-found, remotely exploitable 0day RCE published. Merry Christmas & Happy New Year 🎅💥
English
14
49
276
52.7K
Octagon Networks retweetledi
pwn.ai
pwn.ai@pwn_ai·
Looks like nation-state actors are utilizing fully autonomous hacking engines. Wild to see them finally doing what we’ve already built, tested, and pushed way further at @pwn_ai. The future of hacking is autonomous!
Anthropic@AnthropicAI

We disrupted a highly sophisticated AI-led espionage campaign. The attack targeted large tech companies, financial institutions, chemical manufacturing companies, and government agencies. We assess with high confidence that the threat actor was a Chinese state-sponsored group.

English
2
2
14
1.9K
Octagon Networks retweetledi
pwn.ai
pwn.ai@pwn_ai·
What we are building is insane. If vendors patched quicker, we would've showed you already. The sort of vulnerabilities pwn.ai is finding is on par with the top security researchers. preauth RCE after preauth RCE fully autonomously. Will drop a blog post soon.
English
1
5
10
1.7K
Octagon Networks retweetledi
pwn.ai
pwn.ai@pwn_ai·
With little help with @pwndotai , which is an agentic hacking ecosystem we are building, we are able to get 1-click RCE in Cluely (@cluely). The exploit takes time to setup but it's straight forward and can be reached via many techniques, and an indirect prompt injection. The full technical report is sent to Cluely team and we expect them to address it in a timely manner. In the meantime go follow @Pwndotai for upcoming announcements and advisories using our agentic tools
pwn.ai tweet media
English
2
11
54
6.9K
Octagon Networks retweetledi
pwn.ai
pwn.ai@pwn_ai·
For the last year and a half we have been secretly working on multiple products that will shake and transform cyber security as we know it. From vulnerability detection, source code audit and penetration testing, to bug bounty and offensive security research. Stay tuned! 🤫
English
0
3
13
1K
Octagon Networks retweetledi
Isira Adithya
Isira Adithya@isira_adithya·
Here's a little tip to escalate Client Side Path Traversal (in <script src>) to XSS in wordpress sites; It is possible to use the /wp-json/?_jsonp=<payload> rest-api path to execute arbitrary js functions. Read more at octagon.net/blog/2022/05/2… Credits: @OctagonNetworks
Isira Adithya tweet media
Hussein Daher@HusseiN98D

Following the recent Client Side Path traversal Hype, here is an interesting vulnerability I found back in 2020 ;) Enjoy! 🔥

English
3
72
326
31.7K
Octagon Networks retweetledi
pwn.ai
pwn.ai@pwn_ai·
This CSP bypass technique utilizing SOME attack went under the radar but allowed for a novel way to defeat CSP with only A-z,. characters & windows. Another interesting fact of the specific issue is, WordPress remains vulnerable to this day and affects all WordPress sites (49% of the internet) The technique was nominated for Top Web Hacks for 2022 by @PortSwigger. You can read how it works on our blog: octagon.net/blog/2022/05/2…
Critical Thinking - Bug Bounty Podcast@ctbbpodcast

Crazy CSP Bypass here by @PaulosYibelo! Utilizes JSONP endpoints where you can ONLY use [a-z.]+ as the callback and crafts a valid exploit. Masterful. buff.ly/47xc4Q0

English
0
18
87
17.6K
Octagon Networks retweetledi
pwn.ai
pwn.ai@pwn_ai·
🔥✍️New post: CVE-2022-22241 preauth RCE and multiple high severity vulnerabilities affecting all Juniper networking devices including Juniper SSLVPN. octagon.net/blog/2022/10/2… #networking #hacking
English
1
66
179
0
Octagon Networks retweetledi
GreyNoise
GreyNoise@GreyNoiseIO·
Tag is out for CVE-2022-22241, a pre-authentication Phar deserialization vulnerability in Juniper JunOS, discovered by @PaulosYibelo and @OctagonNetworks. At this time, @GreyNoiseIO sensors have not observed exploitation in the wild. Track using Trends: viz.greynoise.io/tag/junos-os-p…
Paulos Yibelo@PaulosYibelo

CVE-2022-22241 is a recently patched preauth phar deserialization vulnerability leading to remote RCE in all #Juniper SSLVPN / JunOS devices. Write-up on this and a bunch of other bugs soon.

English
1
9
19
0
Octagon Networks retweetledi
Bitcoin Magazine
Bitcoin Magazine@BitcoinMagazine·
JUST IN: Octagon Networks becomes first cybersecurity company to convert entire balance sheet to #bitcoin 👏
English
157
415
2.7K
0
Octagon Networks retweetledi
pwn.ai
pwn.ai@pwn_ai·
Today, Octagon Networks becomes the first cybersecurity company to convert it's entire balance sheet into #Bitcoin. We will also start accepting payments in Bitcoin, and offering a discount to encourage the use of Bitcoin. Read More: octagon.net/press/2022/06/…
English
82
302
1.5K
0
Octagon Networks retweetledi
pwn.ai
pwn.ai@pwn_ai·
pwn.ai tweet media
ZXX
1
1
8
0
Octagon Networks
Octagon Networks@OctagonNetworks·
🚨 Octagon Networks has reproduced an unpatched SharePoint zero-day (CVE-2025-53770) now under active attack. Exploits leak MachineKey secrets, letting attackers hijack __VIEWSTATE for persistent code execution. If your SharePoint is exposed online, assume it’s compromised, take it offline and begin forensic analysis while awaiting a patch.
English
0
3
9
1.9K