REED
16.4K posts

REED retweetledi

This is 100% illegal.
A Chinese developer open-sourced a system that turns any Android phone into a wireless CarPlay device.
You just flash it onto a phone, plug it into your car, and your car's head unit thinks it's talking to an iPhone over CarPlay. except the phone is running Android.
→ Connects in 4-10 seconds
→ 60fps video at 25mb bitrate
→ Lossless PCM audio (48kHz 16-bit stereo)
→ 1:1 resolution match with your car display
100% Open Source.

English
REED retweetledi

REED retweetledi

mito753/kernel-exploit-dojo: CTF kernel exploitation notes, PoCs, exploits, and writeups. github.com/mito753/Kernel…
Français
REED retweetledi

🧠 Advanced reconnaissance framework for bug hunters, red teamers, and security researchers.
TugaRecon goes beyond traditional subdomain enumeration by transforming discovered assets into architectural intelligence.
Core capabilities:
• Passive & active subdomain enumeration
• High-performance brute-force reconnaissance
• DNS resolution with fallback resolvers
• Semantic infrastructure analysis
• Architectural impact scoring (0–100)
• Asset prioritization by security relevance
• Temporal intelligence & asset memory
• Automated reactions to infrastructure changes
• ASN and network mapping support
TugaRecon can infer:
• IAM & authentication layers
• Secrets management systems
• Databases & data planes
• Kubernetes & orchestration infrastructure
• CI/CD environments
• Monitoring stacks
• ICS / SCADA systems
Outputs:
TXT • JSON • CSV • PNG • SVG • Markdown • PDF
Built for modern reconnaissance workflows where understanding infrastructure matters more than collecting random subdomains.
🔗 github.com/skynet0x01/tug…
#CyberSecurity #BugBounty #Recon #OSINT #RedTeam #ThreatIntel
English
REED retweetledi
REED retweetledi

Abusing Printers to Compromise Active Directory
In many organizations, sysadmins are only focused on servers and workstations. But printers sit on the same network. They are rarely monitored with the same level of attention as more "important" systems.
Many of those printers store AD user credentials which can be extracted in plaintext to attack the DC. Even if the AD is well secured, these creds can be used to poison shares with LNK files. Even print jobs themselves can become a target especially when they contain confidential information.
Unfortunaly, many of the IoT devices in the corporate environments are outdated and aren't taken seriously. We also mentioned how you can fix that.
hackers-arise.com/iot-hacking-ab…
@three_cube @_aircorridor
#iot #pentesting

English
REED retweetledi
REED retweetledi
REED retweetledi

REED retweetledi

REED retweetledi

🤖 AI-powered penetration testing agent for autonomous offensive security workflows.
Pentest Copilot can:
• Run commands directly on a Kali attack box
• Analyze outputs and iterate automatically
• Use Burp Suite tools natively
• Automate browsers for web testing
• Spawn parallel subagents for recon/tasks
• Manage VPN connections
• Install tools on demand
• Perform multi-step exploitation workflows
Includes:
• 16 built-in agent tools
• 100+ pentesting capabilities
• Burp Repeater / Intruder / Collaborator integration
• Browser automation with Magnitude
• Support for OpenAI, Claude, Gemini, Mistral & OpenAI-compatible APIs
Built for:
• Real-world engagements
• Boot2Root labs
• CTF environments
• Autonomous recon and exploitation research
🔗 github.com/bugbasesecurit…
#CyberSecurity #Pentesting #AI #RedTeam #BugBounty #OpenSource
English
REED retweetledi

🦖 Autonomous offensive & defensive security research framework built on Claude Code.
RAPTOR combines:
• Static analysis
• Binary analysis
• LLM-powered vuln validation
• Exploit generation
• Patch generation
• Fuzzing workflows
• OSS forensics
• Multi-model analysis pipelines
Supports:
Semgrep • CodeQL • Z3 SMT solving • AFL++ • Ollama • Claude • GPT • Gemini
Built for autonomous security research against source code and binaries.
🔗 github.com/gadievron/rapt…
#CyberSecurity #AppSec #CodeQL #Fuzzing #LLM #OpenSource

English











