eleven red pandas

45.5K posts

eleven red pandas banner
eleven red pandas

eleven red pandas

@bytecodevm

Hey @bytecodevm (eleven red pandas 🐼🐼🐼🐼🐼🐼🐼🐼🐼🐼🐼), got any spicy bytecode / VM / language implementation / JIT / music

Bagnes, Switzerland Katılım Kasım 2010
826 Takip Edilen1.8K Takipçiler
eleven red pandas
eleven red pandas@bytecodevm·
A practical look at DLL sideloading and proxying: how attackers abuse trusted Windows executables to load malicious DLLs while keeping the app running normally. core-jmp.org/2026/05/dll-si…
eleven red pandas tweet media
English
0
0
2
88
eleven red pandas retweetledi
Modat
Modat@modat_magnify·
CVE-2026-44578  ⚠️ Next.js – WebSocket Upgrade SSRF (CVSS 8.6)  A server-side request forgery vulnerability in Next.js allows unauthenticated attackers to force self-hosted instances to make internal HTTP requests via the WebSocket upgrade handler.  By sending a crafted absolute-form HTTP request with Upgrade: websocket headers, attackers can access internal services, cloud metadata endpoints, admin panels, and internal APIs reachable from the Next.js server on port 80. Successful exploitation may expose cloud credentials, API keys, secrets, and configuration data.  Affected: Next.js 13.4.13+, 14.x, 15.x <15.5.16, 16.0.0–16.2.4  Mitigation: Upgrade immediately to 15.5.16 or 16.2.5.   Modat Magnify Query:  technology="Next.js"  The platform:  magnify.modat.io  #threatintel #vulnerability #CVE202644578 #Nextjs #SSRF #WebSocket #CloudSecurity #infosec #Critical #ModatMagnify
Modat tweet media
English
70
404
2.3K
1.4M
eleven red pandas retweetledi
Smukx.E
Smukx.E@5mukx·
DLL Sideloading & Proxying for Advance Red Team Engagements TL;DR: This blog will introduce DLL Sideloading and Proxying for advance red team engagements for starters. Blog:- zerotracelab.com/blog/dll-sidel… #redteam #windows
Smukx.E tweet mediaSmukx.E tweet media
English
2
51
277
9K
eleven red pandas retweetledi
International Cyber Digest
International Cyber Digest@IntCyberDigest·
🚨 Google Project Zero just published a Pixel 10 zero-click to root exploit chain. Two vulnerabilities and less than a day of work to weaponize the second one. Chain: - Stage 1: same Dolby UDC zero-click (CVE-2025-54957) used against the Pixel 9. Patched in January 2026. Only minor offset updates and a tweak around RET PAC needed to port to Pixel 10 - Stage 2: a brand new local privilege escalation in the VPU driver for the Chips&Media Wave677DV on the Tensor G5 Result: arbitrary kernel read/write in 5 lines of code. Full exploit written in under a day.
International Cyber Digest tweet mediaInternational Cyber Digest tweet media
English
11
85
811
60.3K
eleven red pandas retweetledi
Dark Web Informer
Dark Web Informer@DarkWebInformer·
‼️ CVE-2026-42945: RCE Proof of concept for CVE-2026-42945, a critical heap buffer overflow in NGINX's ngx_http_rewrite_module introduced in 2008 GitHub: github.com/depthfirstdisc…
Dark Web Informer tweet media
English
2
64
312
34.3K
eleven red pandas retweetledi
Smukx.E
Smukx.E@5mukx·
Automating MS-RPC vulnerability research TL;DR: Diving into the MS-RPC protocol and how to automate vulnerability research using a fuzzing approach. Blog:~ incendium.rocks/posts/Automati… #Fuzzing
Smukx.E tweet mediaSmukx.E tweet media
English
2
16
80
3.8K
eleven red pandas retweetledi
IT Cat ✈️
IT Cat ✈️@itcaat·
Шо опять? 😈 Пару часов назад Уильям Боулинг и команда V12 выложила свежайший эксплойт для повышения привилегий – Fragnesia. Фикс: rmmod esp4 esp6 rxrpc printf 'install esp4 /bin/false\ninstall esp6 /bin/false\ninstall rxrpc /bin/false\n' > /etc/modprobe.d/dirtyfrag.conf
1
2
50
11.7K
eleven red pandas
eleven red pandas@bytecodevm·
A Windows kernel research technique that uses Microsoft PDB symbols to resolve offsets dynamically, avoiding hardcoded values and manual WinDBG work across builds. core-jmp.org/2026/05/no-mor…
eleven red pandas tweet media
English
1
0
3
109
eleven red pandas
eleven red pandas@bytecodevm·
A hands-on guide to building a basic Windows EDR with a kernel driver, callbacks, static analysis, DLL injection, and hooks to detect remote shellcode injection. core-jmp.org/2026/05/buildi…
eleven red pandas tweet mediaeleven red pandas tweet mediaeleven red pandas tweet media
English
0
0
2
107
eleven red pandas
eleven red pandas@bytecodevm·
A Windows injection technique that builds remote read/write/allocation primitives with limited process rights, reducing classic RPM/WPM telemetry and noisy access flags. core-jmp.org/2026/05/proces…
eleven red pandas tweet media
English
0
1
3
106
eleven red pandas retweetledi
Joruno
Joruno@wsl8297·
Windows 自带的任务管理器,日常结束卡死进程还凑合;但一遇到更深层的排障需求——比如线程死锁、被占用的文件句柄——就明显不够看了。 我在 GitHub 挖到一个开源利器:TaskExplorer。一款偏“专业级”的任务管理工具,不止看占用,更能把应用内部在做什么摊开给你看。 它主打高效的单窗口布局:点选进程,底部立刻呈现线程堆栈、内存编辑、文件句柄、网络 Socket 等关键细节,一屏把信息讲透。 实时刷新也很到位:磁盘读写位置、网络连接速率一目了然,甚至支持直接卸载或注入 DLL 模块。 GitHub:github.com/DavidXanatos/T… 项目基于 Qt 开发,底层用到 SystemInformer 的驱动技术;目前支持 Windows 7 及以上,后续还有移植 Linux 的计划。 如果你经常做系统级监控、性能定位、故障排查,这类工具会比传统任务管理器顺手得多。
Joruno tweet media
中文
38
127
678
47.1K