cherrywu

51 posts

cherrywu banner
cherrywu

cherrywu

@cherrywu05

freelance vulnerability researcher | bug bounty | ctf member

新加坡 Katılım Ocak 2026
199 Takip Edilen19 Takipçiler
Sabitlenmiş Tweet
cherrywu
cherrywu@cherrywu05·
我们正寻找大陆和新加坡的安全研究伙伴来加入我们hybrid团队, 请大家在二月十二日前与我联系吧!谢谢!#AI #CyberSecurity #Research
中文
0
0
1
105
cherrywu retweetledi
Nicolas Krassas
Nicolas Krassas@Dinosn·
I built an open-source library of 700+ cybersecurity skills for AI coding agents -- covers DFIR, threat hunting, cloud security, and more github.com/mukul975/Anthr…
English
66
591
3.1K
187K
cherrywu retweetledi
Snow Wolf
Snow Wolf@Snow_Wo1f·
红队操作架构图 kypvas.github.io/red-team-map/ 涵盖 C2、规避、注入、持久化、凭证访问、权限提升、AD 攻击、云运维、MOTW 绕过、语音钓鱼、AI 等诸多方面。
Snow Wolf tweet mediaSnow Wolf tweet media
中文
3
56
180
11.5K
cherrywu retweetledi
starlabs
starlabs@starlabs_sg·
Ever wondered what happens when you pickle a mailbox? 🥒📬 (No, it’s not a recipe, it’s a vulnerability.) Our team breaks down CVE-2025-20393 in a new deep dive post covering root cause, internals & exploitation details starlabs.sg/blog/2026/01-p… Written by @CurseRed & @bestswngs
English
1
27
86
8K
Souhail Hammou
Souhail Hammou@Dark_Puzzle·
I've published the first entry in my new Windows vulnerability research series. It details how exploring Windows I/O completion internals led to uncovering a use-after-free in afd.sys (CVE-2026-21241). rce4fun.blogspot.com/2026/02/use-af…
English
3
39
151
11.4K
cherrywu
cherrywu@cherrywu05·
@q1uf3ng 这是用哪个模型审的?
中文
0
0
0
118
cherrywu retweetledi
Cyber Security News
Cyber Security News@The_Cyber_News·
🚨 Windows Remote Desktop Services 0-Day Vulnerability Exploited in the Wild Source: cybersecuritynews.com/windows-remote… Microsoft has patched CVE-2026-21533, a zero-day elevation of privilege vulnerability in Windows Remote Desktop Services (RDS) that attackers are exploiting in the wild to gain SYSTEM-level access. The flaw stems from improper privilege management and was addressed in the February 2026 Patch Tuesday updates released on February 10. It requires no user interaction and affects the unchanged scope, impacting confidentiality, integrity, and availability at high levels. The vulnerability arises from flawed privilege handling in RDS components. #cybersecuritynews #vulnerability #microsoft
Cyber Security News tweet media
English
7
167
640
57.6K
chen
chen@chen9918b·
I got CVE - 2026 - 20841 in the latest Microsoft patch. I'm glad Microsoft fixed his new challenge and continued to attack the latest targets. Enjoy the hunting process. Happy hackers 😁📷 msrc.microsoft.com/update-guide/v… @msftsecresponse
chen tweet media
English
2
0
21
2.9K
Souhail Hammou
Souhail Hammou@Dark_Puzzle·
This month's Patch Tuesday fixes CVE-2026-21241, a use-after-free I reported in the Ancillary Function Driver for WinSock (afd.sys). I am planning a blog series covering my recent findings in the Windows kernel, to be released after coordination with @msftsecresponse.
Souhail Hammou tweet media
English
7
8
77
5.8K
cherrywu retweetledi
Tanmay Ganacharya
Tanmay Ganacharya@tanmayg·
We’re seeing active exploitation of SolarWinds Web Help Desk in the wild. If Web Help Desk is internet‑facing, assume it’s being actively targeted. Full analysis + mitigation guidance from my team: microsoft.com/en-us/security…
Tanmay Ganacharya tweet media
English
0
22
54
7.3K