CODE WHITE GmbH

178 posts

CODE WHITE GmbH banner
CODE WHITE GmbH

CODE WHITE GmbH

@codewhitesec

Red Teaming. Security Research. Continuous Penetration Testing. Threat Intelligence.

Ulm & Mannheim Katılım Temmuz 2014
42 Takip Edilen6.9K Takipçiler
Tobi Weißhaar
Tobi Weißhaar@_kun_19·
Thrilled to announce the start of a new chapter @codewhitesec 🙂 Thank you for the welcome package 🙃
Tobi Weißhaar tweet media
English
5
1
38
1.6K
CODE WHITE GmbH
CODE WHITE GmbH@codewhitesec·
You like technical deep dives into binary exploitation and crazy heap wizardry? Then you'll like our blog post by @0xor_solo about unauth'ed RCE in NetSupport Manager aka CVE-2025-34164 & CVE-2025-34165 code-white.com/blog/2026-01-n…
English
0
52
140
17.9K
CODE WHITE GmbH
CODE WHITE GmbH@codewhitesec·
Our 2024 applicants challenge is officially #roasted: the full BeanBeat × Maultaschenfabrikle walkthrough is now online. Unwrap the write-up at apply-if-you-can.com/walkthrough/20… and revisit the hacks that escalated from cold brew to full breach.
English
0
12
34
2.5K
CODE WHITE GmbH retweetledi
frycos
frycos@frycos·
Just sayin‘ 🤷
frycos tweet media
English
0
7
16
2.7K
22sh
22sh@0x22sh·
@codewhitesec Is there somewhere we can ask for a reset? It seems that someone has overwritten an initial access path.
English
1
0
0
191
CODE WHITE GmbH
CODE WHITE GmbH@codewhitesec·
Ten days left. The warm-up fades. Maultaschen were soft. Bean Beats were dark and burnt. But the beats of #ULMageddon will be brutal! #applyIfYouCan
CODE WHITE GmbH tweet media
English
0
14
27
4.5K
CODE WHITE GmbH
CODE WHITE GmbH@codewhitesec·
We always love a good challenge. That’s why we’re sponsoring the 10th FAUST CTF. Game on at 2025.faustctf.net
English
0
9
23
2.7K
CODE WHITE GmbH
CODE WHITE GmbH@codewhitesec·
We've added a new demo to NewRemotingTricks that makes deploying a MarshalByRefObject (e.g., WebClient) even easier: System.Lazy<T> creates an instance of T on serialization, which is probably more likely to be allowed than a XAML gadget getting through. github.com/codewhitesec/N…
English
1
31
91
7.5K
CODE WHITE GmbH
CODE WHITE GmbH@codewhitesec·
To clarify: we did not discover these bugs - all credit goes to @_l0gg. We diffed the patches, quickly built a working exploit internally (and identified another auth bypass afterwards)
English
1
2
27
7.1K
CODE WHITE GmbH
CODE WHITE GmbH@codewhitesec·
We have reproduced "ToolShell", the unauthenticated exploit chain for CVE-2025-49706 + CVE-2025-49704 used by @_l0gg to pop SharePoint at #Pwn2Own Berlin 2025, it's really just one request! Kudos to @mwulftange
CODE WHITE GmbH tweet media
English
8
163
643
109.7K
CODE WHITE GmbH
CODE WHITE GmbH@codewhitesec·
Yes, we're beating a dead horse. But that horse still runs in corporate networks - and quietly gives attackers the keys to the kingdom. We're publishing what’s long been exploitable. Time to talk about it. #DSM #Ivanti code-white.com/blog/ivanti-de…
English
0
50
108
16.3K
CODE WHITE GmbH retweetledi
esjay
esjay@esj4y·
At @codewhitesec we have a red team style hacking challenge each year which is also a great way to practice/test/improve your skills ;)
English
2
1
6
1.8K
CODE WHITE GmbH
CODE WHITE GmbH@codewhitesec·
Our crew members @mwulftange & @frycos discovered & responsibly disclosed several new RCE gadgets that bypass #Veeam's blacklist for CVE-2024-40711 & CVE-2025-23120 as well as further entry points following @SinSinology & @chudyPB's blog. Don’t blacklist, replace BinaryFormatter.
English
0
26
91
22.8K