Dave Mayer
1.5K posts

Dave Mayer
@dmay3r
MD of Advanced Assessments @Neuvik, GIAC GSE












someone built an entire AI RED TEAM - multiple agents that coordinate HACKING ATTACKS together, ZERO human input PentAGI, open source, one agent does recon, another scans, another exploits, another writes the report. they talk to each other and adapt based on what they find it ships as one docker container with nmap, metasploit, sqlmap, hydra preinstalled. the AI decides which tool to use and when. you point it at a target and walk away a red team engagement costs $30-50k and takes weeks. this is one docker command and API tokens


GitHub - Yeeb1/SockTail: Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. Designed for red team operations and ephemeral access into restricted environments using Tailscale github.com/Yeeb1/SockTail


I always thought this was a normal feature.😅 CVE-2025-9491 vulnerability exists in the way Windows handles .LNK (shortcut) files. Attackers can embed malicious command-line parameters in the "Target" field of the LNK file and pad them with spaces or other characters to hide these parameters. When a user inspects the file through the Windows user interface, these dangerous contents are invisible to the user. Once the user executes the LNK file, these hidden parameters are passed to the target program, leading to the execution of arbitrary code in the context of the current user.










