Marc André Tanner

24 posts

Marc André Tanner banner
Marc André Tanner

Marc André Tanner

@marcandretanner

Information Security, Systems Programming, Text Editors, ...

Katılım Nisan 2016
730 Takip Edilen146 Takipçiler
Marc André Tanner
Marc André Tanner@marcandretanner·
We successfully used winget as a PowerShell execution proxy for initial access. While in that setting you can't get around the exe invocation itself, it works well if the feature isn't disabled. blog.compass-security.com/2026/03/winget… Next usecase: lateral movement? 👀
dylan davis@lildylannn

I just dropped some research: DSCourier and would love for your opinion and to check it out!! It’s a novel post-exploitation technique abusing WinGet’s COM API to execute code through Microsoft-signed binaries. GitHub: github.com/DylanDavis1/DS… Blog: dylansec.com/DSCourier/

English
0
20
87
8.2K
Marc André Tanner retweetledi
SpecterOps
SpecterOps@SpecterOps·
GitLab is a prime DevOps target for attackers—IP, supply chain risk, & access to connected systems. 🎯 At #SOCON2026, @marcandretanner shows how an OpenGraph GitLab collector uncovers hybrid attack paths across CI/CD, service accounts, AD & Entra ID. ➡️ ghst.ly/socon26-tw
SpecterOps tweet media
English
0
2
8
2.5K
Marc André Tanner retweetledi
TrendAI Zero Day Initiative
We have a collision! Cyrill Bannwart, Emanuele Barbeno, Yves Bieri, Lukasz D., and Urs Mueller of Compass Security (@compasssecurity) earned $25,000 USD and 4 Master of Pwn points with the Charging Connector Protocol/Signal Manipulation add‑on against the Grizzl‑E Smart 40A, chaining an authentication bypass (CWE‑306) to remote code execution via CWE‑494. #Pwn2Own #P2OAuto
TrendAI Zero Day Initiative tweet mediaTrendAI Zero Day Initiative tweet media
English
0
6
16
3K
Marc André Tanner retweetledi
TrendAI Zero Day Initiative
Confirmed! Cyrill Bannwart, Emanuele Barbeno, Yves Bieri, Lukasz D., and Urs Mueller of Compass Security (@compasssecurity) exploited one exposed dangerous method/function bug on the Alpine iLX-F511, winning Round 2 for $10,000 USD and 2 Master of Pwn points. #Pwn2Own #P2OAuto
TrendAI Zero Day Initiative tweet mediaTrendAI Zero Day Initiative tweet media
English
0
5
17
3.1K
S3cur3Th1sSh1t
S3cur3Th1sSh1t@ShitSecure·
Direct parsing of Adexplorershapshot data or BloodHound .json files (and more formats) to quick-win check for PKI vulnerabilities? Colleage of mine vibe coded a script to do that: github.com/vianic/ace_ana…
S3cur3Th1sSh1t tweet media
English
2
36
124
8.3K
Marc André Tanner
Marc André Tanner@marcandretanner·
Last week presented at an university alumni event, this week successfully used during a red teaming engagement.
Marc André Tanner tweet media
English
1
0
3
111
Marc André Tanner retweetledi
TrendAI Zero Day Initiative
📢 Confirmed! The @compasssecurity team combined an arbitrary file write and cleartext transmission of sensitive data to exploit the @home_assistant Green. The unique bugs in their third round win earns them $20,000 and 4 Master of Pwn points. #Pwn2Own
English
0
3
29
6.3K
Marc André Tanner
Marc André Tanner@marcandretanner·
@Neodyme After some more tests and helpful community feedback I managed to successfully exploit the same testing device using the WinPE method. The blog post has been updated with a corresponding demonstration video.
English
0
0
0
100
Marc André Tanner retweetledi
@Cravaterouge.infosec.exchange
@Cravaterouge.infosec.exchange@rouge_cravate·
bloodyAD v2.1.8 is out with a new feature to resolve foreign SID when displaying security descriptors with "get object" or "get search" and a lifetime option on "add user" offered by @marcandretanner to make them vanish magically once expired github.com/CravateRouge/b…
English
0
1
7
318
Marc André Tanner retweetledi
Saurabh Bagchi
Saurabh Bagchi@bagchi_saurabh·
Timothy Roscoe's keynote at #atc21 #osdi21 had both aspects --- soul searching about current state of OS research and a call to arms with actionable items.
Saurabh Bagchi tweet mediaSaurabh Bagchi tweet mediaSaurabh Bagchi tweet media
English
5
60
324
0
Marc André Tanner
Marc André Tanner@marcandretanner·
I am pleased to announce a new release of the Vis editor, combining modal editing with structural regular expressions, now supporting Lua 5.4, NetBSD and Wayland clipboard integration. github.com/martanne/vis/r…
English
1
2
6
0