Spencer McIntyre

640 posts

Spencer McIntyre

Spencer McIntyre

@zeroSteiner

Views are my own.

Cleveland, Ohio Katılım Mart 2011
923 Takip Edilen2.8K Takipçiler
Spencer McIntyre retweetledi
Metasploit Project
Metasploit Project@metasploit·
The annual wrap-up for Metasploit Framework is out now, and it includes the entirety of stats for 2025. This wrap-up and its contents would not be possible without the participation and dedication of our contributors and researchers, and all of our thanks goes to them! Metasploit Framework wouldn't be the same without you, thank you. rapid7.com/blog/post/pt-m…
English
0
11
30
5.2K
Spencer McIntyre retweetledi
🕳
🕳@sekurlsa_pw·
Metasploit also has a merged exploit with check for react2shell. ⌨️ module: multi/http/react2shell_cve_2025_55182 📦 Dockerfile to test available in: Data\exploits\react2shell_unauth_rce_cve_2025_55102 github.com/rapid7/metaspl…
English
3
21
68
0
Spencer McIntyre retweetledi
Chocapikk
Chocapikk@Chocapikk_·
New Metasploit module for CVE-2025-54236 (SessionReaper) - Unauthenticated RCE in Magento github.com/rapid7/metaspl…
Chocapikk tweet media
English
2
42
168
0
Spencer McIntyre retweetledi
_leon_jacobs(💥)
_leon_jacobs(💥)@leonjza·
I've been hacking on a new Windows Named Pipe tool called PipeTap which helps analyse named pipe communications. Born out of necessity while doing some vulnerability research on a target, its been super useful in reversing it's fairly complex protocol. :)
_leon_jacobs(💥) tweet media
English
18
148
1K
0
Spencer McIntyre retweetledi
Stephen Fewer
Stephen Fewer@stephenfewer·
Come join @rapid7! I’m hiring for a Senior Security Researcher to join our team. You'll get to work on n-day analysis, zero-day research, exploit development, and more - focusing on enterprise software and appliances. Fully remote in the UK, details here: careers.rapid7.com/jobs/senior-se…
English
4
15
60
0
Spencer McIntyre retweetledi
Stephen Fewer
Stephen Fewer@stephenfewer·
Today @rapid7 is disclosing 8 new printer vulnerabilities affecting 742 models across 4 vendors. After 13 months of coordinated disclosure with Brother Industries, Ltd, we're detailing all issues including a critical auth bypass. Full details here: rapid7.com/blog/post/mult…
English
2
27
75
0
Spencer McIntyre retweetledi
Stephen Fewer
Stephen Fewer@stephenfewer·
Our @metasploit auxiliary module for the new Brother auth bypass is available. The module will leak a serial number via HTTP/HTTPS/IPP (CVE-2024-51977), SNMP, or PJL, generate the devices default admin password (CVE-2024-51978) and then validate the creds: github.com/rapid7/metaspl…
Stephen Fewer tweet media
English
1
32
97
0
Spencer McIntyre retweetledi
Stephen Fewer
Stephen Fewer@stephenfewer·
Today @rapid7 disclosed two vulns affecting NetScaler Console and NetScaler SDX, found by Senior Security Researcher Calum Hutton! 🎉 Our blog details the authenticated arbitrary file read vuln (CVE-2025-4365), and the authenticated arbitrary file write vuln (Which the vendor has not assigned a CVE for).
Rapid7@rapid7

During root cause analysis for the #NetScaler Console vulnerability, CVE-2024-6235, Rapid7 discovered & disclosed to the vendor 2 additional high severity vulnerabilities. Find exploitation details, remediation advice & more in a new blog: r-7.co/4efpR1S

English
1
11
46
0
Spencer McIntyre retweetledi
Alex
Alex@xaitax·
Submitted a PR to enhance ReflectiveDLLInjection in @Metasploit: 
✅ ARM64 reflective loading (using resolved APIs, not syscalls!)
✅ Refactored x86/64/ARM32 loader
✅ Major injector CLI & feature upgrades
✅ API to pass params to DllMain
Details: github.com/rapid7/Reflect… Fingers crossed @stephenfewer doesn't mind the tinkering! 😄
English
0
1
7
0
Spencer McIntyre retweetledi
Metasploit Project
Metasploit Project@metasploit·
This week's wrap-up features support for the SOCKS5H protocol, some additional SOCKS lore, and modules for WordPress Depicter Plugin and Gladinet CentreStack/Triofox. rapid7.com/blog/post/2025…
English
3
29
110
0
Spencer McIntyre retweetledi
Chocapikk
Chocapikk@Chocapikk_·
🚀 I just released a new Metasploit module for Invision Community ≤ 5.0.6 (CVE-2025-47916)! 🔗 PR: github.com/rapid7/metaspl…
Chocapikk tweet media
English
0
33
119
6.4K
Spencer McIntyre retweetledi
Zoe Thorogood
Zoe Thorogood@zoethorogood·
Thanks to your help I donated £10,000 to mental health charities in the UK. I’m hoping to keep the ball rolling a little bit and fund raise using the pull of an exclusive signed print- you can support the fundraiser and get a print here, thank you - indiegogo.com/projects/happy…
Zoe Thorogood tweet mediaZoe Thorogood tweet media
English
4
109
618
17.8K
Spencer McIntyre retweetledi
Chocapikk
Chocapikk@Chocapikk_·
🚨 CVE-2025-3102 Turned SureTriggers into SurePwned - unauth admin + RCE (≤1.0.78). PoCs have been out for a month, so I wrote the Metasploit module: github.com/rapid7/metaspl…
Chocapikk tweet media
English
3
22
87
0
Spencer McIntyre retweetledi
RedTeam Pentesting
RedTeam Pentesting@RedTeamPT·
We recently noticed that impackets smblient.py example does not actually give you access control info about files, it is simply hard coded: 🤯
RedTeam Pentesting tweet media
English
3
9
102
0
Spencer McIntyre retweetledi
Artur Marzano
Artur Marzano@MacmodSec·
ADCS Attack Techniques Cheatsheet for all of you lazy folks who prefer colored tables over reading a bunch of articles just to find some specific information: bit.ly/adcs-cheatsheet
English
6
177
498
0