Spencer McIntyre

648 posts

Spencer McIntyre

Spencer McIntyre

@zeroSteiner

Views are my own.

Cleveland, Ohio Katılım Mart 2011
921 Takip Edilen2.8K Takipçiler
Spencer McIntyre retweetledi
scriptjunkie (Matt)
scriptjunkie (Matt)@scriptjunkie1·
I appreciate everyone dropping linux privesc 0days in the current AI renaissance, but to really make it feel like the good ol days someone needs to drop a weaponized pre-auth SMB or RDP RCE. We haven't had a good Windows worm in AGES.
English
11
42
270
21.5K
Spencer McIntyre
Spencer McIntyre@zeroSteiner·
@_RastaMouse @metasploit The ROR13 calculation was switched to use an "IV" of 0 by default, and the module name hash is used as the IV when calculating the function name hash. Framework now randomizes the IV at assembly time so the ROR13 hashes aren't hard-coded anymore 1/2
English
0
0
1
222
Spencer McIntyre retweetledi
CryptoCat
CryptoCat@_CryptoCat·
Coming soon to a @metasploit near you 👀
English
1
14
91
8.2K
Spencer McIntyre retweetledi
Metasploit Project
Metasploit Project@metasploit·
This weeks wrap up is packed with new stuff including an MCP server, and new modules for relaying NTLM from HTTP to LDAP and a Copy Fail exploit with x64 and AARCH64 support rapid7.com/blog/post/pt-m…
English
0
6
17
3.3K
Spencer McIntyre retweetledi
Jacob Baines
Jacob Baines@Junior_Baines·
Jacob Baines tweet media
ZXX
1
24
103
6.7K
Spencer McIntyre retweetledi
Metasploit Project
Metasploit Project@metasploit·
The annual wrap-up for Metasploit Framework is out now, and it includes the entirety of stats for 2025. This wrap-up and its contents would not be possible without the participation and dedication of our contributors and researchers, and all of our thanks goes to them! Metasploit Framework wouldn't be the same without you, thank you. rapid7.com/blog/post/pt-m…
English
0
11
32
5.3K
Spencer McIntyre retweetledi
🕳
🕳@sekurlsa_pw·
Metasploit also has a merged exploit with check for react2shell. ⌨️ module: multi/http/react2shell_cve_2025_55182 📦 Dockerfile to test available in: Data\exploits\react2shell_unauth_rce_cve_2025_55102 github.com/rapid7/metaspl…
English
2
21
69
5.5K
Spencer McIntyre retweetledi
_leon_jacobs(💥)
_leon_jacobs(💥)@leonjza·
I've been hacking on a new Windows Named Pipe tool called PipeTap which helps analyse named pipe communications. Born out of necessity while doing some vulnerability research on a target, its been super useful in reversing it's fairly complex protocol. :)
_leon_jacobs(💥) tweet media
English
18
146
1K
71.5K
Spencer McIntyre retweetledi
Stephen Fewer
Stephen Fewer@stephenfewer·
Come join @rapid7! I’m hiring for a Senior Security Researcher to join our team. You'll get to work on n-day analysis, zero-day research, exploit development, and more - focusing on enterprise software and appliances. Fully remote in the UK, details here: careers.rapid7.com/jobs/senior-se…
English
4
15
60
7.7K
Spencer McIntyre retweetledi
Stephen Fewer
Stephen Fewer@stephenfewer·
Today @rapid7 is disclosing 8 new printer vulnerabilities affecting 742 models across 4 vendors. After 13 months of coordinated disclosure with Brother Industries, Ltd, we're detailing all issues including a critical auth bypass. Full details here: rapid7.com/blog/post/mult…
English
2
27
75
8.3K
Spencer McIntyre retweetledi
Stephen Fewer
Stephen Fewer@stephenfewer·
Our @metasploit auxiliary module for the new Brother auth bypass is available. The module will leak a serial number via HTTP/HTTPS/IPP (CVE-2024-51977), SNMP, or PJL, generate the devices default admin password (CVE-2024-51978) and then validate the creds: github.com/rapid7/metaspl…
Stephen Fewer tweet media
English
1
33
99
6.7K
Spencer McIntyre retweetledi
Stephen Fewer
Stephen Fewer@stephenfewer·
Today @rapid7 disclosed two vulns affecting NetScaler Console and NetScaler SDX, found by Senior Security Researcher Calum Hutton! 🎉 Our blog details the authenticated arbitrary file read vuln (CVE-2025-4365), and the authenticated arbitrary file write vuln (Which the vendor has not assigned a CVE for).
Rapid7@rapid7

During root cause analysis for the #NetScaler Console vulnerability, CVE-2024-6235, Rapid7 discovered & disclosed to the vendor 2 additional high severity vulnerabilities. Find exploitation details, remediation advice & more in a new blog: r-7.co/4efpR1S

English
1
11
46
8.3K
Spencer McIntyre retweetledi
Alex
Alex@xaitax·
Submitted a PR to enhance ReflectiveDLLInjection in @Metasploit: 
✅ ARM64 reflective loading (using resolved APIs, not syscalls!)
✅ Refactored x86/64/ARM32 loader
✅ Major injector CLI & feature upgrades
✅ API to pass params to DllMain
Details: github.com/rapid7/Reflect… Fingers crossed @stephenfewer doesn't mind the tinkering! 😄
English
0
1
7
857