Mehran Armiyon (@arm1yon) 's Twitter Profile
Mehran Armiyon

@arm1yon

Security Enthusiast | Currently doing .NET #exploit dev

ID: 1579178305013653504

linkhttp://armiyon.me calendar_today09-10-2022 18:34:00

137 Tweet

149 Followers

308 Following

Synacktiv (@synacktiv) 's Twitter Profile Photo

Finding #Java gadgets chains has never been so easy with the help of #CodeQL. Checkout our latest article, in which Hugow demonstrates a new technique to leverage the power of CodeQL to find new gadgets: synacktiv.com/en/publication… QLinspector: github.com/synacktiv/QLin…

Finding #Java gadgets chains has never been so easy with the help of #CodeQL. Checkout our latest article, in which <a href="/hugow_vincent/">Hugow</a> demonstrates a new technique to leverage the power of CodeQL to find new gadgets:
synacktiv.com/en/publication…
QLinspector:
github.com/synacktiv/QLin…
Hamid Kashfi (@hkashfi) 's Twitter Profile Photo

D3JS is underrated for security tooling visualizations! Especially if you like to have your dynamic results off cool tools like IDA/Ghidra or an IDE with CFG. Bonus if you ask your favorite LLM to use it for visualization of your SAST results.

Hamid Kashfi (@hkashfi) 's Twitter Profile Photo

I’ve been ignoring Joern’s C# support for a long time since the initial added support stage, as it was still unreliable. Today I picked it up again to play with, and I’m glad I did! Things have improved! FYI Joern sits rights between Semgrep & CodeQL. 🧵

Ryan Naraine (@ryanaraine) 's Twitter Profile Photo

🚨🚨 NEW pod alert! Hamid Kashfi joins the buddies to talk Israel-Iran cyberwar, Predatory Sparrow, disappearing crypto, destructive bank attacks Hamid Kashfi Costin Raiu J. A. Guerrero-Saade Available on all platforms episodes.fm/aHR0cHM6Ly9mZW…

Hamid Kashfi (@hkashfi) 's Twitter Profile Photo

حملات سایبری به ایران، در خلال و پیش از جنگ ایران و اسراییل x.com/i/spaces/1DXxy…

Milad Nouri(ツ) (@miladnu) 's Twitter Profile Photo

اپلیکیشن اندروید "مطمئن باش" منتشر شد. ‌ 🛡 ابزاری برای محافظت در برابر پیامک‌های فیشینگ، لینک‌های کلاهبرداری و اپلیکیشن‌های مشکوک و مخرب ✅ رایگان و اوپن‌سورس ‌ نصب از گوگل‌پلی و کافه بازار: play.google.com/store/apps/det… و cafebazaar.ir/app/nu.milad.m… اطلاعات بیشتر: motmaenbash.ir

Soroush Dalili (@irsdl) 's Twitter Profile Photo

🚨 1- CVE-2025-53770 is a variant of CVE-2025-49704 - a critical auth bypass in SharePoint's ToolPane.aspx endpoint. It lets attackers reach a page that can parse webparts without valid credentials, and with a chained deserialization bug, they can achieve RCE entirely in memory

LeakIX (@leak_ix) 's Twitter Profile Photo

As promised, our #SharePoint adventure with CVE-2025-53770 and CVE-2025-53771, including payloads and vulnerability checker! blog.leakix.net/2025/07/using-…

Soroush Dalili (@irsdl) 's Twitter Profile Photo

I have launched YSoNet (ysonet.net) and added #SharePoint CVE-2025-49704 payload generator to it as the first thing. Here is how this can work: Running command: ``` ysonet.exe -p sharepoint --cve=CVE-2025-49704 -var 1 -c "calc" ``` Running C# code: ``` ysonet.exe

Chris Wysopal (@weldpond) 's Twitter Profile Photo

Over the last 2 yrs LLMs have vastly improved their ability to write syntactically correct code, but they haven’t improved in ability to write code without vulnerabilities which is steady at 45% coding tasks with vulns.

Over the last 2 yrs LLMs have vastly improved their ability to write syntactically correct code, but they haven’t improved in ability to write code without vulnerabilities which is steady at 45% coding tasks with vulns.
Orange Cyberdefense's SensePost Team (@sensepost) 's Twitter Profile Photo

Reverse engineering Microsoft’s SQLCMD.exe to implement Channel Binding support for MSSQL into Impacket’s mssqlclient.py. Storytime from Aurelien (Aurélien Chalot), including instructions for reproducing the test environment yourself. (link below)

Reverse engineering Microsoft’s SQLCMD.exe to implement Channel Binding support for MSSQL into Impacket’s mssqlclient.py. Storytime from Aurelien (<a href="/Defte_/">Aurélien Chalot</a>), including instructions for reproducing the test environment yourself.

(link below)
YS (@yshahinzadeh) 's Twitter Profile Photo

I’m a web guy, so I usually don’t work on non-web applications since my mind doesn’t do binary. With the help of my friend for reverse engineering, I managed to uncover some CVEs. It was very challenging for me, hope you like it: blog.voorivex.team/hacking-veeam-…

Dawood Sajjadi (داود سجادی) (@5tuxnet) 's Twitter Profile Photo

At Black Hat USA 2025, Tal and his colleague revealed 14 previously unknown vulnerabilities in two leading secret managers: HashiCorp Vault and CyberArk Conjur. Some of these issues were lying in wait for years. They enabled authentication bypass, root access, remote code