Behnam (@bdasec_) 's Twitter Profile
Behnam

@bdasec_

Computer security person | full-time learner #Bitcoin

ID: 877476315837980674

linkhttps://ninjas.zip calendar_today21-06-2017 10:40:31

747 Tweet

843 Followers

4,4K Following

Tib3rius (@0xtib3rius) 's Twitter Profile Photo

I've seen too many people get confused with the red vs blue team concepts so I made a handy Venn diagram which should put the matter to rest. If you can't understand it, sorry, maybe Cybersecurity isn't for you. 🤷

I've seen too many people get confused with the red vs blue team concepts so I made a handy Venn diagram which should put the matter to rest.

If you can't understand it, sorry, maybe Cybersecurity isn't for you. 🤷
chiefpie (@cplearns2h4ck) 's Twitter Profile Photo

Just pwned Windows 11 with a kernel 0day in Pwn2Own Berlin! Thanks to my teammates Gerrard and Thach(Thach Nguyen Hoang 🇻🇳) for helping me run the exploit. Goodluck to their entries as well.

Trend Zero Day Initiative (@thezdi) 's Twitter Profile Photo

We have a bug collision. Although Sina Kheirkhah (SinSinology) of Summoning Team (SummoningTeam) successfully demonstrated his exploit of #NVIDIA Triton, the bug he used was known by the vendor (but not patched). He still earns $15K and 1.5 Master of Pwn points.

We have a bug collision. Although Sina Kheirkhah (<a href="/SinSinology/">SinSinology</a>) of Summoning Team (<a href="/SummoningTeam/">SummoningTeam</a>) successfully demonstrated his exploit of #NVIDIA Triton, the bug he used was known by the vendor (but not patched). He still earns $15K and 1.5 Master of Pwn points.
Perri Adams (@perribus) 's Twitter Profile Photo

Back in 2023, the assessment of the pre-authentication vulnerability in SSH was that it wasn't exploitable on Linux. For my OffensiveCon 2025 keynote, I wrote enough of an exploit to show, with the right heap groom and stabilization, it's likely exploitable. Then I tried to have

TheZDIBugs (@thezdibugs) 's Twitter Profile Photo

[ZDI-25-298|CVE-2025-31233] Apple macOS MP4 File Parsing Memory Corruption Remote Code Execution Vulnerability (CVSS 8.8; Credit: Hossein Lotfi (Hossein Lotfi) of Trend Micro Zero Day Initiative) zerodayinitiative.com/advisories/ZDI…

TheZDIBugs (@thezdibugs) 's Twitter Profile Photo

[ZDI-25-305|CVE-2025-31219] Apple XNU kernel vm_map Race Condition Local Privilege Escalation Vulnerability (CVSS 8.8; Credit: Michael DePlante (Michael DePlante) and Lucas Leong (Lucas Leong) of Trend Micro's Zero Day Initiative) zerodayinitiative.com/advisories/ZDI…

Horizon3 Attack Team (@horizon3attack) 's Twitter Profile Photo

Check out our latest deep dive into the #Fortinet CVE-2025-32756, a classic buffer overflow! This is being exploited in the wild and was added to the CISA KEV catalog last week. horizon3.ai/attack-researc…

Check out our latest deep dive into the #Fortinet CVE-2025-32756, a classic buffer overflow! This is being exploited in the wild and was added to the CISA KEV catalog last week. 
horizon3.ai/attack-researc…
Natalie Silvanovich (@natashenka) 's Twitter Profile Photo

The final part of j00ru//vx’s Windows Registry series is live! Contains all the hive memory corruption exploitation you’ve been waiting for googleprojectzero.blogspot.com/2025/05/the-wi…

Nicolas Krassas (@dinosn) 's Twitter Profile Photo

ghidraMCP is an Model Context Protocol server for allowing LLMs to autonomously reverse engineer applications. It exposes numerous tools from core Ghidra functionality to MCP clients. github.com/LaurieWired/Gh…

Alex Neff (@al3x_n3ff) 's Twitter Profile Photo

NetExec now has native checks for LDAP signing and channel binding capabilities of the target DC, thanks to the implementation of Thomas Seigneuret 🚀 I also fixed querying LDAP with non-ASCII characters, so you can finally query groups such as "Dämonen-Administratoren"🎉

NetExec now has native checks for LDAP signing and channel binding capabilities of the target DC, thanks to the implementation of <a href="/_zblurx/">Thomas Seigneuret</a> 🚀

I also fixed querying LDAP with non-ASCII characters, so you can finally query groups such as "Dämonen-Administratoren"🎉
Jael Koh (@_jaelkoh) 's Twitter Profile Photo

The slides for offensivecon talk "Hunting for overlooked cookies in Windows 11 KTM and baking exploits for them" by Cedric Halbronn and I are here: docs.google.com/presentation/d…

Synacktiv (@synacktiv) 's Twitter Profile Photo

Microsoft just released the patch for CVE-2025-33073, a critical vulnerability allowing a standard user to remotely compromise any machine with SMB signing not enforced! Checkout the details in the blogpost by Guillaume André and Wil. synacktiv.com/publications/n…

Lays (@_l4ys) 's Twitter Profile Photo

Released my small IDA plugin for finding low-hanging fruit vulnerabilities, a global cross reference list for hexrays github.com/L4ys/LazyCross/

Released my small IDA plugin for finding low-hanging fruit vulnerabilities, a global cross reference list for hexrays
github.com/L4ys/LazyCross/
LazyTitan (@lazytitan33) 's Twitter Profile Photo

Excellent article from Synacktiv detailing CVE-2025-33073. It's an easy peasy LPE on any server where SMB signing is not enforced. I have already replicated it and works a charm. If you still aren't enforcing SMB signing... what are you doing?! Harden your environment & patch!

Excellent article from <a href="/Synacktiv/">Synacktiv</a> detailing CVE-2025-33073. It's an easy peasy LPE on any server where SMB signing is not enforced. I have already replicated it and works a charm. If you still aren't enforcing SMB signing... what are you doing?! Harden your environment &amp; patch!