
Stephen Fewer
@stephenfewer
Principal Security Researcher @rapid7. Decompiler @relyze. Core @metasploit dev 2009 - 2013. MSRC Top 100 2015. Pwn2Own 2011, 2021, 2024.
ID: 22932980
http://stephenfewer.github.io 05-03-2009 15:40:23
794 Tweet
8,8K Followers
241 Following

In another great body of research from Ryan Emmons, this disclosure chains 3 new vulns in SonicWall's SMA 100 appliances to go from a low privileged account to full RCE as root!! Awesome work as always 🔥🔥🔥



Needed Reflective DLL Injection for Windows on ARM64 for a project, but public examples were nowhere to be found. So, here you go. My PoC adapts Stephen Fewer's classic, detailing TEB/PEB access via x18 for ARM64. Hopefully useful for red team ops & offensive security





Our Metasploit Project auxiliary module for the new Brother auth bypass is available. The module will leak a serial number via HTTP/HTTPS/IPP (CVE-2024-51977), SNMP, or PJL, generate the devices default admin password (CVE-2024-51978) and then validate the creds: github.com/rapid7/metaspl…


BEST day of the week 📰 EC 77 Out NOW! 🎉Binja Giveaway complete - check your email to see if you've won 🎉 Stephen Fewer hacks a printer Billy Ellis continues his CVE-2025-31200 video series Windows tricks from trickster0 + Jobs and MORE 👇 blog.exploits.club/exploits-club-…







Metasploit Project opened a survey to collect feedback on what is preventing you from using Metasploit in certain contexts. Every input is super appreciated as it can help us prioritize new features (ex. making Meterpreter stealth again 😇) docs.google.com/forms/d/e/1FAI… #metasploit


I've been asked countless times how to learn VR & xdev. The answer is always: "do something you think is cool". It's hard to figure out what to do. Try the PhrackCTF which I've now open-sourced. It's not a contrived CTF - modeled after real vulnerabilities github.com/xforcered/Phra…