Andrea Santese
@medu554
Red Team Operator | OSCE | OSCP | OSWP
ID: 485034727
https://www.hacksecproject.com 06-02-2012 19:19:04
481 Tweet
815 Followers
752 Following
Portable Data exFiltration: XSS for PDFs by Gareth Heyes \u2028 #BHEU portswigger.net/research/porta…
My first ever blog post: Anatomy of an Exploit: RCE CVE-2020-1350 #SIGRed. RCE PoC included, for research purposes. This was my first userland Windows heap exploit and I hope a deep dive into the process will help others. Patch or apply the workaround. graplsecurity.com/post/anatomy-o…
Hey all! first blog post. Are the popular fuzzers just for binary exploitation? In this blog post I outline how you can find logic issues in web-related regular expressions using differential fuzzing. (spoiler: 29 lines of python using Google Atheris) defparam.medium.com/finding-issues…
After several weeks of work, it's finally there!🔥 Introducing PPLdump, a tool for dumping PPL processes with a Userland exploit!😈 👉Post 1: itm4n.github.io/lsass-runasppl/ 👉Post 2: blog.scrt.ch/2021/04/22/byp… 👉Tool: github.com/itm4n/PPLdump Credit goes to James Forshaw for the technique.
GitLab disclosed a bug submitted by William Bowling @[email protected]: hackerone.com/reports/1154542 - Bounty: $20,000 #hackerone #bugbounty
Here is my RCE exploit code and writeup for (CVE-2021-21974) VMware ESXi OpenSLP heap-overflow discovered by Lucas Leong. Thank you again for your write-up. [PoC] github.com/straightblast/… [writeup] straightblast.medium.com/my-poc-walkthr…