rayanlecat (@rayanlecat) 's Twitter Profile
rayanlecat

@rayanlecat

Pentester

ID: 891705900137893888

linkhttps://rayanle.cat calendar_today30-07-2017 17:03:48

1,1K Tweet

1,1K Followers

910 Following

PwnMe CTF 2025 (@pwnmectf) 's Twitter Profile Photo

PwnMe CTF 2025 2025 finals were intense! 12 teams from 9 countries battled it out at ecole2600 25 hardcore challenges, 9h of hacking, pizza & passion๐Ÿ•โšก ๐Ÿฅ‡Huge GG to RedRocket.Club for the 1st place! Massive shoutout to all players, speakers, and sponsors. See you in 2026!

<a href="/pwnmectf/">PwnMe CTF 2025</a> 2025 finals were intense!
12 teams from 9 countries battled it out at <a href="/ecole2600/">ecole2600</a>
25 hardcore challenges, 9h of hacking, pizza &amp; passion๐Ÿ•โšก

๐Ÿฅ‡Huge GG to <a href="/redrocket_ctf/">RedRocket.Club</a> for the 1st place!

Massive shoutout to all players, speakers, and sponsors. 
See you in 2026!
quarkslab (@quarkslab) 's Twitter Profile Photo

While casually reading Moodle's code @coiffeur0x90 found a SSRF bug exploitable by any authenticated user. Fun twist? This vuln matches exactly the example Orange Tsai ๐ŸŠ presented at Black Hat 2017. Real life imitates conference slides ๐Ÿ˜… Details here: blog.quarkslab.com/auditing-moodlโ€ฆ

While  casually reading Moodle's code @coiffeur0x90 found a SSRF bug exploitable by any authenticated user. 
Fun twist?  This vuln matches exactly the example <a href="/orange_8361/">Orange Tsai  ๐ŸŠ</a> presented at Black Hat 2017. 
Real life imitates conference slides ๐Ÿ˜…
Details here:
blog.quarkslab.com/auditing-moodlโ€ฆ
Worty (@_worty) 's Twitter Profile Photo

During last week, I've played FCSC2025 and managed to reach first place in the web category ! I've written two writeups this year: one about pwning a Chrome extension, and another about a PostgREST service. worty.fr/post/writeups/โ€ฆ worty.fr/post/writeups/โ€ฆ Enjoy the read !

During last week, I've played FCSC2025 and managed to reach first place in the web category !

I've written two writeups this year: one about pwning a Chrome extension, and another about a PostgREST service.

worty.fr/post/writeups/โ€ฆ
worty.fr/post/writeups/โ€ฆ

Enjoy the read !
Kรฉvin GERVOT (Mizu) (@kevin_mizu) 's Twitter Profile Photo

The #FCSC2025 ended yesterday, and my write-ups are now available here ๐Ÿ‘‡ mizu.re/post/fcsc-2025โ€ฆ Btw, like every year, all the challenges have also been added to hackropole.fr! ๐Ÿšฉ 1/2

The #FCSC2025 ended yesterday, and my write-ups are now available here ๐Ÿ‘‡

mizu.re/post/fcsc-2025โ€ฆ

Btw, like every year, all the challenges have also been added to hackropole.fr! ๐Ÿšฉ

1/2
quarkslab (@quarkslab) 's Twitter Profile Photo

Look at those cute little blobs in your internal network. They look harmless, but how about the one carrying SOCKS? It's ProxyBlob, a reverse proxy over Azure. Check out Atsika's article on how it came to exist after an assumed breach mission โคต๏ธ ๐Ÿ‘‰ blog.quarkslab.com/proxyblobing-iโ€ฆ

Look at those cute little blobs in your internal network. They look harmless, but how about the one carrying SOCKS? It's ProxyBlob, a reverse proxy over Azure.
Check out <a href="/_atsika/">Atsika</a>'s article on how it came to exist after an assumed breach mission โคต๏ธ
๐Ÿ‘‰ blog.quarkslab.com/proxyblobing-iโ€ฆ
Atsika (@_atsika) 's Twitter Profile Photo

ProxyBlob is alive ! Weโ€™ve open-sourced our stealthy reverse SOCKS proxy over Azure Blob Storage that can help you operate in restricted environments ๐Ÿ”’ ๐ŸŒ github.com/quarkslab/proxโ€ฆ Blog post for more details right below โฌ‡๏ธ

quarkslab (@quarkslab) 's Twitter Profile Photo

Quarkslab was glad to sponsor the Real World Cryptography Paris Meetup 4 hosted by Ledger last night. Julio Loayza Meneses talked about crypto-condor, our open source tool to test cryptography implementations. You can learn more about it here: quarkslab.github.io/crypto-condor/โ€ฆ

Quarkslab was glad to sponsor the Real World Cryptography Paris Meetup 4 hosted by <a href="/Ledger/">Ledger</a> last night.
Julio Loayza Meneses talked about crypto-condor, our open source tool to test cryptography implementations.
You can learn more about it here:
quarkslab.github.io/crypto-condor/โ€ฆ
watchTowr (@watchtowrcyber) 's Twitter Profile Photo

Our client base has been feeding us rumours about in-the-wild exploited SonicWall SMA n-days (CVE-2023-44221, CVE-2024-38475) for a while... Given these are now CISA KEV, enjoy our now public analysis and reproduction :-) labs.watchtowr.com/sonicboom-fromโ€ฆ

Hack'In (@_hackiin) 's Twitter Profile Photo

๐ŸŽค "How we successfully failed a Red Team ?" Un talk drรดle et formateur par Rayan Bouyaiche (rayanlecat ) & Brahim El Fikhi sur leur 1รจre mission Red Team : fails, rรฉussites, intrusion physique & conseils pour les juniors en cyber. ๐Ÿ”ฅ #CTF #RedTeam #CyberSecurity

๐ŸŽค "How we successfully failed a Red Team ?"
Un talk drรดle et formateur par Rayan Bouyaiche (<a href="/rayanlecat/">rayanlecat</a> ) &amp; Brahim El Fikhi sur leur 1รจre mission Red Team : fails, rรฉussites, intrusion physique &amp; conseils pour les juniors en cyber. ๐Ÿ”ฅ #CTF #RedTeam #CyberSecurity
watchTowr (@watchtowrcyber) 's Twitter Profile Photo

Back in December, we disclosed numerous vulnerabilities to SysAid (who struggle to use email, it seems..) - eventually building a full pre-auth RCE chain. Join us on yet another journey..... labs.watchtowr.com/sysowned-your-โ€ฆ

Off-By-One Conference (@offbyoneconf) 's Twitter Profile Photo

pappy from quarkslab, our keynote speaker marks the start of 2nd edition of Off-By-One Conference with his highly anticipated presentation ๐’๐ฉ๐ฒ๐ฐ๐š๐ซ๐ž ๐Ÿ๐จ๐ซ ๐ซ๐ž๐ง๐ญ & ๐ญ๐ก๐ž ๐ฐ๐จ๐ซ๐ฅ๐ ๐จ๐Ÿ ๐จ๐Ÿ๐Ÿ๐ž๐ง๐ฌ๐ข๐ฏ๐ž ๐œ๐ฒ๐›๐ž๐ซ! Off-By-One Conference go! ๐Ÿš€

<a href="/fredraynal/">pappy</a> from <a href="/quarkslab/">quarkslab</a>, our keynote speaker marks the start of 2nd edition of <a href="/offbyoneconf/">Off-By-One Conference</a>  with his highly anticipated presentation ๐’๐ฉ๐ฒ๐ฐ๐š๐ซ๐ž ๐Ÿ๐จ๐ซ ๐ซ๐ž๐ง๐ญ &amp; ๐ญ๐ก๐ž ๐ฐ๐จ๐ซ๐ฅ๐ ๐จ๐Ÿ ๐จ๐Ÿ๐Ÿ๐ž๐ง๐ฌ๐ข๐ฏ๐ž ๐œ๐ฒ๐›๐ž๐ซ!
<a href="/offbyoneconf/">Off-By-One Conference</a>  go! ๐Ÿš€
Off-By-One Conference (@offbyoneconf) 's Twitter Profile Photo

Tom Mansion from quarkslab in action! After a game of hide and seek, we now ๐’.๐‡.๐ˆ.๐„.๐‹.๐ƒ: ๐’๐œ๐ฎ๐๐จ ๐‡๐ž๐š๐ฉ ๐ˆ๐ฆ๐ฉ๐ฅ๐ž๐ฆ๐ž๐ง๐ญ๐š๐ญ๐ข๐จ๐ง ๐„๐ฑ๐ฉ๐ฅ๐จ๐ข๐ญ๐ฌ, ๐‹๐ž๐š๐ค๐ฌ, ๐š๐ง๐ ๐ƒ๐ž๐Ÿ๐ž๐ง๐ฌ๐ž๐ฌย at Off-By-One Conference 2025!

<a href="/philipp0x90/">Tom Mansion</a> from <a href="/quarkslab/">quarkslab</a>  in action! After a game of hide and seek, we now ๐’.๐‡.๐ˆ.๐„.๐‹.๐ƒ: ๐’๐œ๐ฎ๐๐จ ๐‡๐ž๐š๐ฉ ๐ˆ๐ฆ๐ฉ๐ฅ๐ž๐ฆ๐ž๐ง๐ญ๐š๐ญ๐ข๐จ๐ง ๐„๐ฑ๐ฉ๐ฅ๐จ๐ข๐ญ๐ฌ, ๐‹๐ž๐š๐ค๐ฌ, ๐š๐ง๐ ๐ƒ๐ž๐Ÿ๐ž๐ง๐ฌ๐ž๐ฌย at <a href="/offbyoneconf/">Off-By-One Conference</a>  2025!
zhero; (@zhero___) 's Twitter Profile Photo

publication of my latest modest paper; Eclipse on Next.js: Conditioned exploitation of an intended race-condition - (CVE-2025-32421) enabling a partial bypass of my previous vulnerability, CVE-2024-46982 by chaining a race-condition to a cache-poisoning zhero-web-sec.github.io/research-and-tโ€ฆ

publication of my latest modest paper;

Eclipse on Next.js: Conditioned exploitation of an intended race-condition - (CVE-2025-32421)

enabling a partial bypass of my previous vulnerability, CVE-2024-46982 by chaining a race-condition to a cache-poisoning

zhero-web-sec.github.io/research-and-tโ€ฆ
Sylvain HAJRI (@navlys__) 's Twitter Profile Photo

Attention all #OSINT enthusiasts! ๐ŸŒ Join us for an exciting event at leHACK #OsintVillage2025 in Paris on Friday, June 27th. ๐Ÿ—“๏ธ We're hosting an in-person Trace Labs Search Party to support the vital mission of accelerating the reunification of missing persons. ๐ŸŒ

Attention all #OSINT enthusiasts! ๐ŸŒ 
Join us for an exciting event at <a href="/_leHACK_/">leHACK</a> #OsintVillage2025 in Paris on Friday, June 27th. ๐Ÿ—“๏ธ 

We're hosting an in-person <a href="/TraceLabs/">Trace Labs</a> Search Party to support the vital mission of accelerating the reunification of missing persons. ๐ŸŒ
Hack In Provence (@hackinprovence) 's Twitter Profile Photo

๐Ÿšจ Rรฉservez vos places pour #HackIn2025 ! ๐Ÿšจ ๐Ÿ“… 14-15 juin @ Aix-en-Provence ๐ŸŽค Confรฉrences top avec @agarri_fr, rayanlecat, @Shutdown, mpgn + surprise ! ๐Ÿ’ป CTF nocturne avec 2000โ‚ฌ et plein de lots ร  gagner ๐ŸŽ Inscrivez-vous vite ๐Ÿ‘‰ lnkd.in/eQkgD5sG

๐Ÿšจ Rรฉservez vos places pour #HackIn2025 ! ๐Ÿšจ

๐Ÿ“… 14-15 juin @ Aix-en-Provence
๐ŸŽค Confรฉrences top avec @agarri_fr, <a href="/rayanlecat/">rayanlecat</a>, @Shutdown, <a href="/mpgn_x64/">mpgn</a> + surprise !
๐Ÿ’ป CTF nocturne avec 2000โ‚ฌ et plein de lots ร  gagner ๐ŸŽ

Inscrivez-vous vite ๐Ÿ‘‰ lnkd.in/eQkgD5sG
Dirk-jan (@_dirkjan) 's Twitter Profile Photo

Looking forward to returning to x33fcon with a brand new talk on bringing your own OIDC provider and play around with Entra external auth methods, federated credentials, and more!

rayanlecat (@rayanlecat) 's Twitter Profile Photo

Next week Iโ€™ll be at Hack'In giving a talk with NOODLE, and Iโ€™ve created an Active Directory lab for the CTF. If youโ€™re interested, grab your spot โžก๏ธ helloasso.com/associations/hโ€ฆ

Next week Iโ€™ll be at <a href="/_hackiin/">Hack'In</a> giving a talk with <a href="/bragames2/">NOODLE</a>, and Iโ€™ve created an Active Directory lab for the CTF. If youโ€™re interested, grab your spot โžก๏ธ helloasso.com/associations/hโ€ฆ
Jean (@jean_maes_1994) 's Twitter Profile Photo

๐Ÿš€ Alpha drop: TTP.Exchange is live! A gated marketplace where vetted security researchers & red-teamers trade battle-tested TTPs that still beat modern defenses. Explore, stress-test, and send us your feedback so we can build it right. ๐Ÿ”๐Ÿ› ๏ธ

Toffy (@toffyrak) 's Twitter Profile Photo

๐Ÿ” New research on a niche technique to abuse "GPP Local Users and Groups" to elevate privileges locally through sAMAccountName hijacking. This research comes with a new GPOHound update to detect this misconfiguration. ๐Ÿ”— Read more: cogiceo.com/en/whitepaper_โ€ฆ

๐Ÿ” New research on a niche technique to abuse "GPP Local Users and Groups" to elevate privileges locally through sAMAccountName hijacking.

This research comes with a new GPOHound update to detect this misconfiguration.

๐Ÿ”— Read more: cogiceo.com/en/whitepaper_โ€ฆ