Orange Cyberdefense's SensePost Team (@sensepost) 's Twitter Profile
Orange Cyberdefense's SensePost Team

@sensepost

Work like hell,
Share all you know,
Abide by your handshake,
Have fun. - Dan Geer

ID: 146241293

linkhttps://sensepost.com/ calendar_today20-05-2010 23:32:10

1,1K Tweet

8,8K Takipçi

322 Takip Edilen

guilhem rioux (@guilhemrioux) 's Twitter Profile Photo

Glad to publish a blog post on a critical vulnerability I found some months ago on GLPI, that impacts all default installation under a certain version: sensepost.com/blog/2025/leak… We also released a tool that implements some check for known vulnerabilities: github.com/Orange-Cyberde…

Orange Cyberdefense's SensePost Team (@sensepost) 's Twitter Profile Photo

GLPI (popular in France & Brazil) versions 9.5.0-10.0.16 allow hijacking sessions of authenticated users remotely. The details & process of discovering the vulnerability is detailed by guilhem rioux here: sensepost.com/blog/2025/leak… Tooling: github.com/Orange-Cyberde…

GLPI (popular in France &amp; Brazil) versions 9.5.0-10.0.16 allow hijacking sessions of authenticated users remotely. The details &amp; process of discovering the vulnerability is detailed by <a href="/GuilhemRioux/">guilhem rioux</a> here:
sensepost.com/blog/2025/leak…

Tooling: github.com/Orange-Cyberde…
Orange Cyberdefense's SensePost Team (@sensepost) 's Twitter Profile Photo

Dropping Teams malware via the browser’s cache - part II of Aurélien Chalot's Browser Cache Smuggling covers his Insomni’hack talk with end to end weaponisation sensepost.com/blog/2025/brow… Demo: youtu.be/tIveWYfYcCI

Dropping Teams malware via the browser’s cache - part II of <a href="/Defte_/">Aurélien Chalot</a>'s Browser Cache Smuggling covers his Insomni’hack talk with end to end weaponisation sensepost.com/blog/2025/brow…

Demo: youtu.be/tIveWYfYcCI
_leon_jacobs(💥) (@leonjza) 's Twitter Profile Photo

Whipped together a SOCKS5-over-any-transport feature today for the c2 & implant used in Orange Cyberdefense's SensePost Team purple teaming / emulation exercises. Here I have a cURL request, over an ICMP channel, funnelling HTTP requests in and out via our implant :D Fun! 😄🔥

Whipped together a SOCKS5-over-any-transport feature today for the c2 &amp; implant used in <a href="/sensepost/">Orange Cyberdefense's SensePost Team</a> purple teaming / emulation exercises.

Here I have a cURL request, over an ICMP channel, funnelling HTTP requests in and out via our implant :D

Fun! 😄🔥
Orange Cyberdefense's SensePost Team (@sensepost) 's Twitter Profile Photo

Unsatisfied with merely relying on reFlutter to do its magic, Jacques dove deep to understand how Flutter's SSL pinning in Android works, and how to intercept it with Frida. sensepost.com/blog/2025/inte…

Unsatisfied with merely relying on reFlutter to do its magic, Jacques dove deep to understand how Flutter's SSL pinning in Android works, and how to intercept it with Frida.

sensepost.com/blog/2025/inte…
Orange Cyberdefense's SensePost Team (@sensepost) 's Twitter Profile Photo

After Inactive Account argued about dependency confusion & supply chain attacks & was confused with the feasibility of doing this in 2025, he decided to take a practical approach & create his own tool 📷 to detect Orphan and Misspelled packages 📷: sensepost.com/blog/2025/deps…

_leon_jacobs(💥) (@leonjza) 's Twitter Profile Photo

Quite stoked to be speaking at DEF CON 33 this year, presenting: "7 Vulns in 7 Days: Breaking Bloatware Faster Than It’s Built". Reversing, exploits, disclosure pain - it has it all, and it's going to be fun! 💥 See ya soon Vegas. ☀️

Quite stoked to be speaking at <a href="/defcon/">DEF CON</a> 33 this year, presenting: "7 Vulns in 7 Days: Breaking Bloatware Faster Than It’s Built".

Reversing, exploits, disclosure pain - it has it all, and it's going to be fun! 💥

See ya soon Vegas. ☀️
_leon_jacobs(💥) (@leonjza) 's Twitter Profile Photo

I've been hacking on a new Windows Named Pipe tool called PipeTap which helps analyse named pipe communications. Born out of necessity while doing some vulnerability research on a target, its been super useful in reversing it's fairly complex protocol. :)

I've been hacking on a new Windows Named Pipe tool called PipeTap which helps analyse named pipe communications. Born out of necessity while doing some vulnerability research on a target, its been super useful in reversing it's fairly complex protocol. :)
BSides Cape Town (@bsidescapetown) 's Twitter Profile Photo

🧡 We’re proud to welcome Orange Cyberdefense South Africa back as a Gold Sponsor for #BSidesCPT 2025! A long-time supporter of the local infosec community, they’re once again helping us create spaces to learn, connect and grow.

🧡 We’re proud to welcome <a href="/OrangeCyberZA/">Orange Cyberdefense South Africa</a> back as a Gold Sponsor for #BSidesCPT 2025!

A long-time supporter of the local infosec community, they’re once again helping us create spaces to learn, connect and grow.