CODE WHITE GmbH

277 Followers
22 Following
55 Posts
Red Teaming. Security Research. Penetration Testing. Threat Intelligence.
Twitterhttps://twitter.com/codewhitesec
Githubhttps://github.com/codewhitesec
LinkedInhttps://www.linkedin.com/company/code-white-gmbh
wwwhttps://code-white.com/

RE: https://infosec.exchange/@flomb/116018887867921743

Highly recommend the writeup from our @flomb and congrats on this well-deserved achievement!

RE: https://infosec.exchange/@flomb/116018887867921743

Highly recommend the writeup from our @flomb and congrats on this well-deserved achievement!

You like technical deep dives into binary exploitation and crazy heap wizardry? Then you'll like our blog post about unauth'ed RCE in NetSupport Manager aka CVE-2025-34164 & CVE-2025-34165 https://code-white.com/blog/2026-01-nsm-rce/
CODE WHITE | Unauthenticated RCE in NetSupport Manager - A Technical Deep Dive

NetSupport Manager is a remote control and support software that we find surprisingly often utilized in sensitive *Operational Technology (OT)* environments, such as production plant networks. Besides describing two 0-day vulnerabilities that we found in the client component of the software, we also walk you through an exploit odyssey to finally gain unauthenticated Remote Code Execution.

Our 2024 applicants challenge is officially #roasted: the full BeanBeat × Maultaschenfabrikle walkthrough is now online. Unwrap the write-up at https://apply-if-you-can.com/walkthrough/2024 and revisit the hacks that escalated from cold brew to full breach.
CODE WHITE - Applicants Challenge

Applicants Challenge! Face real-world vulns, earn trophies, First Bloods & epic swag!

Latest ≠ Greatest? A Retrospective Analysis of CVE-2025-59287 in Microsoft WSUS from our very own @mwulftange who loves converting n-days to 0-days https://code-white.com/blog/wsus-cve-2025-59287-analysis/
CODE WHITE | A Retrospective Analysis of CVE-2025-59287 in Microsoft WSUS

How the n-day research for a suspected vulnerability in Microsoft WSUS (CVE-2025-59287) led to the surprising discovery of a new `SoapFormatter` vulnerability added by the Patch Tuesday updates of October 2025.

CODE WHITE proudly presents #ULMageddon which is our newest applicants challenge at https://apply-if-you-can.com/ packaged as a metal festival. Have fun 🤘 and #applyIfYouCan
CODE WHITE proudly presents #ULMageddon which is our newest applicants challenge at https://apply-if-you-can.com/ packaged as a metal festival. Have fun 🤘 and #applyIfYouCan
Ten days left. The warm-up fades. Maultaschen were soft. Bean Beats were dark and burnt. But the beats of #ULMageddon will be brutal! #applyIfYouCan
Ten days left. The warm-up fades. Maultaschen were soft. Bean Beats were dark and burnt. But the beats of #ULMageddon will be brutal! #applyIfYouCan
We always love a good challenge. That’s why we’re sponsoring the 10th FAUST CTF. Game on at https://2025.faustctf.net/
FAUST CTF 2025 | FAUST CTF 2025

FAUST CTF 2025 is an online attack-defense CTF competition run by FAUST, the CTF team of Friedrich-Alexander University Erlangen-Nürnberg

FAUST CTF 2025