CODE WHITE GmbH

277 Followers
22 Following
55 Posts
Red Teaming. Security Research. Penetration Testing. Threat Intelligence.
Twitterhttps://twitter.com/codewhitesec
Githubhttps://github.com/codewhitesec
LinkedInhttps://www.linkedin.com/company/code-white-gmbh
wwwhttps://code-white.com/

RE: https://infosec.exchange/@flomb/116018887867921743

Highly recommend the writeup from our @flomb and congrats on this well-deserved achievement!

RE: https://infosec.exchange/@flomb/116018887867921743

Highly recommend the writeup from our @flomb and congrats on this well-deserved achievement!

You like technical deep dives into binary exploitation and crazy heap wizardry? Then you'll like our blog post about unauth'ed RCE in NetSupport Manager aka CVE-2025-34164 & CVE-2025-34165 https://code-white.com/blog/2026-01-nsm-rce/
CODE WHITE | Unauthenticated RCE in NetSupport Manager - A Technical Deep Dive

NetSupport Manager is a remote control and support software that we find surprisingly often utilized in sensitive *Operational Technology (OT)* environments, such as production plant networks. Besides describing two 0-day vulnerabilities that we found in the client component of the software, we also walk you through an exploit odyssey to finally gain unauthenticated Remote Code Execution.

@buherator Our @mwulftange found the two vulns (auth bypass and rce) weeks ago and we informed the vendor. Build 9511 on 2026-01-15 patched those vulns. We updated our vuln list today after all our clients had patched their systems. Anything else happened independently.
Our 2024 applicants challenge is officially #roasted: the full BeanBeat × Maultaschenfabrikle walkthrough is now online. Unwrap the write-up at https://apply-if-you-can.com/walkthrough/2024 and revisit the hacks that escalated from cold brew to full breach.
CODE WHITE - Applicants Challenge

Applicants Challenge! Face real-world vulns, earn trophies, First Bloods & epic swag!

Latest ≠ Greatest? A Retrospective Analysis of CVE-2025-59287 in Microsoft WSUS from our very own @mwulftange who loves converting n-days to 0-days https://code-white.com/blog/wsus-cve-2025-59287-analysis/
CODE WHITE | A Retrospective Analysis of CVE-2025-59287 in Microsoft WSUS

How the n-day research for a suspected vulnerability in Microsoft WSUS (CVE-2025-59287) led to the surprising discovery of a new `SoapFormatter` vulnerability added by the Patch Tuesday updates of October 2025.

CODE WHITE proudly presents #ULMageddon which is our newest applicants challenge at https://apply-if-you-can.com/ packaged as a metal festival. Have fun 🤘 and #applyIfYouCan
CODE WHITE proudly presents #ULMageddon which is our newest applicants challenge at https://apply-if-you-can.com/ packaged as a metal festival. Have fun 🤘 and #applyIfYouCan
Ten days left. The warm-up fades. Maultaschen were soft. Bean Beats were dark and burnt. But the beats of #ULMageddon will be brutal! #applyIfYouCan
Ten days left. The warm-up fades. Maultaschen were soft. Bean Beats were dark and burnt. But the beats of #ULMageddon will be brutal! #applyIfYouCan