41 Followers
104 Following
152 Posts
Threat Intel | Red Team | Chess | Creator of CuteRAT and other fun offensive security tools. 

Located in Canada and open to exploring new positions (prefer remote) 🇨🇦 Send me a message if you’d like to chat. 

0x90corn
Websitehttps://nopcorn.github.io
Githubhttps://github.com/nopcorn
CuteRAT 🐭https://github.com/nopcorn/CuteRAT
Finished watching "The Menu". Man.. that is going to take me a bit to process. I liked it but I am not sure why.
Merry Christmas cyber [defenders|researchers]
Hacky New Year!
Malvertiser Copies Pc News Site To Deliver Infostealer - RedPacket Security

The majority of malvertising campaigns delivering malicious utilities that we have tracked so far typically deceive victims with pages that are almost the

RedPacket Security
@ciggysmokebringer @futurebird Dammit now I need to go re-watch #HACKERS. @hackers_gifs

Happy birthday Magnus #Carlsen! 🥳
Countless achievements across his career (such as 5 World Championship Titles), but we cannot fail to mention the first Lichess #TitledArena ever! 😁

#chess #lichess #onthisday

Exploit proof of concept released for CrushFTP, patch ASAP

A critical vulnerability in CrushFTP allows unauthenticated attackers to execute code and access sensitive data via a mass-assignment flaw, prompting urgent patching and additional mitigations.

BeyondMachines

A couple of blog posts for learning about Linux process injection (specifically sshd injection for credential harvesting)

https://blog.xpnsec.com/linux-process-injection-aka-injecting-into-sshd-for-fun/

https://jm33.me/sshd-injection-and-password-harvesting.html

#processinjection #redteam #cybersecurity

Linux ptrace introduction AKA injecting into sshd for fun

If there is one thing I've come to appreciate over this past few weeks, it's just how much support you are provided from the Win32 API. That being said, I wanted to tackle some Linux process injection, with the aim of loading a shared object into another process address space without having to resort to LD_PRELOAD, or stopping the process. The goal I set myself was quite simple, could I recover plain text credentials from the sshd process using ptrace. Granted, this is a bit of an arbitrary goa

XPN InfoSec Blog