kriware 

@kriware@infosec.exchange
39 Followers
30 Following
370 Posts
Security Analyst at Layakk
Permanent student
Kriware Security Feed: Feed of technical blogs about cybersecurity. -> Telegram Channel: https://t.me/kriwarefeed
YouTuber: kriware
RootedCON co-organizer
Webhttps://kriware.com/

Exploiting the Synology TC500

Covers a format-string exploit developed for a smart camera, enabling RCE in a LAN micro­service, though it wasn’t deployed.

https://blog.infosectcbr.com.au/2025/08/01/exploiting-the-synology-tc500-at-pwn2own-ireland-2024/?ref=blog.exploits.club

#formatstring #RCE

Exploiting the Synology TC500 at Pwn2Own Ireland 2024

IntroductionIn October 2024, InfoSect participated in Pwn2Own – a bug bounty competition against embedded devices such as cameras, NAS’, and smart speakers. In this blog, I’ll dis…

InfoSect Blog

Qualcomm DSP Kernel Internals

Explains core architecture and components of Qualcomm’s FastRPC-based DSP kernel driver.

https://streypaws.github.io/posts/DSP-Kernel-Internals/

#Qualcomm #DSP

Qualcomm DSP Kernel Internals

In depth internals on Qualcomm DSP Kernel (FastRPC implementation)

StreyPaws
Attacking GenAI applications and LLMs - Sometimes all it takes is to ask nicely! - hn security

Generative AI and LLM technologies have shown […]

hn security

Doublespeak Chat LLM Escape Game

Web-based text adventure challenges users to jailbreak LLM prompts across levels, showing prompt injection risks and evaluating countermeasures.

https://doublespeak.chat/

#AI #promptInjection #llm

Doublespeak.chat

A text-based AI escape game by Forces Unseen.

Doublespeak.chat

Implementing Channel Binding in mssqlclient.py

Walkthrough adding Channel Binding support to Impacket's mssqlclient.py, detailing CBT basics, implementation hurdles, and testing against NTLM relay.

https://sensepost.com/blog/2025/a-journey-implementing-channel-binding-on-mssqlclient.py/

#Database #NTLM

SensePost | A journey implementing channel binding on mssqlclient.py

Leaders in Information Security

Let Me Cook You a Vulnerability: Exploiting the Thermomix TM5

Firmware downgrade exploit enables persistent code on Thermomix TM5

https://www.synacktiv.com/en/publications/let-me-cook-you-a-vulnerability-exploiting-the-thermomix-tm5.html

#IoT #embedded

Let Me Cook You a Vulnerability: Exploiting the Thermomix TM5

Related Work The Thermomix TM5 has previously drawn the attention of the security community, notably through research presented by Jean-Michel Besnard at SSTIC 2019 [1], which described a code execut

Synacktiv

Hands-On OT Cyber Range

Interactive OT/ICS lab delivers real environments for hands-on training, pentesting, IDS tuning, and SIEM validation, deployable in minutes.

https://labshock.github.io/

#OT #ICS #lab

Labshock - OT Cybersecurity Lab

Build your OT lab, emulate ICS systems, run realistic attacks, detect and defend, and test SIEM correlations.

PiCCANTE – Vehicle CAN‑Bus Tool on Raspberry Pi Pico

A toolkit enabling exploration and manipulation of vehicle CAN bus networks via a Raspberry Pi Pico platform, offering multiple CAN interfaces, USB/SLCAN support, Wi‑Fi, web UI, Bluetooth, MITM and logging.

https://github.com/Alia5/PiCCANTE

#canbus

GitHub - Alia5/PiCCANTE: PiCCANTE is a powerful tool for exploring and reversing CAN busses of vehicles, based on Raspberry Pi Pico (any model)

PiCCANTE is a powerful tool for exploring and reversing CAN busses of vehicles, based on Raspberry Pi Pico (any model) - Alia5/PiCCANTE

GitHub

remoteKrbRelayx – Kerberos Auth Relay via DCOM/RPC

A Python tool enabling coercion and relaying of Kerberos authentication over DCOM and RPC, using remote coercion and RPC-based relay techniques to target Active Directory environments

https://github.com/OleFredrik1/remoteKrbRelayx

#Kerberos #relay

GitHub - OleFredrik1/remoteKrbRelayx: A tool for coercing and relaying Kerberos authentication over DCOM and RPC.

A tool for coercing and relaying Kerberos authentication over DCOM and RPC. - OleFredrik1/remoteKrbRelayx

GitHub

RAITrigger – Local SYSTEM Authentication Trigger for Relaying

A low‑privileged domain user can call the RPC function RAiForceElevationPromptForCOM in appinfo.dll to trigger SYSTEM‑level authentication to an arbitrary UNC path, enabling NTLM relay or ADCS attacks in domain environments.

https://github.com/rtecCyberSec/RAITrigger/

#LPE #RelayAttack

GitHub - rtecCyberSec/RAITrigger: Local SYSTEM auth trigger for relaying

Local SYSTEM auth trigger for relaying. Contribute to rtecCyberSec/RAITrigger development by creating an account on GitHub.

GitHub