This repo contains the design plan and runbook for using Claude Code to search for Java Deserialization Gadget chains.
https://github.com/atredispartners/llmchainhunter
#infosec #cybersecurity #redteam #pentest #ai #llm #opensource
Data breach revealed,
Malware lurks, silent, stealthy -
OSINT tracks the thread.
URLs I post may contain malware – be careful and check yourself before running anything.
| Website | https://r1cksec.de |
| Github | https://github.com/r1cksec |
| https://twitter.com/r1cksec | |
| BlueSky | https://bsky.app/profile/r1cksec.bsky.social |
This repo contains the design plan and runbook for using Claude Code to search for Java Deserialization Gadget chains.
https://github.com/atredispartners/llmchainhunter
#infosec #cybersecurity #redteam #pentest #ai #llm #opensource
A project that loads .NET assemblies into memory within an IIS environment running in full‑trust mode. It uses reflective loading techniques to inject inside the memory space of the w3wp.exe worker pool process
A post that describe how PKG files can be used to gain initial access on macOS
https://blog.balliskit.com/macos-redteam-3-initial-access-with-darwinops-pkg-0a1d0160e662
Rusty Armory - Beacon Object Files (BOFs) in Rust (Codename: Armory)
It is possible as a low privileged user to parse the Windows event logs for any ASR exclusion
While working on varying engagements i have been messing with Microsoft Attack Surface Reduction (ASR) quite a bit, since clients often use it to make the life of adversaries(and red teamers) just a tad harder. While working on these engagements i have compiled some tips and tricks in order to bypass/evade some of the rules that ASR offers. In this post i will dive into what ASR is and some of tips and tricks that i often use to bypass/cheese my way around said rules… So strap in and lets get going with some basic ASR understanding.
This cheatsheet maps common impacket workflows to their modern alternatives
LLM security testing framework for detecting prompt injection, jailbreaks, and adversarial attacks — 190+ probes, 28 providers, single Go binary
Repository for finding Beacon Object Files (BOFs)
By altering the calling threads process ID and extending the exploitation window with file locks, an attacker can trick Seclogon into creating privileged LSASS handles for memory dumping
In late 2025, Reversec built a system that streamlined voice phishing (vishing) attempts using autonomous conversational AI agents that followed a pretext for gaining initial access.
https://labs.reversec.com/posts/2026/02/building-an-ai-vishing-solution-in-7-days