Frycos
@frycos.bsky.social
760 followers 130 following 23 posts
Private account! Red teamer @codewhitesec. @[email protected] @frycos@X
Posts Media Videos Starter Packs
frycos.bsky.social
On your way to @brucon! Are you interested in technical discussions or would you like to know what makes our company so unique? Just talk to us.
frycos.bsky.social
Tired of dull, standard interviews? Talk to Kurt. Also, a few of my colleagues and I will be attending BruCON next week. Feel free to come and talk to us.
codewhitesec.bsky.social
CODE WHITE proudly presents #ULMageddon which is our newest applicants challenge at apply-if-you-can.com packaged as a metal festival. Have fun 🤘 and #applyIfYouCan
ULMageddon Logo
frycos.bsky.social
New AI-generated "technical" blog posts are stealing my time. 🤬
Reposted by Frycos
jerry.infosec.exchange.ap.brid.gy
Yes, there’s another phishing campaign contacting fediverse users to fill out a form to avoid being suspended or whatever. Stay calm and just report them and be sure to check the option to inform their home instance so the account gets suspended for everyone.

Also, please consider enabling […]
Original post on infosec.exchange
infosec.exchange
Reposted by Frycos
jrn.bsky.social
Today I have a more serious topic than usual, please consider reposting for reach:

My wife and I are urgently looking for a specialist in neuropediatrics or a similar field for our autistic child with a diagnosed, but not further specified, movement disorder [1/4]
Reposted by Frycos
codewhitesec.bsky.social
We've added a new demo to NewRemotingTricks that makes deploying a MarshalByRefObject (e.g., WebClient) even easier: System.Lazy creates an instance of T on serialization, which is probably more likely to be allowed than a XAML gadget getting through. github.com/codewhitesec...
GitHub - codewhitesec/NewRemotingTricks: New exploitation tricks for hardened .NET Remoting servers
New exploitation tricks for hardened .NET Remoting servers - codewhitesec/NewRemotingTricks
github.com
frycos.bsky.social
Wow, I wrote with an author of a cool VR blog post yesterday. Just asked for some more explanations and maybe references. Tl;dr: he couldn’t explain or elaborate because exactly this part of the blog was written by GPT…
Reposted by Frycos
codewhitesec.bsky.social
We have reproduced "ToolShell", the unauthenticated exploit chain for CVE-2025-49706 + CVE-2025-49704 used by @_l0gg (on X) to pop SharePoint at #Pwn2Own Berlin 2025, it's really just one request! Kudos to @mwulftange.bsky.social
frycos.bsky.social
Oh no, it's a variant of CVE-2024-29974...I accidentally found that a similar vuln affected Zyxel NWA50AX (Pro) and tested against devices (obviously) lacking the latest patches. This CVE was never publicly related to NWA50AX, though. Well, nice nday exercise then.
frycos.bsky.social
B03701066A0F762E75BAA67816EDB223F8681C9444C34E0B768DE518268025A0

Am I on vacation in the mountains? Yes. Do they have network equipment there? Yes. Can I refrain from doing VR? No.

You know the drill: disclosure and blog post planned. 😄
Reposted by Frycos
Reposted by Frycos
halvarflake.bsky.social
If you are in the US and upset at the AfD being subject to more surveillance now:

The bar to be declared "in conflict with the democratic order" is *very* high. It is literally the AfD definition of "Germanness" by your ancestry, declaring ppl of other ancestries inferior, that did it, justifiedly.
Reposted by Frycos
mattjay.com
🧵 THREAD: A federal whistleblower just dropped one of the most disturbing cybersecurity disclosures I’ve ever read.

He's saying DOGE came in, data went out, and Russians started attempting logins with new valid DOGE passwords

Media's coverage wasn't detailed enough so I dug into his testimony:
frycos.bsky.social
That sums up my week's vacation pretty well. And I have to say, I like it.
Reposted by Frycos
stephenfewer.bsky.social
We have just published our AttackerKB @rapid7.com Analysis of CVE-2025-22457, an unauthenticated stack based buffer overflow in Ivanti Connect Secure. Difficult to exploit due to severe character restrictions, we detail our full RCE technique here: attackerkb.com/topics/0ybGQ...
CVE-2025-22457 | AttackerKB
On April 3, 2025, Ivanti published an advisory for CVE-2025-22457, an unauthenticated remote code execution vulnerability due to a stack based buffer overflow.…
attackerkb.com
frycos.bsky.social
This was a pretty cool online course by @voidstarsec I can recommend.
Reposted by Frycos
codewhitesec.bsky.social
Our crew members @mwulftange.bsky.social & @frycos.bsky.social discovered & responsibly disclosed several new RCE gadgets that bypass #Veeam 's blacklist for CVE-2024-40711 & CVE-2025-23120 + further entry points after @sinsinology.bsky.social & @chudypb.bsky.social 's blog. Replace BinaryFormatter!
frycos.bsky.social
If you think code audits are driving you to the brink of insanity, try hardware hacking...
Reposted by Frycos
codewhitesec.bsky.social
Ever wondered how Kurts Maultaschenfabrikle got hacked in 2023? The full story, all technical details, out now ;-) apply-if-you-can.com/walkthrough/...
Walkthrough 2023
apply-if-you-can.com
frycos.bsky.social
This is a very unique, nice and small conference I can recommend. Good networking opportunities. ✌️
smaury.bsky.social
🗣️
tumpicon.org
Hey hackers!
We’ve started sending out the first invites — check your inbox! 👀
Didn’t get one? Take the fast track and submit a talk!