WarthogTK
banner
warthogtk.bsky.social
WarthogTK
@warthogtk.bsky.social
Pentester | Ex MD (Intensivist & Healthcare Simulation) | (Black) Arch Enthusiast |
Infosec - AD - Windows Internals/Maldev enthusiast |
Geopolitics, Defense, Disinformation, Hybrid warfare | DCS, Gaming, Metal
(OU=FR,DC=WORLD,DC=UNIVERSE)
The Next Frontier of Runtime Assembly Attacks: Leveraging LLMs to Generate Phishing JavaScript in Real Time

unit42.paloaltonetworks.com/real-time-ma...
The Next Frontier of Runtime Assembly Attacks: Leveraging LLMs to Generate Phishing JavaScript in Real Time
We discuss a novel AI-augmented attack method where malicious webpages use LLM services to generate dynamic code in real-time within a browser.
unit42.paloaltonetworks.com
January 22, 2026 at 9:41 PM
Adventures in Primary Group Behavior, Reporting, and Exploitation

trustedsec.com/blog/adventu...
Adventures in Primary Group Behavior, Reporting, and Exploitation
Our custom solutions are tailored to address the unique challenges of different roles in security.
trustedsec.com
January 22, 2026 at 9:37 PM
Sansec - Claude finds 353 zero-days on Packagist
sansec.io/research/cla...
Claude finds 353 zero-days on Packagist
We built an AI-powered security pipeline to audit popular ecommerce extensions on Packagist. The vulnerabilities we found range from password leaks to full r...
sansec.io
January 22, 2026 at 7:15 PM
Use this as GetTGT.py or GetST.py in Kerberos Armoring hardened domains (MS-KILE a.k.a FAST (Flexible Authentication Secure Tunneling)

github.com/monsieurPale...
GitHub - monsieurPale/BreakFAST: Proof of concept for Kerberos Armoring abuse.
Proof of concept for Kerberos Armoring abuse. . Contribute to monsieurPale/BreakFAST development by creating an account on GitHub.
github.com
January 21, 2026 at 8:08 PM
Coding Agents. The Insider Threat You Installed Yourself
blog.securitybreak.io/coding-agent...
Coding Agents. The Insider Threat You Installed Yourself
Stop Running AI Coding Assistants Blindly
blog.securitybreak.io
January 19, 2026 at 7:57 AM
CVE-2026-20965: Token Validation Flaw that Leads to Tenant-Wide RCE in Azure Windows Admin Center

cymulate.com/blog/cve-202...
Using NTLM Reflection to Own Active Directory (CVE-2025-33073) | Depth Security
The goal I’d like to achieve with this blog is to inform attackers and defenders alike that this issue is far more serious than it was given credit for, and the exploitation primitives are not as…
cymulate.com
January 17, 2026 at 8:25 PM
WhisperPair
Hijacking Bluetooth Accessories
Using Google Fast Pair
whisperpair.eu
WhisperPair: Hijacking Bluetooth Accessories Using Google Fast Pair
WhisperPair is a family of practical attacks leveraging a flaw in the Google Fast Pair implementation on flagship audio accessories.
whisperpair.eu
January 16, 2026 at 7:36 PM
Multiple XSS in Meta Conversion API Gateway Leading to Zero-Click Account Takeover

ysamm.com/uncategorize...
Multiple XSS in Meta Conversion API Gateway Leading to Zero-Click Account Takeover
Introduction
ysamm.com
January 15, 2026 at 1:37 PM
Free Converter Software – Convert Any System from Clean to Infected in Seconds - Nextron Systems
www.nextron-systems.com/2026/01/14/f...
Free Converter Software – Convert Any System from Clean to Infected in Seconds - Nextron Systems
Malicious Google Ads push fake “file converters” that install persistent RATs. Learn detection anchors and how THOR speeds up hunting.
www.nextron-systems.com
January 14, 2026 at 7:40 PM
Impacket Developer Guide.
Part 1 RPC Deep Dive
cicada-8.medium.com/impacket-dev...

Part 2 Finding RPC on the system and some words about (in)security
cicada-8.medium.com/impacket-dev...

Part 3 Make your own Lateral Movement
cicada-8.medium.com/impacket-dev...

PoC github.com/CICADA8-Rese...
GitHub - CICADA8-Research/RpcMotion: Execute commands, in/exfiltrate files using your custom RPC Server
Execute commands, in/exfiltrate files using your custom RPC Server - CICADA8-Research/RpcMotion
github.com
January 14, 2026 at 12:05 PM
Impacket Developer Guide. Part 3. Make your own Lateral Movement

cicada-8.medium.com/impacket-dev...
Impacket Developer Guide. Part 3. Make your own Lateral Movement
Create your own LM tool using impacket!
cicada-8.medium.com
January 14, 2026 at 11:58 AM
ScrappyDoo
Opengraph-Compatible JSON Generator for BloodHound

github.com/c0rdyc3ps/Sc...
GitHub - c0rdyc3ps/ScrappyDoo: Opengraph-Compatible JSON Generator for BloodHound
Opengraph-Compatible JSON Generator for BloodHound - c0rdyc3ps/ScrappyDoo
github.com
January 13, 2026 at 10:55 AM
PatchGuard Peekaboo: Hiding Processes on Systems with PatchGuard in 2026 | Outflank www.outflank.nl/blog/2026/01...
PatchGuard Peekaboo: Hiding Processes on Systems with PatchGuard in 2026 | Outflank
Documenting kernel-level process hiding techniques on Windows 11 with HVCI enabled. Journey from failed inline hooks to successful data-based bypasses.
www.outflank.nl
January 13, 2026 at 10:37 AM
A TUI for Active Directory collection with the goal to be faster, less noisy, and more customizable
github.com/Macmod/flash...
GitHub - Macmod/flashingestor: A TUI for Active Directory collection.
A TUI for Active Directory collection. Contribute to Macmod/flashingestor development by creating an account on GitHub.
github.com
January 13, 2026 at 10:23 AM
A high-speed covert tunnel that disguises TCP traffic as SMTP email communication to bypass Deep Packet Inspection (DPI) firewalls.
github.com/x011/smtp-tu...
GitHub - x011/smtp-tunnel-proxy: A high-speed covert tunnel that disguises TCP traffic as SMTP email communication to bypass Deep Packet Inspection (DPI) firewalls.
A high-speed covert tunnel that disguises TCP traffic as SMTP email communication to bypass Deep Packet Inspection (DPI) firewalls. - x011/smtp-tunnel-proxy
github.com
January 12, 2026 at 12:44 PM
owasp-noir
Hunt every Endpoint in your code, expose Shadow APIs, map the Attack Surface.
github.com/owasp-noir/n...
GitHub - owasp-noir/noir: Hunt every Endpoint in your code, expose Shadow APIs, map the Attack Surface.
Hunt every Endpoint in your code, expose Shadow APIs, map the Attack Surface. - owasp-noir/noir
github.com
January 9, 2026 at 10:06 PM
Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection
github.com/hackerschoic...
GitHub - hackerschoice/memexec: Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection
Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection - hackerschoice/memexec
github.com
January 9, 2026 at 10:04 PM