WarthogTK
banner
warthogtk.bsky.social
WarthogTK
@warthogtk.bsky.social
Pentester | Ex MD (Intensivist & Healthcare Simulation) | (Black) Arch Enthusiast |
Infosec - AD - Windows Internals/Maldev enthusiast |
Geopolitics, Defense, Disinformation, Hybrid warfare | DCS, Gaming, Metal
(OU=FR,DC=WORLD,DC=UNIVERSE)
Mythic for Developers - Tips and tricks for creating or customizing agents and anything else related to Mythic C2.
youtube.com/playlist?lis...
GitHub - Scoubi/BloodSOCer
Contribute to Scoubi/BloodSOCer development by creating an account on GitHub.
www.youtube.com
December 3, 2025 at 7:28 AM
GitHub - Scoubi/BloodSOCer github.com/Scoubi/Blood...
GitHub - Scoubi/BloodSOCer
Contribute to Scoubi/BloodSOCer development by creating an account on GitHub.
github.com
December 2, 2025 at 10:03 PM
Cache Poisoning: $100K+ Case Studies Part 1 | Herish Blog herish.me/blog/cache-p...
Cache Poisoning: $100K+ Case Studies Part 1 | Herish Blog
Dive into $100K+ cache poisoning vulnerabilities. Part 1 covers real-world attacks on HackerOne, GitHub, and Shopify. Read the analysis!
herish.me
December 2, 2025 at 9:46 PM
OpenAI Codex CLI Vulnerability: Command Injection research.checkpoint.com/2025/openai-...
OpenAI Codex CLI Vulnerability: Command Injection
Codex CLI automatically loads and execute MCP entries withoug
research.checkpoint.com
December 2, 2025 at 9:46 PM
K7 Antivirus: Named pipe abuse, registry manipulation and privilege escalation

blog.quarkslab.com/k7-antivirus...
K7 Antivirus: Named pipe abuse, registry manipulation and privilege escalation - Quarkslab's blog
Exploitation of the K7 antivirus, from the vulnerability discovery to the retro-analysis of its key components.
blog.quarkslab.com
December 2, 2025 at 7:30 PM
From Zero to SYSTEM: Building PrintSpoofer from Scratch
From Zero to SYSTEM: Building PrintSpoofer from Scratch
A complete journey from understanding Named Pipes to building an undetectable PrintSpoofer learning Windows internals, token impersonation, RPC, and evasion techniques along the way.
bl4ckarch.github.io
December 2, 2025 at 6:32 PM
Le Collimateur
Appréhender la menace russe, de l'Ukraine au retour du service militaire [Le Casque et la plume #16]
youtu.be/dJFaCQhgnrY?...
Appréhender la menace russe, de l'Ukraine au retour du service militaire [Le Casque et la plume #16]
YouTube video by Le Collimateur
youtu.be
December 2, 2025 at 12:29 PM
3 Recent OAuth TTPs + How to Detect Them with Entra ID Logs | Wiz Blog www.wiz.io/blog/recent-...
3 Recent OAuth TTPs + How to Detect Them with Entra ID Logs | Wiz Blog
Attackers abuse OAuth flows like device code phishing and ROPC to bypass MFA and gain persistence in Azure. Here's how to detect them with Entra ID logs.
www.wiz.io
November 29, 2025 at 8:43 PM
The Trojan Horse You Didn’t Check: PHP Session Unserialization as an Attack Vector

d3caff.gitbook.io/me/blog-post...
The Trojan Horse You Didn’t Check: PHP Session Unserialization as an Attack Vector | d3caff
File uploads are often considered a risky surface in web applications. To reduce this risk, developers apply restrictions to allow only specific file types, most often images and documents. The goal…
www.cisa.gov
November 29, 2025 at 8:29 PM
​​Spyware Allows Cyber Threat Actors to Target Users of Messaging Applications​
www.cisa.gov/news-events/...
How to Research & Reverse Web Vulnerabilities 101 — ProjectDiscovery Blog
Introduction This blog serves as a detailed methodology guide for analyzing, reversing, and researching web vulnerabilities, particularly those with CVEs assigned. The content outlines repeatable…
www.cisa.gov
November 29, 2025 at 8:22 AM
Write Path Traversal to a RCE Art Department
lab.ctbb.show/research/wri...
Write Path Traversal to a RCE Art Department
Abusing Write Path Traversal for Living Off the Land Remote Code Execution
lab.ctbb.show
November 28, 2025 at 7:58 PM
An updated, curated collection of Hashcat rules for cracking complex passwords.
github.com/ibnaleem/rules
GitHub - ibnaleem/rules: Lastest Hashcat rules for password cracking
Lastest Hashcat rules for password cracking. Contribute to ibnaleem/rules development by creating an account on GitHub.
github.com
November 28, 2025 at 7:31 PM
Reposted by WarthogTK
Cession à LVMH du groupe de presse Croque Futur : face aux craintes sociales, éthiques et éditoriales, les syndicats de journalistes apportent leur SOUTIEN aux rédactions de La Recherche, de Science et Avenir, et du magazine économique Challenges

COMMUNIQUÉ INTERSYNDICAL ⬇️
snj.fr/soutien-aux-...
November 27, 2025 at 3:34 PM
Promotion de Zemmour, temps de parole contourné… «Complément d’enquête» démonte les méthodes de CNews
www.liberation.fr/economie/med...

www.france.tv/france-2/com...
Promotion de Zemmour, temps de parole contourné… «Complément d’enquête» démonte les méthodes de CNews
«Libération» a visionné, avant sa diffusion, le documentaire programmé par France 2 jeudi 27 novembre, en pleine bataille entre les médias du service public et ceux de Vincent Bolloré.
www.liberation.fr
November 28, 2025 at 9:06 AM
RCE via a malicious SVG in mPDF

medium.com/@brun0ne/rce...
RCE via a malicious SVG in mPDF
Bypassing a PHP stream wrapper blacklist
medium.com
November 26, 2025 at 7:50 PM
Remotely crashing the Spooler service
www.incendium.rocks/posts/Remote...
Remotely crashing the Spooler service
Showcasing a vulnerability in Windows that causes the Spooler service to crash remotely.
www.incendium.rocks
November 23, 2025 at 8:53 AM
SCCM’s AdminService uses Entra tokens without confirming the UPN exists in AD. A crafted synced UPN can let an attacker impersonate the site server. Microsoft now requires on-prem SID matching (CVE-2025-59501).

specterops.io/blog/2025/11...

github.com/garrettfoste...
GitHub - garrettfoster13/CVE-2025-59501: CVE-2025-59501 POC code
CVE-2025-59501 POC code. Contribute to garrettfoster13/CVE-2025-59501 development by creating an account on GitHub.
github.com
November 22, 2025 at 7:54 PM