Gray Hats Profile Banner
Gray Hats Profile
Gray Hats

@the_yellow_fall

Followers
6,242
Following
353
Media
1,685
Statuses
72,705

Welcome to the Cybersecurity News site, your trusted source for cybersecurity news and insights since 2017!

Vnorovy, Česká republika
Joined January 2011
Don't wanna be here? Send us removal request.
Explore trending content on Musk Viewer
@the_yellow_fall
Gray Hats
8 months
PoC Released for SharePoint Pre-Auth RCE Chain (CVE-2023-29357 & CVE-2023-24955) It can be exploited to achieve unauthenticated remote code execution
Tweet media one
4
159
476
@the_yellow_fall
Gray Hats
9 months
retoolkit 2023.10 releases: Reverse Engineer's Toolkit #opensource #infosec #security #pentesting
Tweet media one
3
121
449
@the_yellow_fall
Gray Hats
9 months
PoC Exploit for Windows NTLM Privilege Escalation Flaw (CVE-2023-21746) Published HTTP/WebDAV scenario is currently unpatched #opensource #pentesting #infosec #security
Tweet media one
1
103
361
@the_yellow_fall
Gray Hats
9 months
Uscrapper: powerful OSINT webscraper for personal data collection #OSINT
Tweet media one
3
80
348
@the_yellow_fall
Gray Hats
9 months
CVE-2023-31102: 7-Zip Remote Code Execution Vulnerability #opensource #pentesting #infosec #security #vulnerability
Tweet media one
6
94
347
@the_yellow_fall
Gray Hats
7 months
CVE-2023-51385: OpenSSH OS command injection vulnerability The vulnerability is tracked under the CVE identifier CVE-2023-51385 (CVSS score: 9.8). It impacts all versions of OpenSSH before 9.6p1.
4
120
297
@the_yellow_fall
Gray Hats
9 months
CVE-2023-46850: OpenVPN Access Server Flaw Exposes Sensitive Data, RCE Possible #opensource #pentesting #infosec #security #vulnerability #OpenVPN #VPN
Tweet media one
1
68
228
@the_yellow_fall
Gray Hats
9 months
WAF Bypass Tool v2.0 releases: open source tool to analyze the security of any WAF #opensource #pentesting #infosec #security
Tweet media one
2
45
201
@the_yellow_fall
Gray Hats
7 months
PingRAT: secretly passes C2 traffic through firewalls using ICMP payloads Features: + Uses ICMP for Command and Control + Undetectable by most AV/EDR solutions + Written in Go
Tweet media one
0
66
176
@the_yellow_fall
Gray Hats
10 months
CVE-2023-45648 & CVE-2023-42795: Two high severity flaws in Apache Tomcat #opensource #infosec #security #pentesting
Tweet media one
0
51
169
@the_yellow_fall
Gray Hats
4 years
GhostShell: bypass the AVs, VMs, and Sandboxes #opensource #infosec #security #pentest
0
44
133
@the_yellow_fall
Gray Hats
9 months
Tweet media one
0
39
123
@the_yellow_fall
Gray Hats
7 months
Amnesiac is a post-exploitation framework designed to assist with lateral movement within active directory environments.
Tweet media one
1
34
115
@the_yellow_fall
Gray Hats
8 months
Chimera v1.0 releases This tool has been tested and shown to be effective at bypassing EDR/AV products and executing arbitrary code on a target system.
Tweet media one
0
45
107
@the_yellow_fall
Gray Hats
7 months
CVE-2023-32434 Exploited: PoC Unlocks Full Command of iOS Devices Proof-of-concept (PoC) code has been released for a zero-day iOS vulnerability (CVE-2023-32434) that can be chained to take full control of a mobile device
Tweet media one
0
41
93
@the_yellow_fall
Gray Hats
10 months
DavRelayUp: A universal no-fix local privilege escalation in domain-joined Windows workstations #opensource #infosec #security #pentesting
Tweet media one
0
28
86
@the_yellow_fall
Gray Hats
6 months
Popeye is a utility that scans live Kubernetes clusters and reports potential issues with deployed resources and configurations. It sanitizes your cluster based on what's deployed and not what's sitting on the disk.
Tweet media one
0
12
52
@the_yellow_fall
Gray Hats
6 months
CVE-2024-22860 & CVE-2024-22862 expose FFmpeg to RCE attacks due to integer overflow vulnerabilities. These vulnerabilities, present in the JPEG XL Animation decoder & the JPEG XL Parser, could allow attackers to execute arbitrary code on affected systems
2
16
51
@the_yellow_fall
Gray Hats
7 months
403-bypass: comprehensive suite of Bash scripts for probing 403 bypasses in web security Whether you're a beginner or an expert, this tool will help you discover new ways to bypass 403 errors and access restricted resources.
Tweet media one
0
18
49
@the_yellow_fall
Gray Hats
7 months
Stinger is a "UAC bypass that obtains the token from an auto-elevated process, modifies it, and reuses it to execute as administrator" This technique to steal a privileged token and elevate a thread also works on Windows 11
Tweet media one
0
18
50
@the_yellow_fall
Gray Hats
5 years
HRShell v1.3 releases: HTTPS/HTTP reverse shell built with flask with advanced features #opensource #infosec #security #pentest
0
18
48
@the_yellow_fall
Gray Hats
9 months
Microsoft Exchange Server RCE (CVE-2023-36745) Flaw Gets PoC Exploit #infosec #security #pentesting
Tweet media one
2
10
43
@the_yellow_fall
Gray Hats
7 months
Details and proof-of-concept (PoC) exploit code have emerged about a high-severity security flaw, CVE-2024-20656, in Microsoft Visual Studio that could be abused by a threat actor to gain elevated privileges on affected systems.
0
13
41
@the_yellow_fall
Gray Hats
6 years
Exploiting PUT method for uploading WebShell #opensource #infosec #infosecurity #Security #pentest
0
18
38
@the_yellow_fall
Gray Hats
7 months
Jomungand: Shellcode Loader with memory evasion VirtualAlloc: CobaltStrike & Meterprter is reflective dll as shellcode, with the VirtualAlloc hook we can obtain the real address of shellcode in memory
Tweet media one
0
22
37
@the_yellow_fall
Gray Hats
7 years
NetRipper v1.1: Smart traffic sniffing for penetration testers
0
23
36
@the_yellow_fall
Gray Hats
6 months
This method utilizes TLS callbacks to execute a payload without spawning any threads in a remote process. This method is inspired by Threadless Injection as RemoteTLSCallbackInjection does not invoke any API calls to trigger the injected payload.
0
13
34
@the_yellow_fall
Gray Hats
9 months
LogonTracer v1.6.1 releases: Investigate malicious Windows logon by visualizing & analyzing Windows event log #opensource #pentesting #infosec #security #eventlog #Windows
Tweet media one
0
10
35
@the_yellow_fall
Gray Hats
7 months
Proof-of-concept (PoC) exploit code has been made available for a recently disclosed flaw, CVE-2023-50226 (CVSS 7.8), impacting Parallels Desktop.
Tweet media one
0
8
34
@the_yellow_fall
Gray Hats
6 months
Node.js, the popular JavaScript runtime environment used by millions of developers worldwide, has issued security updates targeting multiple high-severity vulnerabilities 4 high severity issues: CVE-2024-22017 CVE-2024-21896 CVE-2024-22019 CVE-2024-21892
0
16
33
@the_yellow_fall
Gray Hats
6 months
Motivated and inspired by some classic and modern tools and techniques, InflativeLoading is a tool that can dynamically convert a native EXE to a PIC shellcode. In short, InflativeLoading generates and appends a shellcode stub to a dumped PE main module
0
10
31
@the_yellow_fall
Gray Hats
7 months
AntiVirus REDucer for AntiVirus REDteaming. Avred is being used to identify which parts of a file are identified by an Antivirus and tries to show as much possible information and context about each match.
0
12
32
@the_yellow_fall
Gray Hats
7 months
CVE-2023-51385 (CVSS 9.8) and CVE-2023-6004 (CVSS 3.9) - A Dual OpenSSH Threat In SSH in OpenSSH before 9.6, OS command injection might occur. The technical details and PoC were published.
Tweet media one
0
11
29
@the_yellow_fall
Gray Hats
6 months
These vulnerabilities tracked as CVE-2024-23108 and CVE-2024-23109 (CVSS 10) could potentially allow remote, unauthenticated attackers to execute unauthorized commands through specially crafted API requests #Fortinet #FortiSIEM
0
9
30
@the_yellow_fall
Gray Hats
6 years
MeterSSH: Bypassing IDS Firewall using Meterpreter over SSH #opensource #infosec #infosecurity #Security #pentest
0
23
28
@the_yellow_fall
Gray Hats
5 months
An independent security researcher has published details and proof-of-concept (PoC) code for a macOS vulnerability (CVE-2023-42942) that could be exploited for root privilege escalation.
0
13
28
@the_yellow_fall
Gray Hats
5 years
IPv6teal: Stealthy data exfiltration via IPv6 covert channel #opensource #infosec #Security #pentest
0
12
28
@the_yellow_fall
Gray Hats
6 months
A critical zero-click vulnerability, CVE-2023-7028 (rated CVSS 10.0) has been discovered by researchers in over 5,300 instances of GitLab accessible from the internet.
0
6
28
@the_yellow_fall
Gray Hats
6 months
LOLSpoof is an interactive shell program that automatically spoofs the command line arguments of the spawned process. Call your incriminate-looking command line LOLBin and LOLSpoof will ensure that the process creation telemetry appears legitimate & clear
0
6
26
@the_yellow_fall
Gray Hats
7 months
LinikatzV2 is a bash script based on the Linikatz tool developed by a time machine. It allows post-exploitation tasks on UNIX computers joined to Active Directory, using various methods for credential mining.
0
4
28
@the_yellow_fall
Gray Hats
7 years
[0-day] RCE Exploit for Google Chrome latest version 59.0.3071.115
0
41
27
@the_yellow_fall
Gray Hats
9 months
nopowershell v1.25 releases: PowerShell rebuilt in C# for Red Teaming purposes #opensource #pentesting #infosec #security
Tweet media one
0
6
26
@the_yellow_fall
Gray Hats
6 years
WebApp Penetration Testing: Local File Inclusion (LFI) #opensource #infosec #infosecurity #Security #pentest
0
11
25
@the_yellow_fall
Gray Hats
7 years
DirtyCow Exploit Available for Metasploit !
1
17
27
@the_yellow_fall
Gray Hats
7 months
CVE-2023-35636 is a security vulnerability found in Microsoft Outlook, specifically in the calendar sharing function. This exploit enables attackers to intercept NTLM v2 hashes, which are used for authentication in Microsoft Windows systems.
0
9
26
@the_yellow_fall
Gray Hats
6 years
Github-Hunter: sensitive information searching on Github #opensource #infosec #Security #pentest
0
12
24
@the_yellow_fall
Gray Hats
6 years
XSRFProbe v1.1 releases: CSRF Scanner Equipped with Powerful Crawling Engine & Intelligent Token Generator #opensource #infosec #Security #pentest
0
14
25
@the_yellow_fall
Gray Hats
7 months
Advanced Tool for persistence in Linux Features + Auto Generate SSH keypair for all users + Privileged user & SUID bash + LKM Rootkit Modified, Bypassing rkhunter & chkrootkit + More...
0
14
25
@the_yellow_fall
Gray Hats
6 months
NGINX, the workhorse web server behind countless high-traffic websites, has released an urgent patch (version 1.25.4) to address two critical vulnerabilities (CVE-2024-24989, CVE-2024-24990) lurking within its experimental HTTP/3 implementation
2
7
25
@the_yellow_fall
Gray Hats
5 years
cutter v1.8.2 released: Qt and C++ GUI for radare2 reverse engineering framework #opensource #infosec #Security #pentest
0
12
25
@the_yellow_fall
Gray Hats
9 months
Merlin v2.0 releases: cross-platform post-exploitation HTTP/2 Command & Control server and agent #opensource #pentesting #infosec #security
Tweet media one
0
10
25
@the_yellow_fall
Gray Hats
9 months
BackBox Linux 8.1 Sara releases: Penetration Testing distribution #opensource #pentesting #infosec #security #Linux
Tweet media one
0
5
24
@the_yellow_fall
Gray Hats
5 years
ngrev: Tool for reverse engineering of Angular applications #opensource #infosec #security #pentest
0
6
24
@the_yellow_fall
Gray Hats
8 months
scan4all v2.8.8 releases: Vulnerabilities Scan: 15000+PoCs; 7000+Web fingerprints Vulnerabilities Scan: 15000+PoCs; 20 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules Port scanning;
0
4
23
@the_yellow_fall
Gray Hats
6 months
A researcher has published a proof-of-concept (PoC) tool for a kernel vulnerability, CVE-2024-23208 remedied in iOS 17.3 that allows an app may be able to execute arbitrary code with kernel privileges.
1
6
24
@the_yellow_fall
Gray Hats
7 years
[Windows7/8/10/Server] CVE-2017-0213: Windows COM Privilege Escalation Vulnerability
0
12
23