My writeup for "Polygraph" of #FCSC @anssi-fr.bsky.social CTF 2025 v1k1ngfr.github.io/fcsc-2k25-wu...
My writeup for "Polygraph" of #FCSC @anssi-fr.bsky.social CTF 2025 v1k1ngfr.github.io/fcsc-2k25-wu...
Screenshot showing the output of the proof-of-concept tool "SMAStorageDump", where ACCs are dully decrypted.
π New blog post!
"Offline Extraction of Symantec Account Connectivity Credentials (ACCs)"
Following my previous post on the subject, here is how to extract ACCs purely offline.
π itm4n.github.io/offline-extr...
#redteam #pentesting
My writeup for "Samurai" of @MidnightFlag CTF 2025
v1k1ngfr.github.io/midnight-fla...
This blog post brings automated Windows RPC research to the next level! π₯
www.incendium.rocks/posts/Automa...
The writing quality is also excellent. π
#windows #research
Pwn2Own Berlin 2025 comes to a close. We awarded $1,078,750 for 28 unique 0-days. Congrats to STAR Labs SG for winning Master of Pwn with $320,000. Thanks to @offensivecon.bsky.social for hosting, and thanks to all who participated. Can't wait to see you next year! #Pwn2Own #P2OBerlin
I need time to write a proper skeet for this monster post but if youβre the type to trust me - this is a great read sensepost.com/blog/2025/in...
2025 agenda is out!
www.offensivecon.org/agenda/2025....
Attacks against AD CS are de rigueur these days, but sometimes a working attack doesnβt work somewhere else, and the inscrutable error messages are no help. Jacques replicated the most infuriating and explains whatβs happening under the hood in this post: sensepost.com/blog/2025/di...
"SuperFetchQuery" can be useful for some scenarios like Red Team, Exploit Dev or Maldev. Letβs take a look !
v1k1ngfr.github.io/superfetchqu...