WarthogTK
banner
warthogtk.bsky.social
WarthogTK
@warthogtk.bsky.social
Pentester | Ex MD (Intensivist & Healthcare Simulation) | (Black) Arch Enthusiast |
Infosec - AD - Windows Internals/Maldev enthusiast |
Geopolitics, Defense, Disinformation, Hybrid warfare | DCS, Gaming, Metal
(OU=FR,DC=WORLD,DC=UNIVERSE)
Is It CitrixBleed4? Well, No. Is It Good? Also, No. (Citrix NetScaler Memory Leak & RXSS CVE-2025-12101)

labs.watchtowr.com/is-it-citrix...
Is It CitrixBleed4? Well, No. Is It Good? Also, No. (Citrix NetScaler Memory Leak & RXSS CVE-2025-12101)
There’s an elegance to vulnerability research that feels almost poetic - the quiet dance between chaos and control. It’s the art of peeling back the layers of complexity, not to destroy but to…
labs.watchtowr.com
November 12, 2025 at 7:10 PM
You win some, you CheckSum: New Kerberos delegation vulnerability discovered—attackers could impersonate, escalate privileges and stay hidden | Silverfort

www.silverfort.com/blog/you-win...
You win some, you CheckSum: New Kerberos delegation vulnerability discovered—attackers could impersonate, escalate privileges and stay hidden
Technical details for CVE-2025-60704 (CheckSum) to be unveiled at BlackHat EU2025…
www.silverfort.com
November 11, 2025 at 11:06 PM
Look At This Photograph - Passively Downloading Malware Payloads Via Image Caching

malwaretech.com/2025/10/exif...
Look At This Photograph - Passively Downloading Malware Payloads Via Image Caching
Detailing an improved Cache Smuggling technique to turn 3rd party software into passive malware downloader.
malwaretech.com
November 11, 2025 at 7:52 PM
CVE-2025-41253 Using Spring Expression Language To Expose Environment Variables and System Properties – psytester psytester.github.io/CVE-2025-412...
CVE-2025-41253 Using Spring Expression Language To Expose Environment Variables and System Properties
Overview
psytester.github.io
November 10, 2025 at 9:36 PM
Deleting the BCD through COM as low privileged user - Warpnet warpnet.nl/blog/deletin...
Deleting the BCD through COM as low privileged user - Warpnet
CVE-2025-59253: Demonstrating a vulnerability in Windows that leads to a low privileged user being able to delete the boot configuration data (BCD) through COM.
warpnet.nl
November 10, 2025 at 8:44 PM
Critical SQL Injection Vulnerability in Django (CVE-2025-64459) | Blog | Endor Labs

www.endorlabs.com/learn/critic...
Critical SQL Injection Vulnerability in Django (CVE-2025-64459) | Blog | Endor Labs
Critical SQL Injection Vulnerability in Django (CVE-2025-64459). Learn what happened, root cause, impact, and how to mitigate.
www.endorlabs.com
November 10, 2025 at 10:28 AM
Reposted by WarthogTK
Soon, @exegogol & THR ! 💣

Guests ➡️ @_nwodtuhs & @Dramelac_ 🏰
Co-Streamer & Militant Exegol ➡️ @rayanlecat 🥸
November 7, 2025 at 9:19 AM
Introduction - OWASP Top 10:2025 RC1 owasp.org/Top10/2025/0...
Introduction - OWASP Top 10:2025 RC1
OWASP Top 10:2025 RC1
owasp.org
November 7, 2025 at 10:15 PM
Nunjucks - Exploiting Second-Order SSTI

adeadfed.com/posts/nunjuc...
Nunjucks - Exploiting Second-Order SSTI
No AI was used to write this article
adeadfed.com
November 7, 2025 at 8:06 PM
Ghosts in /proc: Manipulation and Timeline Corruption | Group-IB Blog

www.group-ib.com/blog/ghosts-...
https://www.group-ib.com/blog/ghosts-in-proc/
www.group-ib.com
November 7, 2025 at 9:04 AM
Tool Spotlight: TaskHound - r0bit's blog r0bit.io/posts/taskho...
Tool Spotlight: TaskHound - r0bit's blog
[ home | posts | toolshed | whoami ]
r0bit.io
November 7, 2025 at 9:01 AM
gopengraph
A Go library to create BloodHound OpenGraphs easily
github.com/TheManticore... by @podalirius.bsky.social
GitHub - TheManticoreProject/gopengraph: A Go library to create BloodHound OpenGraphs easily
A Go library to create BloodHound OpenGraphs easily - TheManticoreProject/gopengraph
github.com
November 6, 2025 at 7:01 AM
Reposted by WarthogTK
“We should have banned government use of face recognition when we had the chance because it is dangerous, invasive, and an inherent threat to civil liberties,” EFF’s @MGuariglia.bsky.social told @404Media.co. www.404media.co/ice-and-cbp...
ICE and CBP Agents Are Scanning Peoples’ Faces on the Street To Verify Citizenship
Videos on social media show officers from ICE and CBP using facial recognition technology on people in the field. One expert described the practice as “pure dystopian creep.”
www.404media.co
October 29, 2025 at 8:03 PM
Hack-cessibility: When DLL Hijacks Meet Windows Helpers

trustedsec.com/blog/hack-ce...
Hack-cessibility: When DLL Hijacks Meet Windows Helpers
Our custom solutions are tailored to address the unique challenges of different roles in security.
trustedsec.com
November 5, 2025 at 10:05 PM
Creating a "Two-Face" Rust binary on Linux
www.synacktiv.com/en/publicati...
Creating a "Two-Face" Rust binary on Linux
Creating a "Two-Face" Rust binary on Linux
www.synacktiv.com
November 5, 2025 at 10:04 PM
C# tool for requesting certificates from ADCS using DCOM over SMB. This allows you to remotely request X.509 certificates from CA server using the MS-WCCE protocol over DCOM and It bypasses the traditional endpoint mapper requirement by using SMB directly.
github.com/7hePr0fess0r...
GitHub - 7hePr0fess0r/ADCSDevilCOM: A C# tool for requesting certificates from ADCS using DCOM over SMB. This tool allows you to remotely request X.509 certificates from CA server using the MS-WCCE protocol over DCOM and It bypasses the traditional endpoint mapper requirement by using SMB directly.
A C# tool for requesting certificates from ADCS using DCOM over SMB. This tool allows you to remotely request X.509 certificates from CA server using the MS-WCCE protocol over DCOM and It bypasses ...
github.com
November 5, 2025 at 9:15 PM