WarthogTK
banner
warthogtk.bsky.social
WarthogTK
@warthogtk.bsky.social
Pentester | Ex MD (Intensivist & Healthcare Simulation) | (Black) Arch Enthusiast |
Infosec - AD - Windows Internals/Maldev enthusiast |
Geopolitics, Defense, Disinformation, Hybrid warfare | DCS, Gaming, Metal
(OU=FR,DC=WORLD,DC=UNIVERSE)
Production-grade Web Application Firewall testing tool. Detects Cloudflare, AWS WAF, Akamai & more. Identifies bypass vectors via URL normalization. Perfect for bug bounty & pentesting.
github.com/theghostshin...
GitHub - theghostshinobi/waf-stressor: Production-grade Web Application Firewall testing tool. Detects Cloudflare, AWS WAF, Akamai & more. Identifies bypass vectors via URL normalization. Perfect for bug bounty & pentesting.
Production-grade Web Application Firewall testing tool. Detects Cloudflare, AWS WAF, Akamai & more. Identifies bypass vectors via URL normalization. Perfect for bug bounty & pentesting. - t...
labs.watchtowr.com
November 17, 2025 at 7:33 PM
When The Impersonation Function Gets Used To Impersonate Users (Fortinet FortiWeb Auth. Bypass CVE-2025-64446) labs.watchtowr.com/when-the-imp...
When The Impersonation Function Gets Used To Impersonate Users (Fortinet FortiWeb Auth. Bypass CVE-2025-64446)
The Internet is ablaze, and once again we all have a front-row seat - a bad person, if you can believe it, is doing a bad thing! The first warning of such behaviour came from the great team at…
labs.watchtowr.com
November 15, 2025 at 8:09 PM
Detecting Jira & Confluence Versions and Mapping Known CVEs fenrisk.com/atlasscan
Detecting Jira & Confluence Versions and Mapping Known CVEs
Detecting Jira & Confluence Versions and Mapping Known CVEs
fenrisk.com
November 13, 2025 at 12:19 PM
Is It CitrixBleed4? Well, No. Is It Good? Also, No. (Citrix NetScaler Memory Leak & RXSS CVE-2025-12101)

labs.watchtowr.com/is-it-citrix...
Is It CitrixBleed4? Well, No. Is It Good? Also, No. (Citrix NetScaler Memory Leak & RXSS CVE-2025-12101)
There’s an elegance to vulnerability research that feels almost poetic - the quiet dance between chaos and control. It’s the art of peeling back the layers of complexity, not to destroy but to…
labs.watchtowr.com
November 12, 2025 at 7:10 PM
You win some, you CheckSum: New Kerberos delegation vulnerability discovered—attackers could impersonate, escalate privileges and stay hidden | Silverfort

www.silverfort.com/blog/you-win...
You win some, you CheckSum: New Kerberos delegation vulnerability discovered—attackers could impersonate, escalate privileges and stay hidden
Technical details for CVE-2025-60704 (CheckSum) to be unveiled at BlackHat EU2025…
www.silverfort.com
November 11, 2025 at 11:06 PM
Look At This Photograph - Passively Downloading Malware Payloads Via Image Caching

malwaretech.com/2025/10/exif...
Look At This Photograph - Passively Downloading Malware Payloads Via Image Caching
Detailing an improved Cache Smuggling technique to turn 3rd party software into passive malware downloader.
malwaretech.com
November 11, 2025 at 7:52 PM
CVE-2025-41253 Using Spring Expression Language To Expose Environment Variables and System Properties – psytester psytester.github.io/CVE-2025-412...
CVE-2025-41253 Using Spring Expression Language To Expose Environment Variables and System Properties
Overview
psytester.github.io
November 10, 2025 at 9:36 PM
Deleting the BCD through COM as low privileged user - Warpnet warpnet.nl/blog/deletin...
Deleting the BCD through COM as low privileged user - Warpnet
CVE-2025-59253: Demonstrating a vulnerability in Windows that leads to a low privileged user being able to delete the boot configuration data (BCD) through COM.
warpnet.nl
November 10, 2025 at 8:44 PM
Critical SQL Injection Vulnerability in Django (CVE-2025-64459) | Blog | Endor Labs

www.endorlabs.com/learn/critic...
Critical SQL Injection Vulnerability in Django (CVE-2025-64459) | Blog | Endor Labs
Critical SQL Injection Vulnerability in Django (CVE-2025-64459). Learn what happened, root cause, impact, and how to mitigate.
www.endorlabs.com
November 10, 2025 at 10:28 AM
Reposted by WarthogTK
Soon, @exegogol & THR ! 💣

Guests ➡️ @_nwodtuhs & @Dramelac_ 🏰
Co-Streamer & Militant Exegol ➡️ @rayanlecat 🥸
November 7, 2025 at 9:19 AM
Introduction - OWASP Top 10:2025 RC1 owasp.org/Top10/2025/0...
Introduction - OWASP Top 10:2025 RC1
OWASP Top 10:2025 RC1
owasp.org
November 7, 2025 at 10:15 PM
Nunjucks - Exploiting Second-Order SSTI

adeadfed.com/posts/nunjuc...
Nunjucks - Exploiting Second-Order SSTI
No AI was used to write this article
adeadfed.com
November 7, 2025 at 8:06 PM
Ghosts in /proc: Manipulation and Timeline Corruption | Group-IB Blog

www.group-ib.com/blog/ghosts-...
https://www.group-ib.com/blog/ghosts-in-proc/
www.group-ib.com
November 7, 2025 at 9:04 AM
Tool Spotlight: TaskHound - r0bit's blog r0bit.io/posts/taskho...
Tool Spotlight: TaskHound - r0bit's blog
[ home | posts | toolshed | whoami ]
r0bit.io
November 7, 2025 at 9:01 AM