Mystiko (@z3r0day0x41) 's Twitter Profile
Mystiko

@z3r0day0x41

Infosec community • Mystikcon • sharing knowledge • doing activities together as a team to learn together • Mystiko.sh • viserion.info

ID: 223262845

calendar_today05-12-2010 21:54:10

5,5K Tweet

1,1K Followers

730 Following

John Hammond (@_johnhammond) 's Twitter Profile Photo

Video showcase of the recent WinRAR 0-day, CVE-2025-8088, uncovered by ESET after threat actor RomCom exploited it in the wild leveraging alternate data streams & path traversal on Windows -- we examine the uncovered RAR file and a proof-of-concept demo! youtu.be/rkMNOC8fhUQ

Video showcase of the recent WinRAR 0-day, CVE-2025-8088, uncovered by ESET after threat actor RomCom exploited it in the wild leveraging alternate data streams & path traversal on Windows -- we examine the uncovered RAR file and a proof-of-concept demo! youtu.be/rkMNOC8fhUQ
LuemmelSec (@theluemmel) 's Twitter Profile Photo

Not again... Citrix, the company that keeps on giving. cyberplace.social/@GossiTheDog/1… If you want to check your systems: github.com/fox-it/citrix-…

Cyber Security News (@the_cyber_news) 's Twitter Profile Photo

🚨 WhatsApp 0-Day Vulnerability Exploited to Hack Mac and iOS Users Read more: cybersecuritynews.com/whatsapp-0-day… A sophisticated attack campaign has leveraged a previously unknown zero-day vulnerability in WhatsApp on Apple devices to target specific users, the company has confirmed.

🚨 WhatsApp 0-Day Vulnerability Exploited to Hack Mac and iOS Users 

Read more: cybersecuritynews.com/whatsapp-0-day…

A sophisticated attack campaign has leveraged a previously unknown zero-day vulnerability in WhatsApp on Apple devices to target specific users, the company has confirmed.
Rich Warren (@buffaloverflow) 's Twitter Profile Photo

Finishing off the week with a writeup of CVE-2025-0309 - Netskope Windows Client LPE This was one of the bugs we demo’d in our DEF CON #ZeroTrustTotalBust talk. Also releasing a NachoVPN plugin and our 🆙skope PoC. Details on the AmberWolf blog: blog.amberwolf.com/blog/2025/augu…

Finishing off the week with a writeup of CVE-2025-0309 - Netskope Windows Client LPE 

This was one of the bugs we demo’d in our DEF CON #ZeroTrustTotalBust talk.

Also releasing a NachoVPN plugin and our 🆙skope PoC. Details on the <a href="/AmberWolfSec/">AmberWolf</a> blog:

blog.amberwolf.com/blog/2025/augu…
Alex (@xaitax) 's Twitter Profile Photo

🔍 Working on something interesting: NTSleuth - a Windows syscall extraction tool with a twist... Would anyone be interested in a tool that: 🎯 Extracts ALL syscalls from Windows (ARM64/x64) 🤖 Auto-resolves function parameters 📊 Found 2,461 syscalls on Win11/ARM64 📝 Outputs

🔍 Working on something interesting: NTSleuth - a Windows syscall extraction tool with a twist...

Would anyone be interested in a tool that:
🎯 Extracts ALL syscalls from Windows (ARM64/x64)
🤖 Auto-resolves function parameters
📊 Found 2,461 syscalls on Win11/ARM64
📝 Outputs
Stephen Sims (@steph3nsims) 's Twitter Profile Photo

Please join me on the next Off By One Security stream with guest Eugene Lim (spaceraccoon | Eugene Lim ) on 4-Sept at 6PM PT for a session on "0-day Hunting Strategy!" This will be a great session for those interested in vulnerability research! Note the time at 6PM PT youtube.com/watch?v=dMt2qy…

Please join me on the next <a href="/offby1security/">Off By One Security</a> stream with guest Eugene Lim (<a href="/spaceraccoonsec/">spaceraccoon | Eugene Lim</a> ) on 4-Sept at 6PM PT for a session on "0-day Hunting Strategy!" This will be a great session for those interested in vulnerability research! Note the time at 6PM PT

youtube.com/watch?v=dMt2qy…
Mr. OS (@ksg93rd) 's Twitter Profile Photo

#AppSec #Red_Team_Tactics 1⃣. Silent Harvest: Extracting Windows Secrets Under the Radar - sud0ru.ghost.io/silent-harvest… // this exploration shows how Windows’ own internals can be leveraged to bypass both access controls and common EDR detections with minimal code 2⃣. Operating

Alex Neff (@al3x_n3ff) 's Twitter Profile Photo

QOL: Introducing NetExec module categories 📚 With NetExec’s rapid growth, the number of modules has increased significantly. To give a clearer overview, I’ve added categories. It’s a “best fit” approach, so not perfect, but should give a better idea of what’s available.

QOL: Introducing NetExec module categories 📚

With NetExec’s rapid growth, the number of modules has increased significantly. To give a clearer overview, I’ve added categories. It’s a “best fit” approach, so not perfect, but should give a better idea of what’s available.
ransomNews (@ransomnews) 's Twitter Profile Photo

⚠️ Trojan in disguise: PDF editor backdoor The “AppSuite PDF Editor” poses as a legit tool but is a backdoor: most of its code supports malware functions, including C2 comms, scheduled tasks, and AES-encrypted data exfiltration. Persistence is full, cleanup needs system repave.

⚠️ Trojan in disguise: PDF editor backdoor

The “AppSuite PDF Editor” poses as a legit tool but is a backdoor: most of its code supports malware functions, including C2 comms, scheduled tasks, and AES-encrypted data exfiltration.

Persistence is full, cleanup needs system repave.
0xor0ne (@0xor0ne) 's Twitter Profile Photo

Bootloader vulnerability and firmware decryption in TP-Link (Tapo) C210 cloud cameras watchfulip.github.io/28-12-24/tp-li… Credits Watchful IP #embedded #infosec

Bootloader vulnerability and firmware decryption in TP-Link (Tapo) C210 cloud cameras

watchfulip.github.io/28-12-24/tp-li…

Credits <a href="/Watchful_IP/">Watchful IP</a>

#embedded #infosec
Denis Laskov 🇮🇱 (@it4sec) 's Twitter Profile Photo

Want to play old arcade games? Grab a broken machine, reverse-engineer it, and emulate it with an FPGA! 🕹️🖥️👾💡🎮 More details on: LinkedIn: linkedin.com/posts/dlaskov_… Substack: it4sec.substack.com/p/want-to-play…

Want to play old arcade games? Grab a broken machine, reverse-engineer it, and emulate it with an FPGA! 🕹️🖥️👾💡🎮

More details on:
LinkedIn: linkedin.com/posts/dlaskov_…
Substack: it4sec.substack.com/p/want-to-play…
PentesterLab (@pentesterlab) 's Twitter Profile Photo

🚀 We just released 3 new labs as part of our Python Code Review Badge! These labs walk you through real vulnerabilities: you’ll spot the issue in the code and then review the patch that fixed it. Start practicing now: pentesterlab.com/badges/python-…

VIEH Group (@viehgroup) 's Twitter Profile Photo

Cloudflare 403 bypass to time-based blind SQLi: PL: (select(0)from(select(sleep(10)))v) → 403 but PL: (select(0)from(select(sleep(6)))v)/*'%2B(select(0)from(select(sleep(6)))v)%2B'%5C"%2B(select(0)from(select(sleep(6)))v) → Time-based Blind SQLi #BugBounty #SQLi

Cloudflare 403 bypass to time-based blind SQLi:
PL: (select(0)from(select(sleep(10)))v) → 403
but PL: (select(0)from(select(sleep(6)))v)/*'%2B(select(0)from(select(sleep(6)))v)%2B'%5C"%2B(select(0)from(select(sleep(6)))v) → Time-based Blind SQLi  
#BugBounty #SQLi
SEKTOR7 Institute (@sektor7net) 's Twitter Profile Photo

Writing exploits for MS-RPC services. An interesting case study of DoS inside Local Session Manager and how an exploit dev process looks like. A great post by Remco van der Meer (incendiumrocks). Source: incendium.rocks/posts/Exploit-… #redteam #blueteam #maldev #malwaredevelopment

Writing exploits for MS-RPC services.

An interesting case study of DoS inside Local Session Manager and how an exploit dev process looks like.

A great post by Remco van der Meer (<a href="/incendiumrockz/">incendiumrocks</a>).

Source: incendium.rocks/posts/Exploit-…

#redteam #blueteam #maldev #malwaredevelopment
International Cyber Digest (@intcyberdigest) 's Twitter Profile Photo

🚨 Very concerning 0-click zero-day vulnerability for sale: allows unauthenticated attackers to execute arbitrary code with SYSTEM-level privileges on fully patched Windows 10/11 and Windows Server 2022 systems. The exploit is “reliable, low-resource, and bypasses the latest

sn🥶vvcr💥sh (@snovvcrash) 's Twitter Profile Photo

Oh, that's nice! I've done something similar recently with a vibe coded HTTP proxy server run in context of the target user to access the needed web resource behind domain authentication instead of an LDAP relay 😁

Oh, that's nice! I've done something similar recently with a vibe coded HTTP proxy server run in context of the target user to access the needed web resource behind domain authentication instead of an LDAP relay 😁
Kirill Firsov (@k_firsov) 's Twitter Profile Photo

How to access servers behind Cloudflare by bypassing the firewall? FearsOff Cybersecurity #bugbountytips #cloudflare #firewall #bypass 1) Found a sweet hostname but Cloudflare Firewall blocks you? There's a neat trick attackers can use if the origin is misconfigured.

How to access servers behind Cloudflare by bypassing the firewall?
<a href="/FearsOff/">FearsOff Cybersecurity</a> #bugbountytips #cloudflare #firewall #bypass

1) Found a sweet hostname but Cloudflare Firewall blocks you? There's a neat trick attackers can use if the origin is misconfigured.