frycos (@frycos) 's Twitter Profile
frycos

@frycos

Private account! Red teamer @codewhitesec. @[email protected] @frycos.bsky.social

ID: 991384637841735681

linkhttps://github.com/Frycos calendar_today01-05-2018 18:31:31

3,3K Tweet

3,3K Followers

514 Following

CVE (@cvenew) 's Twitter Profile Photo

CVE-2025-34489 GFI MailEssentials prior to version 21.8 is vulnerable to a local privilege escalation issue. A local attacker can escalate to NT Authority/SYSTEM by sending a crafte… cve.org/CVERecord?id=C…

CVE (@cvenew) 's Twitter Profile Photo

CVE-2025-34490 GFI MailEssentials prior to version 21.8 is vulnerable to an XML External Entity (XXE) issue. An authenticated and remote attacker can send crafted HTTP requests to r… cve.org/CVERecord?id=C…

CVE (@cvenew) 's Twitter Profile Photo

CVE-2025-34491 GFI MailEssentials prior to version 21.8 is vulnerable to a .NET deserialization issue. A remote and authenticated attacker can execute arbitrary code by sending craf… cve.org/CVERecord?id=C…

Michael Weiss (@michaeldweiss) 's Twitter Profile Photo

"The Federal Office for the Protection of the Constitution finalized the designation after compiling a report exceeding 1,100 pages, which outlined extensive evidence of extremist activity within the party." I am sure our Secretary of State and acting National Security Adviser

Aliz (they/them pls) (@alizthehax0r) 's Twitter Profile Photo

Oh shit I missed the registration deadline for Off-By-One Conference ! Do I know anyone that can still get me a ticket?! I don't mind paying some penalty fee for being so lazy/late.. !!

CODE WHITE GmbH (@codewhitesec) 's Twitter Profile Photo

Yes, we're beating a dead horse. But that horse still runs in corporate networks - and quietly gives attackers the keys to the kingdom. We're publishing what’s long been exploitable. Time to talk about it. #DSM #Ivanti code-white.com/blog/ivanti-de…

vx-underground (@vxunderground) 's Twitter Profile Photo

It's a shame too. Blue Team is infinitely more interesting. I have deep respect and admiration for people who do DFIR, SOC, and DEVSECOPS, etc. I've learned more from defensive approaches than I have offensive. Blue Team just isn't as "flashy".

frycos (@frycos) 's Twitter Profile Photo

B03701066A0F762E75BAA67816EDB223F8681C9444C34E0B768DE518268025A0 Am I on vacation in the mountains? Yes. Do they have network equipment there? Yes. Can I refrain from doing VR? No. You know the drill: disclosure and blog post planned. 😄

frycos (@frycos) 's Twitter Profile Photo

Oh no, it's a variant of CVE-2024-29974...I accidentally found that a similar vuln affected Zyxel NWA50AX (Pro) and tested against devices (obviously) lacking the latest patches. This CVE was never publicly related to NWA50AX, though. Well, nice nday exercise then.

Oh no, it's a variant of CVE-2024-29974...I accidentally found that a similar vuln affected Zyxel NWA50AX (Pro) and tested against devices (obviously) lacking the latest patches. This CVE was never publicly related to NWA50AX, though. Well, nice nday exercise then.
Piotr Bazydło (@chudypb) 's Twitter Profile Photo

And domain-level RCE in Veeam B&R fixed today (CVE-2025-23121). My first (and hopefully not last) CVE, where I'm credited together with CODE WHITE GmbH 😎

frycos (@frycos) 's Twitter Profile Photo

A quick-and-dirty late night blog post on discovering an nday variant in Zyxel NWA50AX Pro devices frycos.github.io/vulns4free/202…

Security Response (@msftsecresponse) 's Twitter Profile Photo

File system redirection has long been a tool for attackers seeking privilege escalation. RedirectionGuard, a new Windows mitigation, is designed to block malicious junction-based redirection by default, strengthening system security. Key Features of RedirectionGuard: •Blocks

File system redirection has long been a tool for attackers seeking privilege escalation. RedirectionGuard, a new Windows mitigation, is designed to block malicious junction-based redirection by default, strengthening system security.
 
Key Features of RedirectionGuard:
•Blocks
SinSinology (@sinsinology) 's Twitter Profile Photo

Guess what? So far 7 people have signed up✊for this 1 day .NET Exploitation workshop where we learn about .NET deserialization basics and write some exploits, if you know any students let them know

CODE WHITE GmbH (@codewhitesec) 's Twitter Profile Photo

We have reproduced "ToolShell", the unauthenticated exploit chain for CVE-2025-49706 + CVE-2025-49704 used by Khoa Dinh to pop SharePoint at #Pwn2Own Berlin 2025, it's really just one request! Kudos to Markus Wulftange

We have reproduced "ToolShell", the unauthenticated exploit chain for CVE-2025-49706 + CVE-2025-49704 used by <a href="/_l0gg/">Khoa Dinh</a> to pop SharePoint at #Pwn2Own Berlin 2025, it's really just one request! Kudos to <a href="/mwulftange/">Markus Wulftange</a>
frycos (@frycos) 's Twitter Profile Photo

Wow, I wrote with an author of a cool VR blog post yesterday. Just asked for some more explanations and maybe references. Tl;dr: he couldn’t explain or elaborate because exactly this part of the blog was written by GPT…

CODE WHITE GmbH (@codewhitesec) 's Twitter Profile Photo

We've added a new demo to NewRemotingTricks that makes deploying a MarshalByRefObject (e.g., WebClient) even easier: System.Lazy<T> creates an instance of T on serialization, which is probably more likely to be allowed than a XAML gadget getting through. github.com/codewhitesec/N…