Ryan Emmons (@the_emmons) 's Twitter Profile
Ryan Emmons

@the_emmons

Security Researcher, P2O ‘24. This profile is my own, and my tweets don't represent my employer :) infosec.exchange/@fuzz

ID: 1510058435282444289

calendar_today02-04-2022 00:56:18

72 Tweet

414 Followers

497 Following

Stephen Fewer (@stephenfewer) 's Twitter Profile Photo

Our Metasploit Project exploit module for unauthenticated RCE against BeyondTrust Privileged Remote Access & Remote Support is now available. The exploit can either leverage CVE-2024-12356 and CVE-2025-1094 together, or solely leverage CVE-2025-1094 for RCE: github.com/rapid7/metaspl…

Caitlin Condon (@catc0n) 's Twitter Profile Photo

Nice assessment of Sitecore XM + XP remote code execution CVE-2025-27218 c/o Rapid7's pen testing team 🎉 attackerkb.com/assessments/54…

Assetnote (@assetnote) 's Twitter Profile Photo

Our security research team discovered a pre-auth RCE (CVE-2025-27218) in Sitecore XP 10.4. You can read our research here: slcyber.io/blog/sitecore-…

RET2 Systems (@ret2systems) 's Twitter Profile Photo

Be ambitious, do absurd things. Full-stack Reverse Engineering of the Original Microsoft Xbox from the inaugural RE//verse (2025) is now available to stream on YouTube. Watch it here: youtube.com/watch?v=hGlIkg…

Be ambitious, do absurd things. Full-stack Reverse Engineering of the Original Microsoft Xbox from the inaugural <a href="/REverseConf/">RE//verse</a> (2025) is now available to stream on YouTube.

Watch it here: youtube.com/watch?v=hGlIkg…
Ryan Emmons (@the_emmons) 's Twitter Profile Photo

The Rapid7 ETR team has published an analysis of CVE-2025-2825, a critical authentication bypass for CrushFTP. Check it out here: attackerkb.com/topics/k0EgiL9…

Stephen Fewer (@stephenfewer) 's Twitter Profile Photo

We now have a Metasploit Project exploit in the pull queue for that Oracle Access Manager vuln, CVE-2021-35587. You can check it out here: github.com/rapid7/metaspl…

We now have a <a href="/metasploit/">Metasploit Project</a> exploit in the pull queue for that Oracle Access Manager vuln, CVE-2021-35587.  You can check it out here: github.com/rapid7/metaspl…
Stephen Fewer (@stephenfewer) 's Twitter Profile Photo

We have just published our AttackerKB Rapid7 Analysis of CVE-2025-22457, an unauth stack buffer overflow in Ivanti Connect Secure. Difficult to exploit due to severe character restrictions, we detail our full RCE technique here: attackerkb.com/topics/0ybGQIk…

Caitlin Condon (@catc0n) 's Twitter Profile Photo

N-day analysis of Citrix NetScaler Console CVE-2024-6235 via Rapid7 researcher Calum Hutton: The vuln allows an unauthenticated attacker to obtain an admin-level session ID from an internal API and use this to create other admin users on the system. attackerkb.com/assessments/3b…

N-day analysis of Citrix NetScaler Console CVE-2024-6235 via Rapid7 researcher Calum Hutton: The vuln allows an unauthenticated attacker to obtain an admin-level session ID from an internal API and use this to create other admin users on the system. attackerkb.com/assessments/3b…
RET2 Systems (@ret2systems) 's Twitter Profile Photo

New blogpost! Want to see how we exploited Synology Inc. network-attached-storage devices at Pwn2Own Ireland? RCE to root via out-of-bounds NULL-byte writes, click the embed for a fun little writeup of CVE-2024-10442 🔎🎉 blog.ret2.io/2025/04/23/pwn…

Neodyme (@neodyme) 's Twitter Profile Photo

Interested in learning about Windows exploitation? This August, join us in Las Vegas for an intensive, hands-on 4-day DEFCON training: Binary Exploitation on Windows, led by Felipe and Kolja! 🗓️ When: August 9–12, 2025 📍 Where: Las Vegas Convention Center

Interested in learning about Windows exploitation?

This August, join us in Las Vegas for an intensive, hands-on 4-day DEFCON training:
Binary Exploitation on Windows, led by Felipe and Kolja!

🗓️ When: August 9–12, 2025
📍 Where: Las Vegas Convention Center
Caitlin Condon (@catc0n) 's Twitter Profile Photo

Great work from Ryan Emmons on these! And our sincere thanks to SonicWall's PSIRT once again for their exceptionally speedy and helpful response 🙌 rapid7.com/blog/post/2025…

Stephen Fewer (@stephenfewer) 's Twitter Profile Photo

A new Rapid7 Analysis of CVE-2024-58136 was just published to AttackerKB, courtesy of Calum Hutton 🔥 Affecting the Yii framework, this analysis details the root cause and how it can be leveraged for RCE via a dirty file write to a log file: attackerkb.com/topics/U2Ddokj…

Neodyme (@neodyme) 's Twitter Profile Photo

Once again this year, a few colleagues couldn’t resist jumping into the HTB CTF to take on experts from around the world. 💻 A great challenge with a wide range of categories. The result: 1st place in 🇩🇪 and top 3 in 🇪🇺.

Once again this year, a few colleagues couldn’t resist jumping into the HTB CTF to take on experts from around the world. 💻
A great challenge with a wide range of categories.
The result: 1st place in 🇩🇪 and top 3 in 🇪🇺.
h0mbre (@h0mbre_) 's Twitter Profile Photo

its funny to me that to get good VR results from LLMs, part of the prompt has to be you pumping the LLM up, like "You're an elite vulnerability researcher. You love this shit."

its funny to me that to get good VR results from LLMs, part of the prompt has to be you pumping the LLM up, like "You're an elite vulnerability researcher. You love this shit."
Rapid7 (@rapid7) 's Twitter Profile Photo

During a penetration testing engagement, Rapid7 discovered 3 vulns in MICI Network Co., Ltd’s #NetFax server – allowing for an authenticated attack chain & eventual RCE against the device as the root user. Find mitigation guidance & more in a new blog: r-7.co/4kdG1ux