Our ninja @Butanal_C4H8O identified a high-impact XSS in Netwrix Directory Manager. The CVE-2025-47189 vulnerability can be exploited from the Windows lock screen to gain administrator privileges on a workstation. synacktiv.com/advisories/net…
🔐 Data encryption in Laravel environments is based on one secret: the APP_KEY. Our ninja @_remsio_ studied the impact of its leakage on the internet during an entire year.
synacktiv.com/en/publication…
While performing security research on IoT control applications, @Areizen_ and @Anatharrr discovered critical vulnerabilities in the mobile app for the Eachine E58 drone. These flaws could potentially lead to remote code execution on the user's smartphone.
synacktiv.com/en/publication…
A pre-auth RCE combining 2 critical vulnerabilities on the Production Environment extension of the PHP low-code website generator ScriptCase has been found by @noraj_rawsec and cabir. No upstream fix yet, please apply the workaround.
synacktiv.com/advisories/scr…
While performing penetration tests on SAP Financial Consolidation, our ninjas @l4x4 and @alexisdanizan discovered an authentication bypass for local accounts including the built-in ADMIN account, leading to the underlying system compromise: synacktiv.com/en/advisories/…
For our second talk of the day, @flgy presents Mofos, a virtual machines manipulation framework to mimic QubesOS on a standard Linux distribution #SSTIC2025
📢 The new MISC edition is out! Check out the headline research by @_remsio_ and @Kain0x42 on Laravel APP_KEY security. Thanks to @editionsdiamond for the opportunity and enjoy the read! 📚🔒🥷
The FastCGI library, mostly used in embedded equipment, was vulnerable for decades to an integer overflow over the IPC socket in 32-bits architecture. Check out how @ShiroPycatchown found it and exploited it for RCE!
synacktiv.com/en/publication…
From firmware dumps to wireless exploration — check out our latest dive into DVB receiver analysis and the hidden attack surface it exposes!
synacktiv.com/en/publication…
PagedOut! #6 magazine is out! This edition features two articles from our ninjas:
- Implicit Unicode behaviors in database string functions
- Calling Rust from Python: A story of bindings
Dive into their insights here: pagedout.institute
Synacktiv is looking for an additional team leader in Paris for its Reverse-Engineering Team!
Find out if you are a good candidate by reading our offer (🇫🇷).
synacktiv.com/responsable-eq…
🚀 This week, @us3r777 & @__pierreg kick off our new Whitebox Vulnerability Research training! Students will dive into PHP, Java, and .NET, analyzing & exploiting 1-day vulnerabilities. Let’s get started! 💻🔍
Exciting news, our Offensive Azure training has been accepted at #x33fcon! 🥳 Can’t wait to see you there and dive into the latest techniques for attacking Azure environments!
We've just updated our training catalog to include the latest additions, including a brand new course on ransomware investigations!
Find all the dates and details at synacktiv.com/en/offers/trai…
407 Followers 916 FollowingEgal wie oft du an gestern denkst, egal welche Pläne du für die Zukunft hast, es ist immer heute.
Co-Founder of Ken Tiger & Mo KG
@[email protected]
2K Followers 1K FollowingENG: https://t.co/XQEvWPWLHW
LAT: https://t.co/1bAN6XsfFk
Owner at @possiblelv. Author of e-Saeima.
Those who talk, don't know. Those who don't talk, know.
595K Followers 23 FollowingSignal is an end-to-end encrypted messaging app. Privacy isn’t an optional mode, it’s just the way that Signal works. Every message, every call, every time.
10K Followers 1K FollowingTrusted by 7M developers, our @SonarQube solutions (Server, Cloud, for IDE) cover your code quality and security needs –AI-generated or written by developers 🚀
115K Followers 346 FollowingINTERPOL Global Cybercrime Programme aims to reduce the global impact of cybercrime and protect communities for a safer world.
2K Followers 4K FollowingHardware, prototyping, RE, firmware, lockpicking, makering, and various other hackings.
@[email protected]
@SynapticRewrite.bsky.social
109K Followers 2 FollowingMonitor your external network, search the Internet of Things and perform empirical market research. You can also find us on https://t.co/nPLFbFy8R5
126K Followers 1K FollowingPrincipal Engineer at Google. Bettering Gemini model serving infra, bettering APIs. Simplicity and optimism. Personal opinions.
13K Followers 53 FollowingOpenBSD is a free and secure UNIX-like operating system that emphasizes portability, standardization, correctness, proactive security & integrated cryptography.
2K Followers 1K FollowingENG: https://t.co/XQEvWPWLHW
LAT: https://t.co/1bAN6XsfFk
Owner at @possiblelv. Author of e-Saeima.
Those who talk, don't know. Those who don't talk, know.
12K Followers 35 FollowingHacksplained is an intro to hacking by @PascalSec
📺 https://t.co/pVsQptuz2d
💖 https://t.co/uQl641e6Li
🥨 https://t.co/qh5mPse7N5
6K Followers 741 FollowingCryptoHack is a fun platform for learning modern cryptography through a series of puzzles and challenges.
Free to play for all
4K Followers 688 FollowingAll I know is that I know nothing. I like Windows, Active Directory and IoT/Hardware hacking.
"Responsable mais pas coupable" de PetitPotam
62K Followers 286 FollowingA kiwi coding mimikatz & kekeo
github: https://t.co/eS3LVgU6i0
Head of security services @banquedefrance
Tweets are my own and not the views of my employer
26K Followers 1K FollowingI play with vulnerabilities and exploits. I used to be here on Twitter but now I'm here:
@[email protected]
https://t.co/hXggdAVkSQ