Tagged articles
15 articles
Page 1 of 1
Black & White Path
Black & White Path
Apr 27, 2026 · Information Security

How I Exploited Multiple Vulnerabilities in a University System

This article details a step‑by‑step penetration test on a university’s web platform, covering XSS file uploads, JWT tampering for arbitrary login, massive personal data leakage, SQL injection payloads, and the exposure of several AK/SK secrets, all with concrete screenshots and commands.

JWTSQL injectionXSS
0 likes · 5 min read
How I Exploited Multiple Vulnerabilities in a University System
Black & White Path
Black & White Path
Apr 19, 2026 · Information Security

Why Security Researchers Deserve Respect: Lessons from the 2026 Windows Defender Zero‑Day Fallout

In April 2026 a trio of Windows Defender zero‑day bugs—BlueHammer, RedSun and UnDefend—were publicly disclosed after Microsoft’s Security Response Center repeatedly ignored the researcher’s reports, sparking a debate over responsible disclosure, corporate trust, and the urgent need to respect security professionals.

BlueHammerMicrosoftWindows Defender
0 likes · 6 min read
Why Security Researchers Deserve Respect: Lessons from the 2026 Windows Defender Zero‑Day Fallout
Black & White Path
Black & White Path
Apr 17, 2026 · Information Security

RedSun PoC Uses Windows Defender Tag to Overwrite Files and Escalate Privileges

The RedSun proof‑of‑concept demonstrates that when Windows Defender detects a malicious file marked with a cloud‑based detection tag, it may rewrite the file to its original location instead of isolating it, allowing an attacker to replace system files and obtain administrator privileges.

Local Privilege EscalationRedSunWindows Defender
0 likes · 1 min read
RedSun PoC Uses Windows Defender Tag to Overwrite Files and Escalate Privileges
Black & White Path
Black & White Path
Mar 14, 2026 · Information Security

Godzilla Reflection AES Plugin with Data‑Flow Break: A Webshell Generator that Evades Detection

The article introduces VeilShell, a Godzilla‑based reflection AES encryptor combined with a Data‑Flow Break and dynamic callback technique to generate PHP webshells, presents detailed evasion test results against Changting, Alibaba and VirusTotal scanners, and provides performance metrics and a GitHub link for acquisition.

AES encryptionData-Flow BreakDetection Evasion
0 likes · 3 min read
Godzilla Reflection AES Plugin with Data‑Flow Break: A Webshell Generator that Evades Detection
IT Services Circle
IT Services Circle
Jun 15, 2024 · Information Security

How Researchers Built a Malicious VSCode Extension in 30 Minutes and Exposed Marketplace Security Flaws

A security research team created a counterfeit VSCode extension in half an hour, demonstrated how easily malicious code can be injected and distributed through the VSCode Marketplace, and revealed that dozens of high‑value companies, security firms and even a national court were compromised, highlighting critical gaps in extension vetting and supply‑chain protection.

VSCodeinformation securitymalicious extension
0 likes · 10 min read
How Researchers Built a Malicious VSCode Extension in 30 Minutes and Exposed Marketplace Security Flaws
MaGe Linux Operations
MaGe Linux Operations
Oct 28, 2022 · Information Security

Hidden Malware in Fake GitHub PoCs: Researchers Find 4,893 Malicious Repos

Researchers from the Leiden Institute of Advanced Computer Science analyzed over 47,000 GitHub repositories, uncovering that many fake proof‑of‑concept exploits conceal malware, with nearly 5,000 repositories deemed malicious and detailed case studies revealing hidden trojans, Cobalt Strike tools, and stealthy information stealers.

GitHubThreat analysismalware
0 likes · 6 min read
Hidden Malware in Fake GitHub PoCs: Researchers Find 4,893 Malicious Repos
AntTech
AntTech
Oct 11, 2022 · Information Security

In‑Depth Analysis of Hyper‑V DirectX Attack Surface and Related CVEs

The article provides a comprehensive technical walkthrough of the Hyper‑V DirectX component, detailing its architecture, virtual GPU configuration, attack surface, and step‑by‑step exploitation of four critical CVEs (CVE‑2022‑21918, CVE‑2021‑43219, CVE‑2022‑21912, CVE‑2022‑21898) with code snippets and debugging insights.

CVEDirectXHyper-V
0 likes · 11 min read
In‑Depth Analysis of Hyper‑V DirectX Attack Surface and Related CVEs
Liangxu Linux
Liangxu Linux
Jun 26, 2021 · Information Security

Uncovering RotaJakiro: A Stealthy Linux Backdoor Malware Hidden Since 2018

Researchers from 360 Netlab have uncovered RotaJakiro, a stealthy Linux backdoor malware first seen in 2018, which uses ZLIB compression, AES/XOR/ROTATE encryption, and hidden plugins to exfiltrate data and evade detection, with twelve functions yet its true purpose remains unknown.

C2Linux malwareRotaJakiro
0 likes · 4 min read
Uncovering RotaJakiro: A Stealthy Linux Backdoor Malware Hidden Since 2018
21CTO
21CTO
Mar 20, 2021 · Information Security

How TikTok’s Android WebView Exposes Multiple Vulnerabilities Leading to Remote Code Execution

Egyptian security researchers discovered a chain of flaws in TikTok’s Android app—including generic WebView XSS, Add Wiki Activity XSS, intent-based component launch, a Zip Slip in Tma Test Activity, and an RCE exploit—that can be combined to achieve remote code execution, and the report details TikTok’s remediation steps.

AndroidRemote Code ExecutionTikTok
0 likes · 10 min read
How TikTok’s Android WebView Exposes Multiple Vulnerabilities Leading to Remote Code Execution
360 Tech Engineering
360 Tech Engineering
Jun 21, 2019 · Information Security

A Comprehensive Guide to Office 0‑day/1‑day Vulnerabilities (2010‑2018)

This article expands on the author's BlueHat Shanghai 2019 presentation, summarizing Office‑related 0‑day and 1‑day vulnerabilities discovered between 2010 and 2018, categorizing them by component and type, and providing extensive references, analysis notes, and exploitation guidance for security researchers.

0dayCVEExploit
0 likes · 25 min read
A Comprehensive Guide to Office 0‑day/1‑day Vulnerabilities (2010‑2018)
ITPUB
ITPUB
Mar 22, 2016 · Information Security

Exploiting a Rare MSSQL Blind Injection via @@LANGID and @@TEXTSIZE

The author details a seldom‑seen MSSQL blind injection discovered during a Google bounty, explaining why automated scanners failed, how manual testing with @@LANGID and @@TEXTSIZE revealed the flaw, and the proof‑of‑concept steps that ultimately earned a reward.

Blind InjectionGoogle BountyMSSQL
0 likes · 5 min read
Exploiting a Rare MSSQL Blind Injection via @@LANGID and @@TEXTSIZE