с пятничкой 0click
Proxy Bar
Exploits, Hacking and Leaks Чат группы - https://t.me/chat_proxy_bar Связь с администрацией: @NULL_vm Поддержать проект: BTC bc1qmrt229eghjyj9wqa7nmr9j8zuq6khz6km2pker
Графики
📊 Средний охват постов
📉 ERR % по дням
📋 Публикации по дням
📎 Типы контента
Лучшие публикации
19 из 19CVE-2026-24291 Windows LPE * Windows 11 25h2 Windows 11 24h2 Windows 10 21h2 Windows Servers 2016/2019/2022 Info Exploit
Inside WMI: Tracing Windows Management from Consumers to COM Providers Original text by Jonathan Johnson The two-part article explores the internal architecture of Windows Management Instrumentation (WMI) and explains how management queries and actions are executed inside Windows. WMI is Microsoft’s implementation of WBEM (Web-Based Enterprise Management) and provides a standardized way for applications and administrators to query system information or manage resources such as… https://core-jmp....
0l0L0 RDP
Bluetooth Exploit Framework * тыц
Bypassing Code Integrity Using BYOVD for Kernel R/W Primitives Original text by S12 – 0x12Dark Development The article demonstrates how attackers can bypass Windows Kernel Code Integrity protections by abusing the BYOVD (Bring Your Own Vulnerable Driver) technique to obtain powerful kernel read/write primitives. Instead of loading a malicious unsigned driver, the attacker loads a legitimate but vulnerable signed driver that contains exploitable IOCTL… https://core-jmp.org/2026/03/bypassing-code-...
Out-of-Cancel: A New Linux Kernel Race Condition Bug Class Original text by v4bel The article introduces a newly identified Linux kernel vulnerability pattern called “Out-of-Cancel”, which arises from incorrect assumptions about the behavior of workqueue cancellation APIs. The author analyzes how functions such as cancel_work_sync() or cancel_delayed_work_sync() are often used in kernel teardown paths to stop asynchronous work before freeing an object. However, these… https://core-jmp.org/2026/0...
Magento PolyShell – Unauthenticated File Upload to RCE in Magento * WriteUp + happy ScR1pt
Relaying Trust: Exploiting NTLM Authentication to Compromise Active Directory Original text by SecCoreGmbH The article explains how NTLM relay attacks can be used to gain unauthorized access in Active Directory environments when certain security protections are not enforced. The author demonstrates a practical attack scenario where an attacker captures NTLM authentication from a Windows system and relays it to another service such as LDAP… https://core-jmp.org/2026/03/relaying-trust-exploiting-n...
Hidden Bugs in Plain Sight: Hunting Vulnerabilities Inside Shared Libraries Original text by Grzegorz Wypych (h0rac) The article explains how security researchers can discover vulnerabilities that hide not in the main application binary but inside the shared libraries it depends on. The author presents the concept behind the ByteRay vulnerability hunting engine, which focuses on tracking how input data flows across program boundaries—from the main… https://core-jmp.org/2026/03/hidden-bugs-in-pla...