<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
  <updated>2026-04-18T21:07:36Z</updated>
  <generator>https://yabu.me</generator>

  <title>Nostr notes by Ivan Ožić Bebek</title>
  <author>
    <name>Ivan Ožić Bebek</name>
  </author>
  <link rel="self" type="application/atom+xml" href="https://yabu.me/npub1gqvxhfwmtwlxfgdxwy8ta9s6m63rvr24gz4ws07czfd6a6c2m3xs572gj7.rss" />
  <link href="https://yabu.me/npub1gqvxhfwmtwlxfgdxwy8ta9s6m63rvr24gz4ws07czfd6a6c2m3xs572gj7" />
  <id>https://yabu.me/npub1gqvxhfwmtwlxfgdxwy8ta9s6m63rvr24gz4ws07czfd6a6c2m3xs572gj7</id>
  <icon>https://media.infosec.exchange/infosec.exchange/accounts/avatars/109/290/551/382/099/976/original/f0c8c24e77516da3.jpg</icon>
  <logo>https://media.infosec.exchange/infosec.exchange/accounts/avatars/109/290/551/382/099/976/original/f0c8c24e77516da3.jpg</logo>




  <entry>
    <id>https://yabu.me/nevent1qqsz0dskggmvax50rly5qmp58h0vek7ut0gdelvhwqu6n4fpkk5u77czypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy6wyp2fe</id>
    
      <title type="html">What You Need to Know: Windows Admin Center Remote Privilege ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsz0dskggmvax50rly5qmp58h0vek7ut0gdelvhwqu6n4fpkk5u77czypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy6wyp2fe" />
    <content type="html">
      What You Need to Know: Windows Admin Center Remote Privilege Escalation (CVE-2026-26119) &lt;a href=&#34;https://www.semperis.com/blog/what-you-need-to-know-windows-admin-center-remote-privilege-escalation-cve-2026-26119/&#34;&gt;https://www.semperis.com/blog/what-you-need-to-know-windows-admin-center-remote-privilege-escalation-cve-2026-26119/&lt;/a&gt;
    </content>
    <updated>2026-03-23T14:47:17Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsz326vvyws8ylzy9lzenl98lam2p9c63t8q7lglr2ug69c5nuqmeqzypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy6xnzw0a</id>
    
      <title type="html">Why I Left Kali for Exegol https://bltsec.com/posts/exegol/</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsz326vvyws8ylzy9lzenl98lam2p9c63t8q7lglr2ug69c5nuqmeqzypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy6xnzw0a" />
    <content type="html">
      Why I Left Kali for Exegol &lt;a href=&#34;https://bltsec.com/posts/exegol/&#34;&gt;https://bltsec.com/posts/exegol/&lt;/a&gt;
    </content>
    <updated>2026-03-19T20:56:11Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsfysc0pjf0nmxld5azs0a2pj0z04ezg0j0x77ej4f3h2mr242ujaqzypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy6e0cvrl</id>
    
      <title type="html">Full Disclosure: A Third (and Fourth) Azure Sign-In Log Bypass ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsfysc0pjf0nmxld5azs0a2pj0z04ezg0j0x77ej4f3h2mr242ujaqzypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy6e0cvrl" />
    <content type="html">
      Full Disclosure: A Third (and Fourth) Azure Sign-In Log Bypass Found &lt;a href=&#34;https://trustedsec.com/blog/full-disclosure-a-third-and-fourth-azure-sign-in-log-bypass-found&#34;&gt;https://trustedsec.com/blog/full-disclosure-a-third-and-fourth-azure-sign-in-log-bypass-found&lt;/a&gt;
    </content>
    <updated>2026-03-19T20:28:07Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsfqzlsylu2phvvfgvdphufutqhpfh6f6g7akxl6a88a44l5cttm3qzypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy6mx8z0q</id>
    
      <title type="html">CVE-2026-26117: Hijacking Azure Arc on Windows for Local ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsfqzlsylu2phvvfgvdphufutqhpfh6f6g7akxl6a88a44l5cttm3qzypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy6mx8z0q" />
    <content type="html">
      CVE-2026-26117: Hijacking Azure Arc on Windows for Local Privilege Escalation &amp;amp; Cloud Identity Takeover &lt;a href=&#34;https://cymulate.com/blog/cve-2026-26117-azure-arc-windows-lpe-cloud-identity-takeover/&#34;&gt;https://cymulate.com/blog/cve-2026-26117-azure-arc-windows-lpe-cloud-identity-takeover/&lt;/a&gt;
    </content>
    <updated>2026-03-11T07:02:21Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs849gzpjq5y0d029ackh6h8aczs4nldlqflpys9m6ty2gkqtdkq8czypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy6qzxqa8</id>
    
      <title type="html">right, I don&amp;#39;t see how this is different from any other ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs849gzpjq5y0d029ackh6h8aczs4nldlqflpys9m6ty2gkqtdkq8czypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy6qzxqa8" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqspn7g0emagpyeznsdljeg0nv44jk5fy98huyqh0q35ksameryqc7qmqq3n2&#39;&gt;nevent1q…q3n2&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;right, I don&amp;#39;t see how this is different from any other privacy focused company. What else is there, gift card payment suport?
    </content>
    <updated>2026-03-06T10:57:46Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsxwz96vsffynyjrhj8prpdjtte4u4ev994w8e80cru7zevn7zsdfgzypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy60kpcg9</id>
    
      <title type="html">well crypto is also supported, here is their response from LI: ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsxwz96vsffynyjrhj8prpdjtte4u4ev994w8e80cru7zevn7zsdfgzypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy60kpcg9" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqs92cq522e9kwmhqx45zkqtg35pjuel0s6kx3fk6zfxy4ukf76p75q3956g7&#39;&gt;nevent1q…56g7&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;well crypto is also supported, here is their response from LI:&lt;br/&gt; &lt;img src=&#34;https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/181/783/271/311/193/original/a122dfd2a31e8ccd.png&#34;&gt; &lt;br/&gt;
    </content>
    <updated>2026-03-06T10:36:16Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs2uwg9prlc5eqqyzynn34wl9g66lwywfunh0xtzca5trxacz4nrggzypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy6765l8p</id>
    
      <title type="html">What Windows Server 2025 Quietly Did to Your NTLM Relay ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs2uwg9prlc5eqqyzynn34wl9g66lwywfunh0xtzca5trxacz4nrggzypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy6765l8p" />
    <content type="html">
      What Windows Server 2025 Quietly Did to Your NTLM Relay &lt;a href=&#34;https://decoder.cloud/2026/02/25/what-windows-server-2025-quietly-did-to-your-ntlm-relay/&#34;&gt;https://decoder.cloud/2026/02/25/what-windows-server-2025-quietly-did-to-your-ntlm-relay/&lt;/a&gt;
    </content>
    <updated>2026-02-26T10:21:48Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqswzhsqne83pj86ye5y4ghl2tpu99tehsm6x9htzwu2z4908edyguszypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy682cyn9</id>
    
      <title type="html">Hands-Free Lockpicking: Critical Vulnerabilities in dormakaba’s ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqswzhsqne83pj86ye5y4ghl2tpu99tehsm6x9htzwu2z4908edyguszypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy682cyn9" />
    <content type="html">
      Hands-Free Lockpicking: Critical Vulnerabilities in dormakaba’s Physical Access Control System &lt;a href=&#34;https://sec-consult.com/blog/detail/hands-free-lockpicking-critical-vulnerabilities-in-dormakabas-physical-access-control-system/&#34;&gt;https://sec-consult.com/blog/detail/hands-free-lockpicking-critical-vulnerabilities-in-dormakabas-physical-access-control-system/&lt;/a&gt;
    </content>
    <updated>2026-01-26T11:42:31Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsw5xn0vxafyyfvkdfxz6c5qpsqlsrzm28h5unvwalzz2py78q68lqzypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy69a9u4n</id>
    
      <title type="html">Well, Well, Well. It’s Another Day. (Oracle E-Business Suite ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsw5xn0vxafyyfvkdfxz6c5qpsqlsrzm28h5unvwalzz2py78q68lqzypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy69a9u4n" />
    <content type="html">
      Well, Well, Well. It’s Another Day. (Oracle E-Business Suite Pre-Auth RCE Chain - CVE-2025-61882) &lt;a href=&#34;https://labs.watchtowr.com/well-well-well-its-another-day-oracle-e-business-suite-pre-auth-rce-chain-cve-2025-61882well-well-well-its-another-day-oracle-e-business-suite-pre-auth-rce-chain-cve-2025-61882/&#34;&gt;https://labs.watchtowr.com/well-well-well-its-another-day-oracle-e-business-suite-pre-auth-rce-chain-cve-2025-61882well-well-well-its-another-day-oracle-e-business-suite-pre-auth-rce-chain-cve-2025-61882/&lt;/a&gt;
    </content>
    <updated>2025-10-06T18:11:28Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsd8jvj9wkcae76mnyapulf3lgq5srrxsx7hjtguxyked2sd2nw9qszypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy63t8q4u</id>
    
      <title type="html">Hashcat v7.0.0 released ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsd8jvj9wkcae76mnyapulf3lgq5srrxsx7hjtguxyked2sd2nw9qszypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy63t8q4u" />
    <content type="html">
      Hashcat v7.0.0 released &lt;a href=&#34;https://hashcat.net/forum/thread-13330-post-63567.html#pid63567&#34;&gt;https://hashcat.net/forum/thread-13330-post-63567.html#pid63567&lt;/a&gt;
    </content>
    <updated>2025-08-03T10:58:40Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs2c3xpeq6jx78e9tq9fqnlx53ewg6tv5jrqrxt33prvqksmh3c52czypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy6k3y0el</id>
    
      <title type="html">Laravel: APP_KEY leakage analysis ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs2c3xpeq6jx78e9tq9fqnlx53ewg6tv5jrqrxt33prvqksmh3c52czypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy6k3y0el" />
    <content type="html">
      Laravel: APP_KEY leakage analysis &lt;a href=&#34;https://www.synacktiv.com/en/publications/laravel-appkey-leakage-analysis&#34;&gt;https://www.synacktiv.com/en/publications/laravel-appkey-leakage-analysis&lt;/a&gt;
    </content>
    <updated>2025-07-11T07:38:44Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsyde6ed4gvzxkel0wt9xw6rekzu7tyvvg6tczspht6xa4lj0af6lgzypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy6rf7sfa</id>
    
      <title type="html">Reproducing a million-dollar bug: 3WhatsApp CVE-2019-11932 ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsyde6ed4gvzxkel0wt9xw6rekzu7tyvvg6tczspht6xa4lj0af6lgzypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy6rf7sfa" />
    <content type="html">
      Reproducing a million-dollar bug: 3WhatsApp CVE-2019-11932 &lt;a href=&#34;https://www.ibm.com/think/x-force/reproducing-million-dollar-bug-whatsapp-cve-2019-11932-afl-frida&#34;&gt;https://www.ibm.com/think/x-force/reproducing-million-dollar-bug-whatsapp-cve-2019-11932-afl-frida&lt;/a&gt;
    </content>
    <updated>2025-07-03T09:30:01Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqswaa0lkv25q84kj2tpd0s9e9nuvfrg7gtm6u22crav8hgqpjkwuvqzypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy6d69d0p</id>
    
      <title type="html">We’re going the wrong way! How to abuse symlinks and get LPE in ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqswaa0lkv25q84kj2tpd0s9e9nuvfrg7gtm6u22crav8hgqpjkwuvqzypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy6d69d0p" />
    <content type="html">
      We’re going the wrong way! How to abuse symlinks and get LPE in Windows &lt;a href=&#34;https://cicada-8.medium.com/were-going-the-wrong-way-how-to-abuse-symlinks-and-get-lpe-in-windows-0c598b99125b&#34;&gt;https://cicada-8.medium.com/were-going-the-wrong-way-how-to-abuse-symlinks-and-get-lpe-in-windows-0c598b99125b&lt;/a&gt;
    </content>
    <updated>2025-06-28T18:25:48Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs2fdtwldkktsqrxyqsq0dlxsf9pgaecf24k8dct607fw0z6m7l5mczypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy6ysmhhv</id>
    
      <title type="html">“Localhost tracking” explained. It could cost Meta 32 ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs2fdtwldkktsqrxyqsq0dlxsf9pgaecf24k8dct607fw0z6m7l5mczypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy6ysmhhv" />
    <content type="html">
      “Localhost tracking” explained. It could cost Meta 32 billion. &lt;a href=&#34;https://www.zeropartydata.es/p/localhost-tracking-explained-it-could&#34;&gt;https://www.zeropartydata.es/p/localhost-tracking-explained-it-could&lt;/a&gt;
    </content>
    <updated>2025-06-11T14:53:11Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs0vza5dpr3r57pcp29weuyclp0y2tczksp9t88mxkjwmn5e57qvhqzypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy693zqzu</id>
    
      <title type="html">A practical NTLM relay attack using the MS-EVEN RPC protocol and ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs0vza5dpr3r57pcp29weuyclp0y2tczksp9t88mxkjwmn5e57qvhqzypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy693zqzu" />
    <content type="html">
      A practical NTLM relay attack using the MS-EVEN RPC protocol and antivirus-assisted coercion &lt;a href=&#34;https://github.com/Thunter-HackTeam/EvilentCoerce&#34;&gt;https://github.com/Thunter-HackTeam/EvilentCoerce&lt;/a&gt;
    </content>
    <updated>2025-05-09T11:11:10Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsf7arap0a0qcg668pzrwfkseuwhfwm5vdr4746szlckfs5kwukeyszypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy65tcp5t</id>
    
      <title type="html">Weaponizing DCOM for NTLM Authentication Coercions ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsf7arap0a0qcg668pzrwfkseuwhfwm5vdr4746szlckfs5kwukeyszypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy65tcp5t" />
    <content type="html">
      Weaponizing DCOM for NTLM Authentication Coercions &lt;a href=&#34;https://github.com/xforcered/RemoteMonologue&#34;&gt;https://github.com/xforcered/RemoteMonologue&lt;/a&gt;
    </content>
    <updated>2025-04-08T16:41:00Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsv26gn0v3lnxajfw6lrlda69t28ecwrnfmqfn23cndct4zekszk7qzypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy6072k35</id>
    
      <title type="html">CVE-2025-27407: Inside the Critical GraphQL-Ruby RCE ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsv26gn0v3lnxajfw6lrlda69t28ecwrnfmqfn23cndct4zekszk7qzypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy6072k35" />
    <content type="html">
      CVE-2025-27407: Inside the Critical GraphQL-Ruby RCE Vulnerability &lt;a href=&#34;https://cenobe.com/blog/cve-2025-27407/&#34;&gt;https://cenobe.com/blog/cve-2025-27407/&lt;/a&gt;
    </content>
    <updated>2025-03-28T07:32:00Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs903n87m8jprkl4rv82u43wnh6lccpfnj5exxsdvlaprrzvkqktfqzypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy6dpzdwm</id>
    
      <title type="html">Poc exploit for CVE-2025-21333 heap-based buffer overflow ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs903n87m8jprkl4rv82u43wnh6lccpfnj5exxsdvlaprrzvkqktfqzypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy6dpzdwm" />
    <content type="html">
      Poc exploit for CVE-2025-21333 heap-based buffer overflow &lt;a href=&#34;https://github.com/MrAle98/CVE-2025-21333-POC&#34;&gt;https://github.com/MrAle98/CVE-2025-21333-POC&lt;/a&gt;
    </content>
    <updated>2025-02-28T11:44:23Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsp9wxg9m2g7tewcsctvr09jyhv02vrnxtyxput3fytqqsg5gyynzgzypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy62uhepe</id>
    
      <title type="html">Anydesk LPE Vulnerability ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsp9wxg9m2g7tewcsctvr09jyhv02vrnxtyxput3fytqqsg5gyynzgzypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy62uhepe" />
    <content type="html">
      Anydesk LPE Vulnerability &lt;a href=&#34;https://github.com/CICADA8-Research/Penetration/tree/main/POCs/CVE-2024-12754&#34;&gt;https://github.com/CICADA8-Research/Penetration/tree/main/POCs/CVE-2024-12754&lt;/a&gt;
    </content>
    <updated>2025-02-11T09:14:39Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsftwfv0h8nkeymgtkc9mmthy2hc5q5un5pfhs5lsxj7ykdllq8kcszypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy6ex37n2</id>
    
      <title type="html">Top 10 web hacking techniques of 2024 ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsftwfv0h8nkeymgtkc9mmthy2hc5q5un5pfhs5lsxj7ykdllq8kcszypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy6ex37n2" />
    <content type="html">
      Top 10 web hacking techniques of 2024 &lt;a href=&#34;https://portswigger.net/research/top-10-web-hacking-techniques-of-2024&#34;&gt;https://portswigger.net/research/top-10-web-hacking-techniques-of-2024&lt;/a&gt;
    </content>
    <updated>2025-02-04T16:18:43Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsdfd69gd6auevjn74jj2x2mjgma4r8v3txa4d565hdjcg6j5r4l3gzypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy6dxcajl</id>
    
      <title type="html">Active Directory Domain Services Elevation of Privilege ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsdfd69gd6auevjn74jj2x2mjgma4r8v3txa4d565hdjcg6j5r4l3gzypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy6dxcajl" />
    <content type="html">
      Active Directory Domain Services Elevation of Privilege Vulnerability (CVE-2025-21293) &lt;a href=&#34;https://birkep.github.io/posts/Windows-LPE/&#34;&gt;https://birkep.github.io/posts/Windows-LPE/&lt;/a&gt;
    </content>
    <updated>2025-01-29T16:19:54Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs9crhxkthllh6fzu8wmq9rnp0yxvl2ha2d8cwhtp8tca74c3l9xfszypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy62t03xh</id>
    
      <title type="html">yes, I don&amp;#39;t remember where I took the filter from, but ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs9crhxkthllh6fzu8wmq9rnp0yxvl2ha2d8cwhtp8tca74c3l9xfszypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy62t03xh" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsr46r9y729aasydc9de5ujmgl63qklu32gjwx2azjk6pyacxhlx4sqj3apn&#39;&gt;nevent1q…3apn&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;yes, I don&amp;#39;t remember where I took the filter from, but it&amp;#39;s something like this: &lt;a href=&#34;https://github.com/gijsdev/ublock-hide-yt-shorts/blob/master/list.txt&#34;&gt;https://github.com/gijsdev/ublock-hide-yt-shorts/blob/master/list.txt&lt;/a&gt; works on desktop and mobile. keep on rocking 🤘
    </content>
    <updated>2025-01-29T08:35:54Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsz3nw52qe565ghswj856pshpvyxkfn88mx5zx4lfha7tp474t6v9szypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy6wcvyq5</id>
    
      <title type="html">you can easily block them with Unhook or uBlock extension :)</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsz3nw52qe565ghswj856pshpvyxkfn88mx5zx4lfha7tp474t6v9szypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy6wcvyq5" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsfuz65qg70la2xh7hhy7nen3x067648cxaca8hd87nr6x9gmt0szg8kdras&#39;&gt;nevent1q…dras&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;you can easily block them with Unhook or uBlock extension :)
    </content>
    <updated>2025-01-29T08:19:58Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsrut5x0azy6kp86mzj2kmprwn74020cm8uaqp746w7nxdzkruy8uqzypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy667rqvl</id>
    
      <title type="html">7-Zip 0day PoC https://pastebin.com/KxQYFqwR</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsrut5x0azy6kp86mzj2kmprwn74020cm8uaqp746w7nxdzkruy8uqzypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy667rqvl" />
    <content type="html">
      7-Zip 0day PoC &lt;a href=&#34;https://pastebin.com/KxQYFqwR&#34;&gt;https://pastebin.com/KxQYFqwR&lt;/a&gt;
    </content>
    <updated>2024-12-30T13:00:29Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsp2m9x0669terwv4z6msa2ldkaj8tex3nlaaeqqq7yssm8caxrceczypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy6ha2mjk</id>
    
      <title type="html">Unveiling Hidden Transformers in Windows ANSI! ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsp2m9x0669terwv4z6msa2ldkaj8tex3nlaaeqqq7yssm8caxrceczypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy6ha2mjk" />
    <content type="html">
      Unveiling Hidden Transformers in Windows ANSI! &lt;a href=&#34;https://worst.fit/assets/EU-24-Tsai-WorstFit-Unveiling-Hidden-Transformers-in-Windows-ANSI.pdf&#34;&gt;https://worst.fit/assets/EU-24-Tsai-WorstFit-Unveiling-Hidden-Transformers-in-Windows-ANSI.pdf&lt;/a&gt;
    </content>
    <updated>2024-12-19T16:28:40Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsrfynwfjwqldfr3urengw48w52xe3eqyv5zg7k0589l6m9fj5k2tgzypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy6al4tfc</id>
    
      <title type="html">thanks for clarification! I tried to replicate this beforehand, ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsrfynwfjwqldfr3urengw48w52xe3eqyv5zg7k0589l6m9fj5k2tgzypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy6al4tfc" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqsg8gsahhm0n3ty5dfeelcuk9lsajq2hwdwq0tc6rl247c2fll2wyqwwlf3e&#39;&gt;nevent1q…lf3e&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;thanks for clarification! I tried to replicate this beforehand, but in my case it asks for password, phone number, auth or recovery code. If it works without any of these then it&amp;#39;s highly disturbing.
    </content>
    <updated>2024-12-18T18:06:18Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqszy05ww2qgyhptmsqz3k4dzvdlrm48r8ej97y3z9ucr9j2xdzrmrczypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy64cz872</id>
    
      <title type="html">&amp;#34;In reality, the thieves caused the alert to appear on his ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqszy05ww2qgyhptmsqz3k4dzvdlrm48r8ej97y3z9ucr9j2xdzrmrczypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy64cz872" />
    <content type="html">
      In reply to &lt;a href=&#39;/nevent1qqstm0z7ma8malamvaarunr7xa9hut7kttxtpqs8cv87rfncx6rypsq0q4xyf&#39;&gt;nevent1q…4xyf&lt;/a&gt;&lt;br/&gt;_________________________&lt;br/&gt;&lt;br/&gt;&amp;#34;In reality, the thieves caused the alert to appear on his phone merely by stepping through Google’s account recovery process for Griffin’s Gmail address.&amp;#34; Does this mean they had his password or auth code? Recovery notification couldn&amp;#39;t be sent otherwise.
    </content>
    <updated>2024-12-18T14:28:47Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsf3c37qtn9lvl7zp2hh0vwlu0k0mnkmkupp0yq4c990z46ngwcutgzypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy635r5wl</id>
    
      <title type="html">Malimite is an iOS decompiler designed to help researchers ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsf3c37qtn9lvl7zp2hh0vwlu0k0mnkmkupp0yq4c990z46ngwcutgzypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy635r5wl" />
    <content type="html">
      Malimite is an iOS decompiler designed to help researchers analyze and decode IPA files &lt;a href=&#34;https://github.com/LaurieWired/Malimite&#34;&gt;https://github.com/LaurieWired/Malimite&lt;/a&gt;
    </content>
    <updated>2024-12-08T10:23:53Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsxevm4zlxcygyt7dqmm5davz74nm2acy493tpnku926g6mqyrwlqqzypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy6jxk8sf</id>
    
      <title type="html">Windows DWM Core Library Elevation of Privilege Vulnerability ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsxevm4zlxcygyt7dqmm5davz74nm2acy493tpnku926g6mqyrwlqqzypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy6jxk8sf" />
    <content type="html">
      Windows DWM Core Library Elevation of Privilege Vulnerability (CVE-2024-30051) &lt;a href=&#34;https://www.coresecurity.com/core-labs/articles/windows-dwm-core-library-elevation-privilege-vulnerability-cve-2024-30051&#34;&gt;https://www.coresecurity.com/core-labs/articles/windows-dwm-core-library-elevation-privilege-vulnerability-cve-2024-30051&lt;/a&gt;
    </content>
    <updated>2024-11-08T15:39:31Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqs83sun0kdt9uant3ypzc4hyz23rvd0u8z84t3njzwspf44mcgq09szypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy6cx0jrq</id>
    
      <title type="html">CVE-2024-8260: SMB Force-Authentication Vulnerability in OPA ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqs83sun0kdt9uant3ypzc4hyz23rvd0u8z84t3njzwspf44mcgq09szypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy6cx0jrq" />
    <content type="html">
      CVE-2024-8260: SMB Force-Authentication Vulnerability in OPA Could Lead to Credential Leakage &lt;a href=&#34;https://www.tenable.com/blog/cve-2024-8260-smb-force-authentication-vulnerability-in-opa-could-lead-to-credential-leakage&#34;&gt;https://www.tenable.com/blog/cve-2024-8260-smb-force-authentication-vulnerability-in-opa-could-lead-to-credential-leakage&lt;/a&gt;
    </content>
    <updated>2024-10-24T14:54:51Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsz8vsk3qd4wjuekvpsjumlmrs67a6f2egtm5mcwypxjlwftx0nm5czypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy6zp4nag</id>
    
      <title type="html">Analysis of CVE-2024-8698 in KeyCloak ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsz8vsk3qd4wjuekvpsjumlmrs67a6f2egtm5mcwypxjlwftx0nm5czypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy6zp4nag" />
    <content type="html">
      Analysis of CVE-2024-8698 in KeyCloak &lt;a href=&#34;https://huydoppa.hashnode.dev/analyst-cve-2024-8698-keycloak-with-zero-knowledge-about-keycloak&#34;&gt;https://huydoppa.hashnode.dev/analyst-cve-2024-8698-keycloak-with-zero-knowledge-about-keycloak&lt;/a&gt;
    </content>
    <updated>2024-10-23T18:06:38Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsw37z2y9hmufenf3gs8c85rvyevzdue3uc8j5jah4rw58vy54ue9gzypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy6dtwxts</id>
    
      <title type="html">PoC for the Untrusted Pointer Dereference in the ks.sys driver ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsw37z2y9hmufenf3gs8c85rvyevzdue3uc8j5jah4rw58vy54ue9gzypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy6dtwxts" />
    <content type="html">
      PoC for the Untrusted Pointer Dereference in the ks.sys driver  &lt;a href=&#34;https://github.com/varwara/CVE-2024-35250&#34;&gt;https://github.com/varwara/CVE-2024-35250&lt;/a&gt;
    </content>
    <updated>2024-10-23T18:03:15Z</updated>
  </entry>

  <entry>
    <id>https://yabu.me/nevent1qqsqsptkzgj3ryhyqk89p07hqu0pd5wkhj8fnyjf6sw04jkkp25djtczypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy6qmn75h</id>
    
      <title type="html">MS Streaming Service Privilege Escalation PoC ...</title>
    
    <link rel="alternate" href="https://yabu.me/nevent1qqsqsptkzgj3ryhyqk89p07hqu0pd5wkhj8fnyjf6sw04jkkp25djtczypqps6a9mddmue9p5ecsa05krt02ydsd24q246plmqf9hthtptwy6qmn75h" />
    <content type="html">
      MS Streaming Service Privilege Escalation PoC &lt;a href=&#34;https://github.com/Dor00tkit/CVE-2024-30090&#34;&gt;https://github.com/Dor00tkit/CVE-2024-30090&lt;/a&gt;
    </content>
    <updated>2024-10-23T18:01:49Z</updated>
  </entry>

</feed>