txambe.bsky.social
@txambe.bsky.social
Burp Suite extension that adds built-in MCP tooling, AI-assisted analysis, privacy controls, passive and active scanning and more

github.com/six2dez/burp...
GitHub - six2dez/burp-ai-agent: Burp Suite extension that adds built-in MCP tooling, AI-assisted analysis, privacy controls, passive and active scanning and more
Burp Suite extension that adds built-in MCP tooling, AI-assisted analysis, privacy controls, passive and active scanning and more - six2dez/burp-ai-agent
github.com
January 29, 2026 at 11:53 AM
Reposted
Swarmer Tool Evading EDR With a Stealthy Modification on Windows Registry for Persistence
Swarmer Tool Evading EDR With a Stealthy Modification on Windows Registry for Persistence
Praetorian Inc. has publicly released Swarmer, a tool enabling low-privilege attackers to achieve stealthy Windows registry persistence by sidestepping Endpoint Detection and Response (EDR) monitoring. Deployed operationally since February 2025, Swarmer exploits mandatory user profiles and the obscure Offline Registry API to modify the NTUSER hive without triggering standard registry hooks. Traditional registry persistence via HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run keys is easily detected. EDR tools hook APIs like RegSetValue, logging, and flagging modifications. Swarmer bypasses this by leveraging mandatory user profiles, a legacy Windows feature for enterprise profile enforcement. In mandatory profiles, NTUSER.MAN overrides the standard NTUSER.DAT hive in %USERPROFILE% at login. Low-privilege users can create NTUSER.MAN by copying and renaming NTUSER.DAT. However, editing the loaded hive requires standard APIs, alerting EDR. Swarmer solves this using Offreg.dll, Microsoft’s Offline Registry Library, designed for offline hive manipulation during setup or forensics. Microsoft warns against bypassing registry security with Offreg, but Swarmer ignores this. Functions like ORCreateHive, OROpenHive, ORCreateKey, ORSetValue, and ORSaveHive allow full hive construction without Reg* API calls, evading Process Monitor, ETW, and most EDR behavioral analytics, praetorian said . Swarmer Workflow and Implementation Swarmer’s workflow is efficient: Export HKCU via  reg export  or TrustedSec’s reg_query Beacon Object File (BOF) to avoid disk artifacts. Modify the export (e.g., add Run key entries). Run Swarmer:  swarmer.exe exported.reg NTUSER.MAN  or with startup flags:  swarmer.exe --startup-key "Updater" --startup-value "C:\Path\To\payload.exe" exported.reg NTUSER.MAN . Drop NTUSER.MAN into %USERPROFILE%. For C2 implants, parse BOF output directly:  swarmer.exe --bof --startup-key "Updater" --startup-value "C:\Path\To\payload.exe" bof_output.txt NTUSER.MAN . Built in C# for P/Invoke ease and offline use, Swarmer works as an EXE or PowerShell module: text Import-Module '.\swarmer.dll' Convert-RegToHive -InputPath '.\exported.reg' -OutputPath '.\NTUSER.MAN' A workaround fixes ORCreateHive’s invalid hive output: RegLoadAppKeyW creates a base hive (non-admin), then Offreg populates it. Feature Details Platforms Windows 10/11 Privileges Low (user-level) Evasion No Reg* APIs; optional no-disk BOF Payload Types Run keys, custom registry mods Limitations and Detection Opportunities Swarmer has caveats: Caveat Impact One-shot Can’t update without admin; profile becomes mandatory, resetting user changes. Login-required Activates only on logout/login; survives reboots. HKCU-only No HKLM access. Edge cases Possible login corruption; test first. Detection includes NTUSER.MAN creation outside enterprise tools, Offreg.dll loads in non-standard processes, or profile anomalies. Payload execution at login remains visible obfuscate it. Defenders should monitor user profile directories for NTUSER.MAN, baseline Offreg usage, and profile integrity at login. Swarmer highlights Windows’ legacy cruft predating modern EDR. This disclosure arms blue teams against obscure persistence, urging scrutiny of Windows’ dusty corners. Follow us on Google News , LinkedIn , and X for daily cybersecurity updates. Contact us to feature your stories. The post Swarmer Tool Evading EDR With a Stealthy Modification on Windows Registry for Persistence appeared first on Cyber Security News .
cybersecuritynews.com
January 29, 2026 at 6:58 AM
Solo 1 semana para #HoneyCON25. Celebramos 10 años del congreso de #ciberseguridad más familiar
Reserva tu plaza 👉 eventbrite.es/e/entradas-hon…

Programa y ponencias �� honeysec.ininfo

Gracias a @CSA y @Elastic por su patroci#CyberSecurityc#Hackinga#HoneySecneySec
https://eventbrite.es/e/entradas-hon…
October 20, 2025 at 7:01 AM
Reposted
Hacking Open Docker Registries: Pulling, Extracting, and Exploiting Images.
Hacking Open Docker Registries: Pulling, Extracting, and Exploiting Images.
Discovering secrets in exposed container images and leveraging misconfigurations for deeper access
infosecwriteups.com
March 20, 2025 at 3:29 AM
Quien nos iba a decir cuando comenzamos con #HoneySEC y #HoneyCON que llegaríamos a las 10 ediciones, pero sí. ESE MOMENTO HA LLEGADO.

#HoneyCON25 está aquí y queremos que sea muestra edición más especial, con la celebración de nuestro décimo aniversario.

📆 30, 31 oct y 1 nov.
March 11, 2025 at 6:36 PM
Reposted
CVE-2025-27110: ModSecurity Vulnerability Leaves Web Applications Exposed
CVE-2025-27110: ModSecurity Vulnerability Leaves Web Applications Exposed
Understand the implications of CVE-2025-27110 on web application security and how it may allow attacks to bypass defenses.
securityonline.info
March 1, 2025 at 7:30 AM
Reposted
My First Bug: How I Was Able to Bypass the WAF and Uncover a Reflected XSS
My First Bug: How I Was Able to Bypass the WAF and Uncover a Reflected XSS
Hello everyone, I’m Fares. Today, I’ll share the story of how I successfully identified a reflected XSS vulnerability within a public bug…
infosecwriteups.com
February 16, 2025 at 2:19 PM
Reposted
Hiding Linux Processes with Bind Mounts
Hiding Linux Processes with Bind Mounts
Lately I’ve been thinking about Stephan Berger’s recent blog post on hiding Linux processes with bind mounts. Bottom line here is that if you have an evil process you want to hide, use …
buff.ly
February 1, 2025 at 9:54 AM
Reposted
Con solo 30 líneas de código....

Investigadores canadienses afirman que un ajuste del kernel de #Linux podría reducir el consumo de energía de los centros de datos en un 30% - www.meneame.net/go?id=4022923
Investigadores canadienses afirman que un ajuste del kernel de Linux podría reducir el consumo de energía de los centros de datos en un 30% > potencial enorme
El ajuste propuesto consta de solo 30 líneas de código y reorganiza operaciones dentro de la pila de redes de Linux, mejorando la eficiencia energética y el rendimiento.
www.meneame.net
January 29, 2025 at 1:28 PM
Reposted
/etc/init.d/bluesky start > /dev/world 2>&1 & echo "Twitter > /dev/null"
November 20, 2024 at 11:11 AM
Reposted
🪳Complete Bug Bounty Recon Fundamentals

🔗https://imshewale.medium.com/complete-bug-bounty-recon-fundamentals-f283dee5c370

🔖#infosec #cybersecurity #hacking #pentesting

👤beacons.ai/cyberkid1987
👤t.me/VasileiadisAnastasis
👥t.me/infosec101

🔗en.iguru.gr/infosec
🔗en.hacks.gr/hacking-tutorials
March 12, 2024 at 6:45 PM