ITSecurityguard Profile Banner
Patrik Fehrenbach Profile
Patrik Fehrenbach

@ITSecurityguard

Followers
31K
Following
6K
Media
1K
Statuses
5K

rɪsˈpɒnsəbl dɪsˈkləʊʒə https://t.co/UKFhw5EBwf https://t.co/uCOkOOoNnP

Freiburg
Joined January 2013
Don't wanna be here? Send us removal request.
@ITSecurityguard
Patrik Fehrenbach
8 months
Made a simple dashboard to help track/search CVEs and security vulnerabilities in near real-time. No fancy stuff - just a clean interface to see what's burning in the security world right now. (it's Ivanti🙈) https://t.co/uQ88UEWo0L) https://t.co/6e32nsFY68 Feedback welcome!
Tweet media one
14
113
438
@ITSecurityguard
Patrik Fehrenbach
2 months
👀 Pre-Auth RCEs and an XXE in Adobe AEM Manager Forms 😏 give it a read!
@infosec_au
shubs
2 months
The @SLCyberSec research team is releasing our final research post for our Christmas in July efforts, two RCEs and one XXE (all pre-auth) in Adobe Experience Manager Forms. One of the RCEs and the XXE still do not have official patches:
1
2
52
@infosec_au
shubs
2 months
The @SLCyberSec research team is releasing our final research post for our Christmas in July efforts, two RCEs and one XXE (all pre-auth) in Adobe Experience Manager Forms. One of the RCEs and the XXE still do not have official patches:
Tweet card summary image
slcyber.io
Vulnerabilities in AEM Forms The Searchlight Cyber Research Team discovered and disclosed three critical vulnerabilities in Adobe Experience Manager Forms to Adobe in late April 2025. As of writing...
6
60
224
@irsdl
Soroush Dalili
2 months
I have launched YSoNet ( https://t.co/9BofGcFaWh) and added #SharePoint CVE-2025-49704 payload generator to it as the first thing. Here is how this can work: Running command: ``` ysonet.exe -p sharepoint --cve=CVE-2025-49704 -var 1 -c "calc" ``` Running C# code: ``` ysonet.exe
Tweet card summary image
github.com
Deserialization payload generator for a variety of .NET formatters - irsdl/ysonet
4
125
479
@samwcyo
Sam Curry
2 months
When applying for a job at McDonald's, over 90% of franchises use "Olivia," an AI-powered chatbot. We (@iangcarroll and I) discovered a vulnerability that could allow an attacker to access the over 64 million chat records using the password "123456". https://t.co/dBqpRpdp9T
Tweet card summary image
ian.sh
When applying for a job at McDonald's, over 90% of franchises use "Olivia," an AI-powered chatbot. We discovered a vulnerability that could allow an attacker to access more than 64 million job...
18
122
469
@Hack_All_Things
Roy Davis
3 months
Hey peeps! As many of you know, I was diagnosed with ALS nearly 2 years ago. I continue to fight a losing battle with it every day. I am determined to live long enough to attend this ALS Walk fundraiser in October. I would sincerely appreciate any small donation you can spare to
10
17
172
@ITSecurityguard
Patrik Fehrenbach
3 months
Honestly a bit surreal, but I’ll be joining @assetnote as a Security Researcher soon🦆. Excited to be part of such a brilliant team.
Tweet media one
32
5
310
@ITSecurityguard
Patrik Fehrenbach
3 months
We all know who the real #1 US Hacker on HackerOne is 👇
Tweet media one
32
5
200
@infosec_au
shubs
3 months
How do we turn bad SSRF (blind) into good SSRF (full response)? The @assetnote Security Research team at @SLCyberSec used a novel technique involving HTTP redirect loops and incremental status codes that leaked the full HTTP resp. It may work elsewhere! https://t.co/CTSTEtKiD1
Tweet media one
6
180
621
@ret2systems
RET2 Systems
3 months
What does it take to hack a @Sonos Era 300 for Pwn2Own? Take a look at our process of adapting existing research, establishing a foothold, and exploiting media parsers for unauthenticated RCE over the network🔥👇 https://t.co/FxSbV3uEBp
Tweet media one
1
48
157
@ITSecurityguard
Patrik Fehrenbach
3 months
Happy Pride Month! Celebrating all the courage it takes to live your truth and love openly. God is love, and whoever lives in love lives in God, and God in them.' - 1 John 4:16 ❣️
0
0
10
@ITSecurityguard
Patrik Fehrenbach
4 months
Tweet media one
5
1
29
@ITSecurityguard
Patrik Fehrenbach
4 months
Lads, its on
@njcve_
Nathan Jones
4 months
COME AND HACK ALONG WITH US IN LONDON! share this if you can so we can reach more people 😀 https://t.co/GWfqRtT9y9 #hackerone #BugBounty #hackathon
0
0
2
@ITSecurityguard
Patrik Fehrenbach
4 months
I am killing it lately with the bug bounty stuff
Tweet media one
2
1
15
@ITSecurityguard
Patrik Fehrenbach
4 months
Just waiting on the AI that cleans up AI-generated slop. Should be any day now. 🤌🏻
2
0
11
@zachxbt
ZachXBT
4 months
1/ In late 2023 a former Yuga Labs security researcher was stopped at the airport after law enforcement mistakenly linked them to a $1.1M phishing theft from a Bored Ape owner. Here’s an investigation into where the stolen funds went and who’s actually responsible.
Tweet media one
Tweet media two
Tweet media three
256
593
4K
@avlidienbrunn
­Mathias Karlsson
4 months
I made a tool to help test archive (zip/tar) extraction bugs (synk working directory into archive, add path traversals, links, permissions, etc):
Tweet card summary image
github.com
Archive Alchemist is a tool for creating specially crafted archives to test extraction vulnerabilities. - avlidienbrunn/archivealchemist
1
31
171
@ITSecurityguard
Patrik Fehrenbach
5 months
👀
0
0
1
@ITSecurityguard
Patrik Fehrenbach
5 months
MITRE’s CVE funding just dried up because the US can’t get its paperwork in order. Maybe global cybersecurity shouldn’t depend on one country’s clown show. Just a thought.
2
2
37