cfreal_ Profile Banner
Charles Fol Profile
Charles Fol

@cfreal_

Followers
4K
Following
2K
Media
19
Statuses
269

@Synacktiv – previously @ambionics @LexfoSecurite – blogs: https://t.co/cLoNdCGPU7 https://t.co/JVMLjUzTJU https://t.co/t9a5IcOXSU

Joined July 2018
Don't wanna be here? Send us removal request.
@cfreal_
Charles Fol
2 years
The first part of the blog series: #Iconv, set the charset to RCE. We'll use #PHP filters and #CVE-2024-2961 to get a very stable code execution exploit from a file read primitive. #cnext
@ambionics
Ambionics Security
2 years
Iconv, set the charset to RCE: in the first blog post of this series, @cfreal_ will show a new exploitation vector to get RCE in PHP from a file read primitive, using a bug in iconv() (CVE-2024-2961)
8
58
171
@LexfoSecurite
Lexfo
2 months
🔔 New research from Lexfo on pre- & post-authentication vulnerabilities in WSO2 products — uncovering bypasses, RCE, SSRF, CSRF, and account-takeover risks. See our detail article → https://t.co/1jNmsIhdZl #cybersecurity #infosec #offensivesecurity #pentest #WSO2
Tweet card summary image
blog.lexfo.fr
Uncovering bypasses, RCE, SSRF, CSRF, and account-takeover vulnerabilities in WSO2 products.
0
15
61
@GrapheneOS
GrapheneOS
3 months
This article by Nicolas Stefanski at Synacktiv provides a high quality technical overview of our hardened_malloc project used in GrapheneOS: https://t.co/VmpQGTZSDE It has great coverage of the memory layout, memory tagging integration, slab quarantines and allocation approach.
Tweet card summary image
synacktiv.com
Exploring GrapheneOS secure allocator: Hardened Malloc
7
70
453
@cfreal_
Charles Fol
6 months
lightyear just got 6 times faster! Although I now work at @Synacktiv, I proposed a PR for the tool to support threading and compression, greatly reducing the time required to dump a file. Dumping the demo /etc/passwd now takes 48s instead of 5m30. https://t.co/d7n4baN12a
Tweet card summary image
github.com
lightyear is a tool to dump files in tedious (blind) conditions using PHP filters - ambionics/lightyear
1
28
106
@plopz0r
Alain M.
7 months
Just finished my talk at #securityfest, you can find all the details in my latest blog post:
1
16
27
@Chocapikk_
Chocapikk 🤘🏻
7 months
🚨 New unauthenticated #RCE module for vBulletin 5.1.0-6.0.3 landed in Metasploit! No CVE assigned, but credit to Egidio Romano (EgiX) for the original write-up: https://t.co/qxmvpU6l43 🔗 PR: https://t.co/j1G7wp2L9Z
1
76
288
@Synacktiv
Synacktiv
9 months
Synacktiv is looking for an additional team leader in Paris for its Reverse-Engineering Team! Find out if you are a good candidate by reading our offer (🇫🇷). https://t.co/Djr5KdvCH5
1
22
57
@catc0n
Caitlin Condon
9 months
The subtitle of this blog is "a plea to security news outlets to please do their due diligence before slapping 'exploited in the wild' headlines on new CVEs"
Tweet card summary image
rapid7.com
Apache Tomcat CVE-2025-24813: What You Need to Know | Rapid7 Blog
0
11
37
@phithon_xg
Phith0n
9 months
#vulhub #CyberSecurity #opensource #infosec Announcing some exciting news from the Vulhub project! We've been busy making big improvements: 1⃣. Completely rebuilt our website from the ground up! Check it out: https://t.co/fMkOD9YXuL
1
7
37
@AirbusSecLab
Airbus Security Lab
9 months
Passionate about hacking & cybersecurity? Airbus is looking for a Vulnerability Research & Exploitation Specialist in France! 💻 Reverse engineering, Red Teaming ✈️Join a global aerospace & defense leader Apply now! 🚀 https://t.co/wheJECIvtJ
0
13
13
@cfreal_
Charles Fol
10 months
Great new PHP research, especially since it uses both wrapwrap and lightyear!
@ptswarm
PT SWARM
10 months
🔥 The "impossible" XXE in PHP? Not so impossible anymore. Our researcher Aleksandr Zhurnakov discovered an interesting combination of PHP wrappers and a feature of XML parsing in libxml2 to exploit it. Read: https://t.co/GuW2Vf5qLN
0
3
50
@ptswarm
PT SWARM
10 months
🔥 The "impossible" XXE in PHP? Not so impossible anymore. Our researcher Aleksandr Zhurnakov discovered an interesting combination of PHP wrappers and a feature of XML parsing in libxml2 to exploit it. Read: https://t.co/GuW2Vf5qLN
0
113
327
@cfreal_
Charles Fol
11 months
#ten (and thus my exploits) is now compatible with python 3.13. Thanks @acervoise for the heads up.
1
0
12
@cfreal_
Charles Fol
11 months
This year again, I am lucky enough to get nominated twice for the Top Ten Hacking Techniques, for my research on iconv and PHP, and lightyear. This time feels a bit special however, as these are my last blog posts on @ambionics. https://t.co/arnuvdqxCq https://t.co/8mcXRSfKSt
Tweet card summary image
ambionics.io
In this blog post, we describe new techniques to dump files in PHP leveraging filters, and a tool that does it, lightyear.
@albinowax
James Kettle
11 months
Voting is now live for the Top Ten (New) Web Hacking Techniques of 2024! Browse the nominations & cast your votes here:
1
12
89
@lukejahnke
Luke Jahnke
1 year
🧵My latest blog post is live 🔥 Read it to learn what SafeMarshal is and *two* very different ways to escape and get RCE! https://t.co/OxRAkwhFp7
2
28
107
@cfreal_
Charles Fol
1 year
0
0
3
@symfony
Symfony
1 year
🔐 CVE-2024-50340: Ability to change environment from query ➡️ https://t.co/ittWVy2JjE #symfony
Tweet card summary image
symfony.com
CVE-2024-50340: Ability to change environment from query
2
19
60
@cfreal_
Charles Fol
1 year
LIGHTYEAR: - Can dump large files, even through a GET parameter - Retrieves characters using dichotomy - Does not cause PHP warnings
@ambionics
Ambionics Security
1 year
We're proud to announce LIGHTYEAR, a tool that let you dump files, blind, in PHP, based on a new algorithm. https://t.co/GG4tSNnUCf
0
7
32
@ambionics
Ambionics Security
1 year
We're proud to announce LIGHTYEAR, a tool that let you dump files, blind, in PHP, based on a new algorithm. https://t.co/GG4tSNnUCf
Tweet card summary image
ambionics.io
In this blog post, we describe new techniques to dump files in PHP leveraging filters, and a tool that does it, lightyear.
0
91
247
@cfreal_
Charles Fol
1 year
3
30
112