cousky
@cousky_
Followers
44
Following
18
Media
0
Statuses
9
Pentest & Vuln Research @Doyensec
Joined September 2024
#Michelin CERT was credited for CVE-2025-53072 and CVE-2025-62481, two pre-auth RCEs affecting #Oracle E-Business. Both are easy to exploit. Immediate remediation is advised. #security @BleepinComputer @watchtowrcyber
0
1
3
Little introduction for my next talk @hack_lu , this article, co-authored with @cousky_ present all details of the full exploit chain that impacted Palo Alto global protect :
blogit.michelin.io
Summary This article delves into vulnerabilities in the Palo Alto GlobalProtect VPN client discovered by Michelin Red Team (Yassine Bengana and Myself) and identified as CVE-2024-5921, CVE-2025-0117,...
0
3
3
#Michelin CERT was also acknowledged for discovering CVE-2024-38832 and CVE-2024-38833, which affect VMware Aria Operations. Additional vulnerabilities are still undergoing the disclosure process. https://t.co/zkGj9CjqTQ
#security #bugbounty @cousky_
support.broadcom.com
0
2
2
Hoping that we can release our own article soon, featuring our additional attack vectors and analysis, stay tuned 🤠
#Michelin CERT was acknowledged for identifying CVE-2024-5921, which impacts #PaloAlto GlobalProtect. A detailed report was sent to their PSIRT team on February 26th, demonstrating how to impersonate a legitimate portal and fully compromise a workstation. #security @cousky_
1
3
10
A new open-source tool from @BitK_ reveals how popular browsers parse HTML – simplifying the hunt for mutation XSS and opening up new horizons in security research 🔬 Read about this valuable addition to your 'Hacker's Toolbox' in our latest blog post 👇 https://t.co/rQyRdhseP5
yeswehack.com
Learn about Dom-Explorer, a new open-source tool for understanding how popular browsers parse HTML and uncovering mutation XSS vulnerabilities.
3
58
160
Hi, here's my latest article on API hooking from a red/blue team perspective. I explore driver programming to leverage kernel callbacks to inject hooks into every new process on the system. Also, you'll find a script to detect inline hooks in a DLL. https://t.co/dZNMZ3adEz
0
8
11
New article published showcasing a Client-Side Path Traversal bug in Grafana, leading to complete takeover in the worst-case scenario🤠 Props to the Grafana team for the quick response !
Write-up of Grafana vulnerability (CVE-2023–5123) found by #Michelin CERT team. Client-Side Path traversal struck again ! #Security #Writeup @cousky_
https://t.co/kK5DPTKDn1
0
2
9