Filip Dragovic Profile
Filip Dragovic

@filip_dragovic

Followers
7K
Following
6K
Media
198
Statuses
3K

My research unless stated otherwise. My opinions are my own and do not represent the views of my employer. Red Team @MDSecLabs

Joined March 2018
Don't wanna be here? Send us removal request.
@_xpn_
Adam Chester 🏴‍☠️
4 days
New blog post is up exploring a vuln I found in Claude Code (CVE-2025-64755) allowing arbitrary file write without a consent prompt. New tech is always fun to explore, hopefully this post gives you some hints as to future research :)
Tweet card summary image
specterops.io
This blog post explores a bug, (CVE-2025-64755), I found while trying to find a command execution primitive within Claude Code to demonstrate the risks of web-hosted MCP to a client.
5
81
332
@SpecterOps
SpecterOps
6 days
SCCM’s AdminService uses Entra tokens without confirming the UPN exists in AD. A crafted synced UPN can let an attacker impersonate the site server. Microsoft now requires on-prem SID matching (CVE-2025-59501). Great deep dive by @unsigned_sh0rt! https://t.co/FGAHfaXHsY
0
64
171
@decoder_it
Andrea P
11 days
Brand-new admin protection bypasses by @tiraniddo As usual, awesome work! 💪💪💪 https://t.co/PysmzK9XFL  and
0
25
96
@filip_dragovic
Filip Dragovic
14 days
Microsoft fixed 2 of my bugs this patch tuesday: DoS in Routing and Remote Access Service https://t.co/gvzdTdkIL1 And one LPE https://t.co/9FsdtQAwn1 And i finally reached goal of 50 cve's lol
8
14
173
@OhmSecurities
Shane Jones
20 days
Well that sucked. Yours truly is looking for work - reputable red teamer, pentester with 10 years experience. OSCP/GRTE certifications, also have experience with threat intelligence. Ex-JPMC/Optiv/TrustedSec
22
50
266
@filip_dragovic
Filip Dragovic
28 days
I am getting old 🤣🤣
0
0
4
@bl4sty
blasty
29 days
thanks to everyone who attended my #TheSAS2025 talk "Typographic hit job: when fonts pull the trigger". 🙏 I've written an accompanying blogpost that goes over all the details:
Tweet card summary image
haxx.in
Last year we (PHP HOOLIGANS) competed in Pwn2Own (ireland, 2024) once again. One of our (succesful) entries was against a little pet peeve target of mine, the CANON ImageCLASS printer. In this post...
4
42
136
@MDSecLabs
MDSec
29 days
Interested in an alternative approach to sleep masking for you malware? Check-out our latest blog post "Function Peekaboo: Crafting self masking functions using LLVM" by @saab_sec https://t.co/CTaydmHZi5
1
69
211
@filip_dragovic
Filip Dragovic
29 days
👏👏
@MickeySpajic
Milojko Spajić
30 days
Sjutra po hitnoj proceduri donosimo odluku o privremenom ukidanju bezviznog režima za državljane Turske. U cilju očuvanja ekonomske aktivnosti i dobrih bilateralnih odnosa, u narednom periodu iniciraćemo intenzivne razgovore sa Republikom Turskom kako bi u duhu dobre saradnje i
0
0
0
@bohops
bohops
1 month
Last month, @d_tranman and I gave a talk @MCTTP_Con called "COM to the Darkside" focusing on COM/DCOM cross-session and fileless lateral movement tradecraft. Check out the slides here: https://t.co/1KNln1ldzF Recording should be released soon.
Tweet card summary image
github.com
Slides and resources from MCTTP 2025 Talk. Contribute to bohops/COM-to-the-Darkside development by creating an account on GitHub.
1
80
251
@s1ckb017
Michele Campa
1 month
A zero day I found last year has been patched on October (CVE-2025-55680) :(, it was a nice and easy patch bypass. Here the write-up
Tweet card summary image
blog.exodusintel.com
By Michele Campa Overview In this blog post we take a look at a race condition we found in Microsoft Windows Cloud Minifilter (i.e. cldflt.sys ) in March 2024. This vulnerability was patched in...
1
54
194
@MDSecLabs
MDSec
1 month
The @MDSecLabs red team is hiring! If you're an experienced red team operator interested in conducting multi-month operations within a small and technically gifted team reach out to us! ✊
3
29
149
@thezdi
Trend Zero Day Initiative
2 months
Crafting a Full Exploit RCE from a Crash in Autodesk Revit RFA File Parsing: Trend ZDI researcher Simon Zuckerbraun shows how to go from a crash to a full exploit - & he provides you tools to do the same, including his technique used to get ROP execution.
Tweet card summary image
zerodayinitiative.com
In April of 2025, my colleague Mat Powell was hunting for vulnerabilities in Autodesk Revit 2025. While fuzzing RFA files, he found the following crash ( CVE-2025-5037 / ZDI-CAN-26922 , addressed by...
0
31
167
@DiscussingFilm
DiscussingFilm
2 months
‘DEXTER: RESURRECTION’ has been renewed for Season 2 at Paramount+
716
4K
53K
@dtmsecurity
DTM
2 months
Red Treat was incredible. Thank you so much to @domchell @StanHacked @MarcOverIP for your hard work making another successful year. The calibre of content shared the conversations was 👌and @max__grim thanks for another swanky badge
@domchell
Dominic Chell 👻
2 months
#RedTreat2025 is a wrap @StanHacked @MarcOverIP - thanks to all the speakers and the panel team for an extra awesome con this year 🫶
2
2
21
@domchell
Dominic Chell 👻
2 months
#RedTreat2025 is a wrap @StanHacked @MarcOverIP - thanks to all the speakers and the panel team for an extra awesome con this year 🫶
5
7
71
@unsigned_sh0rt
Garrett
2 months
Nice! Excited to be speaking at @BSidesPDX again this October. This one was a fun bug ☁️😜
0
5
35
@domchell
Dominic Chell 👻
2 months
This release is probably going to be one of our biggest and most impactful! Kudos to the team @peterwintrsmith @modexpblog @s4ntiago_p @GigelV41464 @saab_sec 🙌
@MDSecLabs
MDSec
2 months
We're really bringing the 🔥 with our next Nighthawk release - Janus - https://t.co/hxp6M8XkWO
3
14
101