
rayanlecat
@rayanlecat
Followers
2K
Following
13K
Media
6
Statuses
2K
Pentester | Web and AD security enthusiast
Joined July 2017
RT @quarkslab: The two bytes that make size matter:.Reverse engineering Apple's iOS 0-click CVE-2025-43300 improved bounds checking fix, by….
0
34
0
RT @kevin_mizu: DOMLogger++ v1.0.9 is now out and available! 🎉. This update fixes a lot of issues, including the historical DevTools bug on….
0
24
0
RT @mpgn_x64: Writeup from @mael91620 is now available 🎉. From coerce into SPN less RBDC, gmsa decryption, dpapi, constraint delegation w/….
github.com
Full write-up for the Active Directory Lab built for Barbhack 2025 by @mpgn and my contributions. - mael91620/Barbhack-2025-AD-writeup
0
36
0
RT @kevin_mizu: I've released a DOMLogger++ config that helps detect any replacements occurring in a DOMPurify output by inserting and trac….
0
44
0
RT @quarkslab: Hacking & Barbecue in the south of France. What could possibly be better?.We are giving away a @_barbhack_ ticket to a stude….
0
6
0
Hello besoin de 2 pass étudiant pour @_barbhack_ 2025 pour @_p4st1s & @theoabel_ .MP si vous avez un plan😄.
1
4
4
RT @kevin_mizu: I'm happy to release a script gadgets wiki inspired by the work of @slekies, @kkotowicz, and @sirdarckcat in their Black Ha….
0
167
0
RT @_l0gg: Blog for ToolShell.Disclaimer: The content of this blog is provided for educational and informational purposes only. https://t.c….
0
82
0
RT @aituglo: I wrote an article on @Bugcrowd talking about my current methodology to approach a hardened target . And I’m pretty happy with….
bugcrowd.com
By staying patient and chaining small gadgets together, you can eventually uncover critical, high-impact bugs.
0
43
0
RT @_l0gg: While waiting for the Pwn2Own chain, you might want to read this. Disclaimer: This is a bug I discovered by accident, and alread….
0
40
0
RT @quarkslab: 🚀Ever heard of ControlPlane, software to help you automate tasks on macOS? Turns out, it might also help you become root. Oo….
0
10
0
RT @_Worty: The part about the 0day I used on the TrackDb web challenge for the FCSC2025 has just been disclosed in the writeup, you can re….
0
24
0
RT @quarkslab: You finally pwned the Holy Confluence server. What now? Create a user? Reset a password? .🚨Best way to trigger an alert.What….
0
15
0
Writeups for the @Shutlock CTF 2025 web challenges (mostly blackbox) are up:. Thanks to the @EPITA students and @Interieur_Gouv for organizing a solid CTF
0
2
12
RT @TrustedSec: Chrome Remote Desktop can offer red teamers a subtle way to bypass restrictions—if they know how to use it. In this blog, @….
trustedsec.com
0
85
0
RT @mpgn_x64: Thank you all for joining the Star Wars NetExec workshop at @_leHACK_ 2025 with @_zblurx & @wil_fri3d 🔥🪐. 50 hackers, 1 room….
0
34
0
For more informations :.
lehack.org
leHACK workshops are practical trainings on niche techniques which will improve your skills.
0
0
0
Are you at @_leHACK_ tomorrow?.Join us with @volker_carstein at 9PM in Room 3 for a hands-on advanced Kerberos exploitation workshop! 🔥. First to finish all challenges wins a 6-month @exegogol Pro license 👀
1
3
20
RT @_atsika: Wanna talk about Maldev, Red Team or Pentest ? I’ll be with @rayanlecat at @quarkslab booth, come to see us 🔥. #lehack https:/….
0
8
0
RT @hacknspeak: 🇫🇷🎙️Nouvel épisode du podcast Hack'n Speak accompagné de @rouge_cravate pour parler de son tool open source BloodyAD 👔. On….
creators.spotify.com
Twitter: https://x.com/mpgn_x64Twitter: https://x.com/rouge_cravateGithub bloodyad https://github.com/CravateRouge/bloodyADBlogpost: https://cravaterouge.com/articles/
0
9
0