rayanlecat Profile
rayanlecat

@rayanlecat

Followers
2K
Following
13K
Media
6
Statuses
2K

Pentester | Web and AD security enthusiast

Joined July 2017
Don't wanna be here? Send us removal request.
@rayanlecat
rayanlecat
9 hours
RT @quarkslab: The two bytes that make size matter:.Reverse engineering Apple's iOS 0-click CVE-2025-43300 improved bounds checking fix, by….
0
34
0
@rayanlecat
rayanlecat
9 hours
RT @kevin_mizu: DOMLogger++ v1.0.9 is now out and available! 🎉. This update fixes a lot of issues, including the historical DevTools bug on….
0
24
0
@rayanlecat
rayanlecat
1 day
RT @mpgn_x64: Writeup from @mael91620 is now available 🎉. From coerce into SPN less RBDC, gmsa decryption, dpapi, constraint delegation w/….
github.com
Full write-up for the Active Directory Lab built for Barbhack 2025 by @mpgn and my contributions. - mael91620/Barbhack-2025-AD-writeup
0
36
0
@rayanlecat
rayanlecat
8 days
RT @kevin_mizu: I've released a DOMLogger++ config that helps detect any replacements occurring in a DOMPurify output by inserting and trac….
0
44
0
@rayanlecat
rayanlecat
10 days
RT @quarkslab: Hacking & Barbecue in the south of France. What could possibly be better?.We are giving away a @_barbhack_ ticket to a stude….
0
6
0
@rayanlecat
rayanlecat
1 month
Hello besoin de 2 pass étudiant pour @_barbhack_ 2025 pour @_p4st1s & @theoabel_ .MP si vous avez un plan😄.
1
4
4
@rayanlecat
rayanlecat
1 month
RT @kevin_mizu: I'm happy to release a script gadgets wiki inspired by the work of @slekies, @kkotowicz, and @sirdarckcat in their Black Ha….
0
167
0
@rayanlecat
rayanlecat
1 month
RT @_l0gg: Blog for ToolShell.Disclaimer: The content of this blog is provided for educational and informational purposes only. https://t.c….
0
82
0
@rayanlecat
rayanlecat
2 months
RT @aituglo: I wrote an article on @Bugcrowd talking about my current methodology to approach a hardened target . And I’m pretty happy with….
bugcrowd.com
By staying patient and chaining small gadgets together, you can eventually uncover critical, high-impact bugs.
0
43
0
@rayanlecat
rayanlecat
2 months
RT @_l0gg: While waiting for the Pwn2Own chain, you might want to read this. Disclaimer: This is a bug I discovered by accident, and alread….
0
40
0
@rayanlecat
rayanlecat
2 months
RT @quarkslab: 🚀Ever heard of ControlPlane, software to help you automate tasks on macOS? Turns out, it might also help you become root. Oo….
0
10
0
@rayanlecat
rayanlecat
2 months
RT @_Worty: The part about the 0day I used on the TrackDb web challenge for the FCSC2025 has just been disclosed in the writeup, you can re….
0
24
0
@rayanlecat
rayanlecat
2 months
RT @quarkslab: You finally pwned the Holy Confluence server. What now? Create a user? Reset a password? .🚨Best way to trigger an alert.What….
0
15
0
@rayanlecat
rayanlecat
2 months
Writeups for the @Shutlock CTF 2025 web challenges (mostly blackbox) are up:. Thanks to the @EPITA students and @Interieur_Gouv for organizing a solid CTF
Tweet media one
0
2
12
@rayanlecat
rayanlecat
2 months
RT @TrustedSec: Chrome Remote Desktop can offer red teamers a subtle way to bypass restrictions—if they know how to use it. In this blog, @….
Tweet card summary image
trustedsec.com
0
85
0
@rayanlecat
rayanlecat
2 months
RT @mpgn_x64: Thank you all for joining the Star Wars NetExec workshop at @_leHACK_ 2025 with @_zblurx & @wil_fri3d 🔥🪐. 50 hackers, 1 room….
0
34
0
@rayanlecat
rayanlecat
2 months
Are you at @_leHACK_ tomorrow?.Join us with @volker_carstein at 9PM in Room 3 for a hands-on advanced Kerberos exploitation workshop! 🔥. First to finish all challenges wins a 6-month @exegogol Pro license 👀
Tweet media one
1
3
20
@rayanlecat
rayanlecat
2 months
RT @_atsika: Wanna talk about Maldev, Red Team or Pentest ? I’ll be with @rayanlecat at @quarkslab booth, come to see us 🔥. #lehack https:/….
0
8
0