PPT SWARM

PT SWARM

@ptswarm🔌 Гаджеты🇬🇧 English📅 март 2026 г.

Positive Technologies Offensive Team: twitter.com/ptswarm This is the channel where we share articles/vulnerabilities/scripts/etc, not necessarily authored by us, that we find interesting

📊 Полная статистика📝 Все посты
##39
7.0K
Подписчики
8.3K
Ср. охват
117.5%
Вовлечённость
20
Постов
В день

Графики

📊 Средний охват постов

📉 ERR % по дням

📋 Публикации по дням

📎 Типы контента

Лучшие публикации

20 из 20
Pptswarm
ptswarm
22 июл., 16:39

👑 Our researcher has discovered LPE in VMWare Tools (CVE-2025-22230 & CVE-2025-22247) via VGAuth! Write-up by the one who broke it: Sergey Bliznyuk https://swarm.ptsecurity.com/the-guest-who-could-exploiting-lpe-in-vmware-tools/

👁 20.5K📷 photo
Pptswarm
ptswarm
3 июн., 19:46

⚠️ We've reproduced CVE-2025-49113 in Roundcube. This vulnerability allows authenticated users to execute arbitrary commands via PHP object deserialization. If you're running Roundcube — update immediately!

👁 16.5K🎬 video
Pptswarm
ptswarm
24 июл., 19:31

🚨 We've launched dbugs.ptsecurity.com, a new home for vulnerabilities. More than CVEs. More than MITRE. ✅ Trends & Insights ✅ AI-generated, multi-source vulnerability descriptions ✅ Researcher credits Explore now: https://dbugs.ptsecurity.com

👁 15.4K📷 photo
Pptswarm
ptswarm
16 дек., 19:30

🇻🇳 At the Positive Hack Talks in Hanoi, our blue team member naumovax shared valuable insights: 1️⃣ Architecture of an automation tool for detecting malware in the network 2️⃣ Key features you should add to your tool 3️⃣ Our refined Suricata rules Link 👉 https://static.ptsecurity.com/events/stratocaster-how-we-automated-the-routine-search-for-unknown-malware-in-the-network-traffic.pdf Link to our Suricata rules: https://rules.ptsecurity.com/

👁 9.9K📷 photo
Pptswarm
ptswarm
13 янв., 10:10

Exploiting SSTI in a Modern Spring Boot Application (3.3.4) 👤 by parzel The article explores exploiting a Server-Side Template Injection (SSTI) vulnerability in a Spring Boot 3.3.4 application using Thymeleaf, leading to Remote Code Execution (RCE). It highlights the process of injecting malicious input to trigger Java reflection and bypass security defenses in modern framework. The post provides a detailed walkthrough of achieving RCE despite the robust safeguards present, emphasizing the comp...

👁 9.4K📷 photo
Pptswarm
ptswarm
23 янв., 14:12

🎮 Xbox 360 security in details: the long way to RGH3. Read the exclusive story about the chipless and reliable Xbox 360 modding method by 15432h 🔗https://swarm.ptsecurity.com/xbox-360-security-in-details-the-long-way-to-rgh3/

👁 8.4K📷 photo
Pptswarm
ptswarm
27 июн., 16:40

🦊 Mozilla Foundation fixed CVE-2025-6430, discovered by our researcher Daniil Satyaev! This vulnerability allows the Content-Disposition: attachment header to be ignored if the page is opened using <embed> or <object>, resulting in files being displayed instead of downloaded.

👁 8.0K📷 photo
Pptswarm
ptswarm
29 дек., 15:17

📑 A new article from our researchers Aleksey Solovev, Nikita Sveshnikov and Vladimir Razov — "Blind trust: what is hidden behind the process of creating your PDF file?". https://swarm.ptsecurity.com/blind-trust-what-is-hidden-behind-the-process-of-creating-your-pdf-file/

👁 7.8K
Pptswarm
ptswarm
27 мая, 11:10

Don't Call That "Protected" Method: Dissecting an N-Day vBulletin RCE 👤 by Egidio Romano The article analyzes a critical Unauthenticated Remote Code Execution vulnerability (CVE-2025-48827) in vBulletin, which becomes exploitable when running on PHP 8.1 or newer. The vulnerability stems from vBulletin’s misuse of ReflectionMethod::invoke(), which in PHP 8.1+ no longer blocks access to protected methods by default. As a result, attackers can remotely trigger sensitive internal functions original...

👁 7.8K📷 photo
Pptswarm
ptswarm
27 февр., 19:22

📟 Our researcher a1exdandy has uncovered vulnerabilities in GD32 microcontrollers (GigaDevice) that bypass protection mechanisms, allowing memory extraction. The article 👉 https://swarm.ptsecurity.com/gigavulnerability-readout-protection-bypass-on-gigadevice-gd32-mcus/

👁 7.7K📷 photo

Типы хуков

Нейтральный13 | 7.3K просм.
Статистика5 | 11.2K просм.
Вопрос2 | 7.5K просм.

Длина постов

Средние (200-500)17 | 8.3K просм.
Длинные (500-1000)2 | 8.6K просм.
Очень длинные (1000+)1 | 7.4K просм.

Влияние эмодзи

8.1K
С эмодзи (5)
8.3K
Без эмодзи (15)
-2.1% охвата

Типы контента

📷
11
photo
9.9K просм.
🎬
3
video
8.6K просм.
📝
6
text
5.2K просм.