From POC to RCE with reverge

From POC to RCE with reverge Last month, Securifera publicly launched our attack surface management tool, reverge, on the AWS Marketplace. While we’re still planning to publish blog posts and videos to guide users through setup and usage, we wanted to give an example of what reverge can do by demonstrating how [...]

By |2025-06-09T00:46:48+00:00June 9th, 2025|BUG BOUNTY, EXPLOITS, PENTESTING, RED TEAM|0 Comments

Introducing Reverge

Introducing Reverge: An Attack Surface Management Platform by Securifera In today’s complex digital ecosystems, organizations struggle to maintain visibility over sprawling infrastructure, cloud services, and third-party integrations. Traditional vulnerability management tools often fall short in providing real-time, actionable insight into an organization's external exposure. That’s why we’re excited to introduce Reverge, Securifera’s [...]

By |2025-05-14T14:05:17+00:00May 14th, 2025|BUG BOUNTY, PENTESTING, SECURIFERA|0 Comments

Vocera Report Server Pwnage

This article is in no way affiliated, sponsored, or endorsed with/by Vocera Communications or Stryker Corporation. All graphics are being displayed under fair use for the purposes of this article. Quest for RCE Last year during a routine penetration test, our team came across a interesting target called Vocera Report Server [...]

By |2024-04-15T14:25:43+00:00April 24th, 2023|BUG BOUNTY, EXPLOITS, PENTESTING|0 Comments

Attacking .NET Web Services

This article is in no way affiliated, sponsored, or endorsed with/by Siemens Healthineers or Microsoft Corporation. All graphics are being displayed under fair use for the purposes of this article. Last year I spent some time looking for vulnerabilities in a commercial cardiovascular imaging web application called  Syngo Dynamics. This product is [...]

By |2024-04-15T14:25:45+00:00March 6th, 2023|BUG BOUNTY, EXPLOITS, PENTESTING|0 Comments

Operation Eagle Eye

This article is in no way affiliated, sponsored, or endorsed with/by Fidelis Cybersecurity. All graphics are being displayed under fair use for the purposes of this article. Operation Eagle Eye Who remembers that movie about 15 years ago called Eagle Eye? A supercomputer has access to massive amounts of data, introduce [...]

By |2024-04-15T14:25:47+00:00June 24th, 2021|EXPLOITS, PENTESTING|0 Comments

MesaLabs AmegaView: Information Disclosure to RCE

This article is in no way affiliated, sponsored, or endorsed with/by MesaLabs. All graphics are being displayed under fair use for the purposes of this article. During a recent assessment, multiple vulnerabilities of varied bug types were discovered in the MesaLabs AmegaView Continous Monitoring System, including command injection (CVE-2021-27447, CVE-2021-27449), improper authentication (CVE-2021-27451), [...]

By |2024-04-15T14:25:48+00:00June 4th, 2021|EXPLOITS, PENTESTING|0 Comments

Hacking Citrix Storefront Users

This article is in no way affiliated, sponsored, or endorsed with/by Citrix Systems, Inc. All graphics are being displayed under fair use for the purposes of this article. Hacking Citrix Storefront Users With the substantial shift from traditional work environments to remote/telework capable infrastructures due to COVID-19, products like Citrix [...]

By |2024-04-15T14:25:49+00:00May 26th, 2021|PENTESTING, SECURIFERA|0 Comments

BMC Patrol Agent – Domain User to Domain Admin – Part 2

**Securifera is in no way affiliated, sponsored, or endorsed with/by BMC. All graphics produced are in no way associated with BMC or it's products and were created solely for this blog post. All uses of the terms BMC, PATROL, and any other BMC product trademarks is intended only for identification purposes and is to [...]

By |2024-04-15T14:25:49+00:00March 8th, 2021|EXPLOITS, PENTESTING|0 Comments
Go to Top