<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>segfault.solutions</title>
    <link>https://segfault.solutions</link>
    <description>Pentesting, hardware hacking, CTFs and RF — by Jimmy</description>
    <language>en-us</language>
    <lastBuildDate>Thu, 16 Apr 2026 20:50:01 +0000</lastBuildDate>
    <pubDate>Thu, 16 Apr 2026 20:47:20 +0000</pubDate>
    <atom:link href="https://segfault.solutions/feed.xml" rel="self" type="application/rss+xml" />
    <ttl>60</ttl>
    <item>
      <title>Segfault Handler</title>
      <link>https://segfault.solutions/segfault-handler.html</link>
      <guid isPermaLink="false">edc6997a1675a85711510f4110b2fae1</guid>
      <pubDate>Thu, 16 Apr 2026 20:47:20 +0000</pubDate>
      <category>project</category>
      <description>Segfault Handler is a custom reverse shell handler built in Python for the Segfault.Solutions HTB team. It replaces netcat listeners with a full-featured multi-session terminal — auto-upgrading raw shells to PTY, detecting OS and hostname on connect, and providing a modular post-exploitation framewo…</description>
    </item>
    <item>
      <title>ESP32 DIV 2.1</title>
      <link>https://segfault.solutions/esp32div.html</link>
      <guid isPermaLink="false">4583cf96ed2b0cf01defffee26517e0f</guid>
      <pubDate>Wed, 15 Apr 2026 12:43:00 +0000</pubDate>
      <category>project</category>
      <description>The ESP32 DIV v2.1 is an open-source multi-band wireless testing toolkit by CiferTech, built around the ESP32-S3. It supports WiFi, BLE, 2.4GHz and Sub-GHz frequencies — designed for wireless testing, signal analysis, jamming research and protocol exploration. The v2.1 is modular — a stable core boa…</description>
    </item>
    <item>
      <title>Proxmark3 RDV4</title>
      <link>https://segfault.solutions/proxmark.html</link>
      <guid isPermaLink="false">1a0baab4382acf59607060b47ec7300c</guid>
      <pubDate>Fri, 10 Apr 2026 12:27:30 +0000</pubDate>
      <category>project</category>
      <description>The Proxmark3 RDV4 is a high-performance open-source RFID/NFC research platform. Compared to earlier revisions, the RDV4 ships with a redesigned antenna system — dedicated LF (125 kHz) and HF (13.56 MHz) modules — plus onboard SPI flash for standalone scripts and an optional Bluetooth add-on. Runnin…</description>
    </item>
    <item>
      <title>HTB DevArea AutoPwn</title>
      <link>https://segfault.solutions/htb-devarea-autopwn.html</link>
      <guid isPermaLink="false">2fd63367029e92f4dee95206cfd14171</guid>
      <pubDate>Thu, 09 Apr 2026 12:18:52 +0000</pubDate>
      <category>project</category>
      <description>DevArea is a medium-difficulty Linux box centred around a Java SOAP web service running on port 8080. The service accepts MTOM (SOAP with attachments) and is vulnerable to XOP Include LFI — an attacker can read arbitrary files by injecting an xop:Include element pointing at a local path. This leaks …</description>
    </item>
    <item>
      <title>HTB — Garfield</title>
      <link>https://segfault.solutions/writeup.html?file=writeups/htb-garfield.md</link>
      <guid isPermaLink="false">d1c19ddbd2f9d118323f02d25b2ed2bc</guid>
      <pubDate>Sun, 05 Apr 2026 00:00:00 +0000</pubDate>
      <category>writeup</category>
      <description>Difficulty: hard · OS: windows · Tags: RBCD, RODC, Golden Ticket, Key List Attack, ForceChangePassword, WinRM, logon script abuse, Pass-the-Hash, secretsdump, AD</description>
    </item>
    <item>
      <title>HaleHound CYD</title>
      <link>https://segfault.solutions/halehound.html</link>
      <guid isPermaLink="false">20eb41e35c7e17e2713eb25b94668336</guid>
      <pubDate>Wed, 01 Apr 2026 15:28:52 +0000</pubDate>
      <category>project</category>
      <description>HaleHound CYD is the ESP32-DIV HaleHound Edition ported to the Cheap Yellow Display — a 2.8&quot; ESP32 touchscreen device. It&apos;s a multi-protocol offensive security toolkit covering WiFi, Bluetooth, 2.4GHz (NRF24) and Sub-GHz (CC1101) with GPS wardriving — all controlled via the touchscreen. Currently on…</description>
    </item>
    <item>
      <title>HackRF SSTV</title>
      <link>https://segfault.solutions/hackrf-sstv.html</link>
      <guid isPermaLink="false">01f2b228b72ff11bfeae9afd8b9adc4f</guid>
      <pubDate>Wed, 01 Apr 2026 15:20:46 +0000</pubDate>
      <category>project</category>
      <description>Using a HackRF One SDR and hacktv to transmit analog television signals received on a vintage Sony Watchman FD-230 portable CRT TV. The project explores legacy analog broadcast standards — PAL and NTSC — encoding video from arbitrary sources and transmitting on VHF frequencies picked up by the Watch…</description>
    </item>
    <item>
      <title>HTB — Devarea</title>
      <link>https://segfault.solutions/writeup.html?file=writeups/htb-devarea.md</link>
      <guid isPermaLink="false">4c952e48f16fbfaef7f31dc0cb47b63c</guid>
      <pubDate>Sun, 29 Mar 2026 00:00:00 +0000</pubDate>
      <category>writeup</category>
      <description>Difficulty: medium · OS: linux · Tags: FTP, SSRF, XOP/MTOM, RCE, command injection, symlink, privesc</description>
    </item>
    <item>
      <title>magspoof</title>
      <link>https://segfault.solutions/magspoof.html</link>
      <guid isPermaLink="false">a4d68834cf2948a9bf895c43aa91cab3</guid>
      <pubDate>Fri, 27 Mar 2026 21:37:19 +0000</pubDate>
      <category>project</category>
      <description>A custom-built magnetic stripe emulator based on Samy Kamkar&apos;s original MagSpoof concept, redesigned with a custom PCB. The device wirelessly emulates magstripe cards on traditional readers — no NFC or RFID required. Built for research and educational purposes.</description>
    </item>
    <item>
      <title>evil crow // protopirate</title>
      <link>https://segfault.solutions/protopirate.html</link>
      <guid isPermaLink="false">30a6acf53e1cc4b182a675ea7a3286f5</guid>
      <pubDate>Fri, 27 Mar 2026 21:37:18 +0000</pubDate>
      <category>project</category>
      <description>Testing the ProtoPirate feature built into the Evil Crow RF v2 Android app. The setup uses a Flipper Zero to transmit a known fob signal while the Evil Crow RF v2 captures and analyses it. The device is controlled wirelessly via the Evil Crow RF v2 Android app over Bluetooth.</description>
    </item>
    <item>
      <title>ReaperAI</title>
      <link>https://segfault.solutions/reaperai.html</link>
      <guid isPermaLink="false">d6df37cf728749670bf43c5d83b7c44e</guid>
      <pubDate>Sat, 21 Mar 2026 02:26:53 +0000</pubDate>
      <category>project</category>
      <description>ReaperAI is an automated pentesting assistant powered by Claude AI and Claude Code, connected to Kali Linux via MCP (Model Context Protocol). A single command triggers a 4-agent pipeline — Planner, Recon, Pentester and Reporter — that autonomously maps, attacks and documents a target.</description>
    </item>
    <item>
      <title>HTB — Kobold</title>
      <link>https://segfault.solutions/writeup.html?file=writeups/htb-kobold.md</link>
      <guid isPermaLink="false">62d6dd6269e13525344863487885b553</guid>
      <pubDate>Sat, 21 Mar 2026 00:00:00 +0000</pubDate>
      <category>writeup</category>
      <description>Difficulty: easy · OS: linux · Tags: MCP RCE, LFI, config leak, JWT, container escape</description>
    </item>
    <item>
      <title>CVE-2025-55182</title>
      <link>https://segfault.solutions/cve-2025-55182.html</link>
      <guid isPermaLink="false">4c9ae2914e577c1489b55c3d5e8a1d7d</guid>
      <pubDate>Tue, 17 Mar 2026 06:56:17 +0000</pubDate>
      <category>project</category>
      <description>CVE-2025-55182, dubbed React2Shell, is a critical unauthenticated RCE vulnerability in React Server Components disclosed December 3, 2025 by researcher Lachlan Davidson. A single crafted HTTP POST triggers unsafe deserialization in the React Flight protocol — no authentication, no user interaction, …</description>
    </item>
    <item>
      <title>flipper zero // keeloq cloning</title>
      <link>https://segfault.solutions/keeloq.html</link>
      <guid isPermaLink="false">dcdb76b6d3626d12a4fed4d5d7f30d45</guid>
      <pubDate>Tue, 17 Mar 2026 06:31:54 +0000</pubDate>
      <category>project</category>
    </item>
    <item>
      <title>HTB — CCTV</title>
      <link>https://segfault.solutions/writeup.html?file=writeups/htb-cctv.md</link>
      <guid isPermaLink="false">8d7160fddbb3483e608e4531ef1d9133</guid>
      <pubDate>Mon, 16 Mar 2026 00:00:00 +0000</pubDate>
      <category>writeup</category>
      <description>Difficulty: easy · OS: linux · Tags: CAP_NET_RAW, MotionEye, PHP, RCE, SQLI · CVEs: CVE-2024-51482,  CVE-2025-60787</description>
    </item>
    <item>
      <title>HTB — Pirate</title>
      <link>https://segfault.solutions/writeup.html?file=writeups/htb-pirate.md</link>
      <guid isPermaLink="false">17d44307ab736c001e6b0aac4de91381</guid>
      <pubDate>Sun, 08 Mar 2026 00:00:00 +0000</pubDate>
      <category>writeup</category>
      <description>Difficulty: hard · OS: windows · Tags: Active-Directory, NTLM-relay, GMSA abuse, SPN, Potatoo, ACL abuse</description>
    </item>
    <item>
      <title>HTB - Interpreter</title>
      <link>https://segfault.solutions/writeup.html?file=writeups/htb-interpreter.md</link>
      <guid isPermaLink="false">9e73ecfae216e48a983ee573ae70f963</guid>
      <pubDate>Sun, 22 Feb 2026 00:00:00 +0000</pubDate>
      <category>writeup</category>
      <description>Difficulty: medium · OS: linux · Tags: cve, rce, java, xml, ssti</description>
    </item>
    <item>
      <title>HTB - WingData</title>
      <link>https://segfault.solutions/writeup.html?file=writeups/htb-wingdata.md</link>
      <guid isPermaLink="false">6bcac2451ad8f07b6bd02bf85d477655</guid>
      <pubDate>Sun, 15 Feb 2026 00:00:00 +0000</pubDate>
      <category>writeup</category>
      <description>Difficulty: easy · OS: linux · Tags: cve, rce, hash</description>
    </item>
    <item>
      <title>HTB - Facts</title>
      <link>https://segfault.solutions/writeup.html?file=writeups/htb-facts.md</link>
      <guid isPermaLink="false">b8e9295034e61f083c1ae534c5f2852c</guid>
      <pubDate>Sun, 01 Feb 2026 00:00:00 +0000</pubDate>
      <category>writeup</category>
      <description>Difficulty: easy · OS: linux · Tags: web, api, idor,s3</description>
    </item>
    <item>
      <title>HTB — VariaType</title>
      <link>https://segfault.solutions/writeup.html?file=writeups/htb-variatype.md</link>
      <guid isPermaLink="false">f8644b4a805da527f34ce75ae026b3ea</guid>
      <pubDate>Sat, 15 Mar 2025 00:00:00 +0000</pubDate>
      <category>writeup</category>
      <description>Difficulty: medium · OS: linux · Tags: git, lfi, rce, deserialization</description>
    </item>
    <item>
      <title>HTB - Pterodactyl</title>
      <link>https://segfault.solutions/writeup.html?file=writeups/htb-pterodactyl.md</link>
      <guid isPermaLink="false">b23e22c073550600cd2518f2e7221c7f</guid>
      <pubDate>Sat, 08 Feb 2025 00:00:00 +0000</pubDate>
      <category>writeup</category>
      <description>Difficulty: medium · OS: linux · Tags: RCE, CVE-2025-49132, PAM, XFS, opensuse, docker,</description>
    </item>
  </channel>
</rss>