RPC Toolkit is a set of tools, articles, blog posts and links to help security researchers drive their RPC research.
## Tweets
- https://twitter.com/OphirHarpaz/status/1579935976356343808
<blockquote class="twitter-tweet" data-dnt="true"><p lang="en" dir="ltr">[1/4] If you've followed our team's recent work, you probably noticed our obsession with MS-RPC. Today we release RPC Toolkit - a collection of blog posts, tools, vulnerability write-ups and PoCs that we either created or relied on during our research. <a href="https://t.co/UI35PRq8xS">https://t.co/UI35PRq8xS</a> <a href="https://t.co/6MqpEOOEEf">pic.twitter.com/6MqpEOOEEf</a></p>— Ophir Harpaz (@OphirHarpaz) <a href="https://twitter.com/OphirHarpaz/status/1579935976356343808?ref_src=twsrc%5Etfw">October 11, 2022</a></blockquote>
- https://twitter.com/cnotin/status/1581190154357571584
<blockquote class="twitter-tweet"><p lang="en" dir="ltr">Great work and presentation! This “cold hard cache” vulnerability in Windows MS-RPC is really interesting (summary in 🧵)<br>➡️ <a href="https://t.co/IxF1x6jaQZ">https://t.co/IxF1x6jaQZ</a><br>A top notch presentation during <a href="https://twitter.com/hexacon_fr?ref_src=twsrc%5Etfw">@hexacon_fr</a> first day 👏 <a href="https://t.co/g3WPTbwf1U">https://t.co/g3WPTbwf1U</a> <a href="https://t.co/74iAyq94Xp">pic.twitter.com/74iAyq94Xp</a></p>— Clément Notin (@cnotin) <a href="https://twitter.com/cnotin/status/1581190154357571584?ref_src=twsrc%5Etfw">October 15, 2022</a></blockquote>
## Links
- https://github.com/akamai/akamai-security-research/tree/main/rpc_toolkit
- https://www.akamai.com/blog/security-research/cold-hard-cache-bypassing-rpc-with-cache-abuse