Information Security
@sec_nerd_en
415
subscribers
157
photos
5
videos
9
files
2.28K
links
Information Security News
we are
@sec_nerd
twin brother
Download Telegram
Join
Information Security
415 subscribers
Information Security
https://www.youtube.com/watch?v=Zl2nUJA00Yc
YouTube
Understanding PE relocations in less than 10 min (with PE-bear)
RTO: Malware Development Intermediate course teaser
Link to the course: https://institute.sektor7.net/rto-maldev-intermediate
Other online courses from RED TEAM Operator series: https://institute.sektor7.net
Twitter: https://twitter.com/sektor7net
Labs:…
Information Security
https://devcraft.io/2020/10/18/github-rce-git-inject.html
devcraft.io
GitHub - RCE via git option injection (almost) - $20,000 Bounty
It had been a while since I’d looked into GitHub, so I thought it would be good to spin up a fresh enterprise trial and see what I could find. The GHE code is obfuscated, but it’s just to discourage customers from messing around and if you do a bit of googling…
Information Security
https://medium.com/@ahmdhalabi/my-bug-bounty-journey-ranking-1st-in-u-s-dod-achieving-top-100-hackers-in-1-year-f208c10144fc
Medium
My Bug Bounty Journey & Ranking 1st in U.S. DoD & Achieving top 100 hackers in 1 year
I am sharing some of my methodology, recourses, tips and advices to become a better bug bounty hunter.
Information Security
https://blog.technitium.com/2020/07/how-to-host-your-own-dns-over-https-and.html
Technitium
How To Host Your Own DNS-over-HTTPS, DNS-over-TLS, And DNS-over-QUIC Services
Updated: 15 Jun 2025 With Technitium DNS Server , you can not just consume DNS-over-HTTPS (DoH), DNS-over-TLS (DoT), or DNS-over-QUI...
Information Security
https://github.com/github/dmca/pull/8142
Information Security
https://blog.br0vvnn.io/pages/blogpost.aspx?id=2
Information Security
https://www.fireeye.com/blog/threat-research/2020/10/flare-on-7-challenge-solutions.html
Google Cloud Blog
Flare-On 7 Challenge Solutions | Mandiant | Google Cloud Blog
Information Security
https://securitylab.github.com/research/CVE-2020-6449-exploit-chrome-uaf/
Information Security
https://research.nccgroup.com/2020/10/26/technical-advisory-pulse-connect-secure-rce-via-uncontrolled-gzip-extraction-cve-2020-8260/
Nccgroup
Cyber Security Research
Cutting-edge cyber security research from NCC Group. Find public reports, technical advisories, analyses, & other novel insights from our global experts.
Information Security
http://rez0.blog/hacking/2020/10/27/ffuf-filters.html
Information Security
https://www.youtube.com/watch?v=nvCd0Ee4FgE
YouTube
Finding security vulnerabilities in Java with CodeQL - GitHub Satellite 2020
CodeQL is GitHub's expressive language and engine for code analysis, which allows you to explore source code to find bugs and security vulnerabilities. During this beginner-friendly workshop, you will learn to write queries in CodeQL and find known security…
Information Security
https://hausec.com/2020/10/30/using-a-c-shellcode-runner-and-confuserex-to-bypass-uac-while-evading-av/
hausec
Using a C# Shellcode Runner and ConfuserEx to Bypass UAC
I was recently on an engagement where we phished in and ran into UAC which gave me more trouble than I expected. When a user logs onto Windows, a logon session is created and the credentials are ti…
Information Security
https://www.youtube.com/watch?v=gluSEBZpplQ&ab_channel=ekopartysecurityconference
YouTube
#Eko2020 Workshops | Rajanish Pathak, Rahul Maini & Harsh Jaiswal: Demystifying the Server Side
Some server-side mysteries, the unveiling of the lesser-known techniques, and how inconsistency in the URL parsing and treating of certain elements by the server-side components that usually go undetected and can open up big gaps are waiting to be demystified!…
Information Security
https://h0mbre.github.io/Fuzzing-Like-A-Caveman/
The Human Machine Interface
Fuzzing Like A Caveman
Introduction I’ve been passively consuming a lot of fuzzing-related material in the last few months as I’ve primarily tried to up my Windows exploitation game from Noob-Level to 1%-Less-Noob-Level, and I’ve found it utterly fascinating. In this post I will…
Information Security
https://www.cyberciti.biz/faq/ubuntu-20-04-set-up-wireguard-vpn-server/
nixCraft
Ubuntu 20.04 set up WireGuard VPN server
A step by step guide helps you configure and set up WireGuard VPN on Ubuntu 20.04 LTS server and a Linux desktop client, including firewall.
Information Security
https://blog.shashank.co/2020/11/from-500-error-to-django-admin-takeover.html
blog.shashank.co
From a 500 error to Django admin takeover
From a 500 error to Django admin takeover.
Information Security
https://github.com/haxkor/forkever
GitHub
GitHub - haxkor/forkever: Fork Free Fail Repeat
Fork Free Fail Repeat. Contribute to haxkor/forkever development by creating an account on GitHub.
Information Security
https://github.com/hackerhouse-opensource/exploits
GitHub
GitHub - hackerhouse-opensource/exploits: exploits and proof-of-concept vulnerability demonstration files from the team at Hacker…
exploits and proof-of-concept vulnerability demonstration files from the team at Hacker House - hackerhouse-opensource/exploits
Information Security
https://benstoneonline.com/posts/reverse-engineering-3d-movie-maker-part-three/
Ben Stone Online
Reverse engineering 3D Movie Maker - Part 3 - Ben Stone Online
Scripting engine, patents, and Python.
Information Security
https://research.nccgroup.com/2020/11/03/technical-advisory-sql-injection-and-reflected-cross-site-scripting-xss-vulnerabilities-in-oracle-communications-diameter-signaling-router-cve-2020-14787-cve-2020-14788/
NCC Group Research
Technical Advisory: SQL Injection and Reflected Cross-Site Scripting (XSS) Vulnerabilities in Oracle Communications Diameter Signaling…
NCC Group Technical Advisory: SQL Injection and Reflected Cross-Site Scripting (XSS) Vulnerabilities in Oracle Communications Diameter Signaling Router (CVE-2020-14787, CVE-2020-14788)
Information Security
https://labs.sentinelone.com/moving-from-manual-re-of-uefi-modules-to-dynamic-emulation-of-uefi-firmware/
SentinelOne
Moving From Manual Reverse Engineering of UEFI Modules To Dynamic Emulation of UEFI Firmware - SentinelLabs
Learn how to emulate, trace, debug, and Reverse Engineer UEFI modules in part 2 of our new blog series on Firmware Security