Information Security
@sec_nerd_en
414
subscribers
157
photos
5
videos
9
files
2.28K
links
Information Security News
we are
@sec_nerd
twin brother
Download Telegram
Join
Information Security
414 subscribers
Information Security
https://www.nds.ruhr-uni-bochum.de/media/hfs/attachments/files/2010/03/hackpra09_fu_esser_php_exploits1.pdf
Information Security
https://s1gnalcha0s.github.io/dspl/2018/03/07/Stored-XSS-and-SSRF-Google.html
s1gnalcha0s.github.io
Stored XSS, and SSRF in Google using the Dataset Publishing Language
“Those who rule data will rule the entire world.” - 孫正義
Information Security
https://github.com/hlldz/dazzleUP
GitHub
GitHub - hlldz/dazzleUP: A tool that detects the privilege escalation vulnerabilities caused by misconfigurations and missing updates…
A tool that detects the privilege escalation vulnerabilities caused by misconfigurations and missing updates in the Windows operating systems. - hlldz/dazzleUP
Information Security
https://github.com/duc-nt/CVE-2020-6287-exploit
GitHub
GitHub - duc-nt/CVE-2020-6287-exploit: PoC for CVE-2020-6287 The PoC in python for add user only, no administrator permission…
PoC for CVE-2020-6287 The PoC in python for add user only, no administrator permission set. Inspired by @zeroSteiner from metasploit. Original Metasploit PR module: https://github.com/rapid7/metas...
Information Security
https://github.com/ra1nb0rn/avain
GitHub
GitHub - ra1nb0rn/avain: A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks
A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks - GitHub - ra1nb0rn/avain: A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks
Information Security
https://github.com/hardenedlinux/harbian-qa/blob/master/syzkaller/kstate_resource.md
GitHub
hardenedlinux/harbian-qa
Bug hunting through fuzzer/*-sanitizer/etc... Contribute to hardenedlinux/harbian-qa development by creating an account on GitHub.
Information Security
https://twitter.com/citronneur/status/1286314161102872577
Twitter
Sylvain Peyrefitte
Capture NamedPipe traffic using #Wireshark #ETW and the fabulous file sytem filter driver from @kobyk ! #Windows #Internal github.com/airbus-cert/Wi…
Information Security
https://twitter.com/aboul3la/status/1286012324722155525
Twitter
Ahmed Aboul-Ela
Here is POC of CVE-2020-3452, unauthenticated file read in Cisco ASA & Cisco Firepower. For example to read "/+CSCOE+/portal_inc.lua" file. https://<domain>/+CSCOT+/translation-table?type=mst&textdomain=/%2bCSCOE%2b/portal_inc.lua&default-language&lang=../…
Information Security
https://www.usenix.org/system/files/conference/usenixsecurity12/sec12-final91.pdf
Information Security
https://seanmelia.files.wordpress.com/2016/01/out-of-band-xml-external-entity-injection-via-saml-redacted.pdf
Information Security
https://www.anitian.com/owning-saml/
Anitian
Owning SAML
SAML Pentest and Implementaion demonstrates how insecure configurations combine to form a phishing attack that can give attackers access.
Information Security
https://www.a12d404.net/windows/2019/10/30/schedsvc-persist-without-task.html
www.a12d404.net
Persistence using Task Scheduler without a Scheduled Task
Task Scheduler service loads a non-existing DLL enabling persistence as `NT AUTHORITY\SYSTEM`.
Information Security
https://github.com/wintrmvte/Citadel
GitHub
GitHub - redcode-labs/Citadel: Collection of pentesting scripts
Collection of pentesting scripts. Contribute to redcode-labs/Citadel development by creating an account on GitHub.
Information Security
https://shells.systems/in-memory-shellcode-decoding-to-evade-avs/
Shells.Systems
In-Memory shellcode decoding to evade AVs/EDRs - Shells.Systems
Estimated Reading Time: 9 minutes During the previous week, I was doing some research about win32 APIs and how we can use them during weaponizing our attack, I already did some work related to process injection in the past, but I was looking for something…
Information Security
https://github.com/1d8/Android-Analysis
GitHub
GitHub - 1d8/Android-Analysis: Getting Genymotion & Burpsuite setup for Android Mobile App Analysis
Getting Genymotion & Burpsuite setup for Android Mobile App Analysis - 1d8/Android-Analysis
Information Security
https://medium.com/bugbountywriteup/tryhackme-overpass-writeup-af945ec29be9
Medium
TryHackMe Overpass Writeup
A beginner-friendly writeup on TryHackMe’s Overpass challenge
Information Security
https://hot3eed.github.io/2020/07/30/starling_p1_obfuscations.html
hot3eed.github.io
Reverse Engineering Starling Bank (Part I): Obfuscation Techniques
Reverse Engineering Starling Bank (Part I): Obfuscation Techniques 2020-07-30
Information Security
https://medium.com/bugbountywriteup/bug-bounty-lets-bypass-an-entire-web-app-s-csrf-protection-friend-link-b69c43e9dcf7
Medium
Bug Bounty: Let’s Bypass an entire Web App’s CSRF protection
CSRF token is not always enough
Information Security
https://sid-500.com/2020/07/31/powershell-convert-ps1-files-to-exe-files/
SID-500.COM
PowerShell: Convert .ps1 Files to .exe Files
Have you ever dreamed of creating exe files out of your PowerShell scripts? If yes, read on. In this post I will show you how you can create exe files with a small and simple program called ps2exe.
Information Security
https://cloud.google.com/blog/products/identity-security/preventing-lateral-movement-in-google-compute-engine
Google Cloud Blog
Compute Engine: Prevent compromises and better defend against lateral movement | Google Cloud Blog
Best practices, including concrete “dos and don’ts,” that can help you prevent security misconfigurations on Google Compute Engine.