Information Security
@sec_nerd_en
415
subscribers
157
photos
5
videos
9
files
2.28K
links
Information Security News
we are
@sec_nerd
twin brother
Download Telegram
Join
Information Security
415 subscribers
Information Security
https://medium.com/@gizmoxf/htb-jerry-write-up-b5c75222311d
Medium
[HTB] Jerry — Write Up
This is a write up on how to do Jerry Machine on Hack The Box. I’ll try to make this write up as beginner friendly as much as possible so…
Information Security
https://medium.com/@micallst/osint-resources-for-2019-b15d55187c3f
Medium
OSINT Resources for 2019
Let’s take a look at some essential OSINT resources plus recent developments in the areas of data, tooling, content and community.
Information Security
https://github.com/trustedsec/unicorn
GitHub
GitHub - trustedsec/unicorn: Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into…
Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique...
Information Security
https://medium.com/@ismailtasdelen/sql-injection-payload-list-b97656cfd66b
Medium
SQL Injection Payload List
PayloadBox
Information Security
https://0x00sec.org/t/anti-virus-exploitation-local-privilege-escalation-in-k7-security-cve-2019-16897/17655
0x00sec - The Home of the Hacker
Anti-virus Exploitation: Local Privilege Escalation in K7 Security (CVE-2019-16897)
Anti-virus Exploitation Hey guys, long time no article! Over the past few months, I have been looking into exploitation of anti-viruses via logic bugs. I will briefly discuss the approach towards performing vulnerability research of these security products…
Information Security
https://github.com/xairy/vmware-exploitation
GitHub
GitHub - xairy/vmware-exploitation: A collection of links related to VMware escape exploits
A collection of links related to VMware escape exploits - xairy/vmware-exploitation
Information Security
https://www.codedbrain.com/2019/11/intigriti-10k-followers-xss-challenge/
Coded Brain
Intigriti 10k followers XSS challenge
Last week Intigriti had posted an XSS challenge on Twitter. I decided to give it a look. Today , in this article I am going to explain how I solved this challenge. Here is the code, const whitelist = ['intigriti.com','intigriti.io']; var url = new URL(l…
Information Security
https://github.com/TH3xACE/SUDO_KILLER
GitHub
GitHub - TH3xACE/SUDO_KILLER: A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like…
A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileg...
Information Security
https://www.kali.org/news/kali-linux-2019-4-release/
Kali Linux
Kali Linux 2019.4 Release (Xfce, Gnome, GTK3, Kali-Undercover, Kali-Docs, KeX, PowerShell & Public Packaging) | Kali Linux Blog
Time to grab yourself a drink, this will take a while!
We are incredibly excited to announce our fourth and final release of 2019, Kali Linux 2019.4, which is available immediately for download.
2019.4 includes some exciting new updates:…
Information Security
https://medium.com/@osama.alaa/egctf-2019-secure-document-portal-656e69a2d8c7
Medium
EGCTF 2019 — Secure Document Portal
Hello All
Information Security
https://gist.github.com/dmaasland/b8a1e66a14d448ec5a28640e2e2a1605
Dump process memory with PowerShell
Gist
Invoke-Procdump.ps1
GitHub Gist: instantly share code, notes, and snippets.
Information Security
https://medium.com/bugbountywriteup/bug-bounty-broken-api-authorization-d30c940ccb42
Medium
Bug Bounty: Broken API Authorization
Hey everyone, I’d like to share how I found a simple API authorization bug in a private program, which affected thousands of sub-domains…
Information Security
https://medium.com/bugbountywriteup/chainsaw-hackthebox-6b882d6ef5d1
Medium
HacktheBox — Chainsaw
This is a write-up on how I solved Chainsaw from HacktheBox.
Information Security
https://eforensicsmag.com/bypassing-avs-by-c-managed-code-reverse-shell-by-damon-mohammadbagher/
eForensics
Bypassing AVs by C# Managed Code (Reverse Shell) | By Damon Mohammadbagher - eForensics
Bypassing AVs by C# Managed Code (Reverse Shell) In this article I want to talk about simple C# source code …
Information Security
https://pentestmag.com/holy-book-x86/
Pentestmag
The Holy Book of x86 - Pentestmag
"Are you such a dreamer to put the world to rights? I stay home forever where 2 and 2 always …
Information Security
https://rushter.com/blog/public-ssh-keys/
Artem Golubin
Public SSH keys can leak your private infrastructure | Artem Golubin
An article about a small security flaw in the SSH authentication protocol that can lead to unexpected information disclosure of private infrastructure.
Information Security
https://github.com/enaqx/awesome-pentest
GitHub
GitHub - enaqx/awesome-pentest: A collection of awesome penetration testing resources, tools and other shiny things
A collection of awesome penetration testing resources, tools and other shiny things - enaqx/awesome-pentest
Information Security
https://sensepost.com/blog/2019/hacking-doom-for-fun-health-and-ammo/
Sensepost
SensePost | Hacking doom for fun, health and ammo
Leaders in Information Security
Information Security
https://philippeharewood.com/cve-2018-16794-on-fs-thefacebook-com/
Information Security
https://github.com/trinitor/netstat2neo4j
GitHub
GitHub - trinitor/netstat2neo4j: create cypher create statements for neo4j out of netstat files from multiple machines
create cypher create statements for neo4j out of netstat files from multiple machines - trinitor/netstat2neo4j