Information Security
@sec_nerd_en
408
subscribers
157
photos
5
videos
9
files
2.28K
links
Information Security News
we are
@sec_nerd
twin brother
Download Telegram
Join
Information Security
408 subscribers
Information Security
https://www.codedbrain.com/2019/11/intigriti-10k-followers-xss-challenge/
Coded Brain
Intigriti 10k followers XSS challenge
Last week Intigriti had posted an XSS challenge on Twitter. I decided to give it a look. Today , in this article I am going to explain how I solved this challenge. Here is the code, const whitelist = ['intigriti.com','intigriti.io']; var url = new URL(l…
Information Security
https://github.com/TH3xACE/SUDO_KILLER
GitHub
GitHub - TH3xACE/SUDO_KILLER: A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like…
A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileg...
Information Security
https://www.kali.org/news/kali-linux-2019-4-release/
Kali Linux
Kali Linux 2019.4 Release (Xfce, Gnome, GTK3, Kali-Undercover, Kali-Docs, KeX, PowerShell & Public Packaging) | Kali Linux Blog
Time to grab yourself a drink, this will take a while!
We are incredibly excited to announce our fourth and final release of 2019, Kali Linux 2019.4, which is available immediately for download.
2019.4 includes some exciting new updates:…
Information Security
https://medium.com/@osama.alaa/egctf-2019-secure-document-portal-656e69a2d8c7
Medium
EGCTF 2019 — Secure Document Portal
Hello All
Information Security
https://gist.github.com/dmaasland/b8a1e66a14d448ec5a28640e2e2a1605
Dump process memory with PowerShell
Gist
Invoke-Procdump.ps1
GitHub Gist: instantly share code, notes, and snippets.
Information Security
https://medium.com/bugbountywriteup/bug-bounty-broken-api-authorization-d30c940ccb42
Medium
Bug Bounty: Broken API Authorization
Hey everyone, I’d like to share how I found a simple API authorization bug in a private program, which affected thousands of sub-domains…
Information Security
https://medium.com/bugbountywriteup/chainsaw-hackthebox-6b882d6ef5d1
Medium
HacktheBox — Chainsaw
This is a write-up on how I solved Chainsaw from HacktheBox.
Information Security
https://eforensicsmag.com/bypassing-avs-by-c-managed-code-reverse-shell-by-damon-mohammadbagher/
eForensics
Bypassing AVs by C# Managed Code (Reverse Shell) | By Damon Mohammadbagher - eForensics
Bypassing AVs by C# Managed Code (Reverse Shell) In this article I want to talk about simple C# source code …
Information Security
https://pentestmag.com/holy-book-x86/
Pentestmag
The Holy Book of x86 - Pentestmag
"Are you such a dreamer to put the world to rights? I stay home forever where 2 and 2 always …
Information Security
https://rushter.com/blog/public-ssh-keys/
Artem Golubin
Public SSH keys can leak your private infrastructure | Artem Golubin
An article about a small security flaw in the SSH authentication protocol that can lead to unexpected information disclosure of private infrastructure.
Information Security
https://github.com/enaqx/awesome-pentest
GitHub
GitHub - enaqx/awesome-pentest: A collection of awesome penetration testing resources, tools and other shiny things
A collection of awesome penetration testing resources, tools and other shiny things - enaqx/awesome-pentest
Information Security
https://sensepost.com/blog/2019/hacking-doom-for-fun-health-and-ammo/
Sensepost
SensePost | Hacking doom for fun, health and ammo
Leaders in Information Security
Information Security
https://philippeharewood.com/cve-2018-16794-on-fs-thefacebook-com/
Information Security
https://github.com/trinitor/netstat2neo4j
GitHub
GitHub - trinitor/netstat2neo4j: create cypher create statements for neo4j out of netstat files from multiple machines
create cypher create statements for neo4j out of netstat files from multiple machines - trinitor/netstat2neo4j
Information Security
https://github.com/sa7mon/S3Scanner
GitHub
GitHub - sa7mon/S3Scanner: Scan for misconfigured S3 buckets across S3-compatible APIs!
Scan for misconfigured S3 buckets across S3-compatible APIs! - sa7mon/S3Scanner
Information Security
https://www.slideshare.net/mobile/ajaysinghnegi1/logical-attacks-45739506
www.slideshare.net
Logical Attacks(Vulnerability Research)
Hi Everyone, This presentation is on Logical Attacks it can be helpful in Bug Bounties while doing Bug Hunting, Vulnerability Research in web applications, mo…
Information Security
https://www.notsosecure.com/oob-exploitation-cheatsheet/
NotSoSecure
Out of Band Exploitation (OOB) CheatSheet
Introduction: Out-Of-Band (OOB) technique provides an attacker with an alternative way to confirm and exploit a vulnerability which is otherwise “blind”. In a blind vulnerability, as an attacker you
Information Security
https://jonathansblog.co.uk/metasploit-for-website-pentest/amp
Jonathans Blog
Metasploit for website pentest
Metasploit for website pentest using wmap. Wmap is a web application scanner that runs within metasploit. We can use wmap to get an outline of the application we are probing. Start dvwa inside vagrant In Read more…
Information Security
https://github.com/nicolargo/glances
GitHub
GitHub - nicolargo/glances: Glances an Eye on your system. A top/htop alternative for GNU/Linux, BSD, Mac OS and Windows operating…
Glances an Eye on your system. A top/htop alternative for GNU/Linux, BSD, Mac OS and Windows operating systems. - nicolargo/glances
Information Security
https://github.com/skorov/ridrelay
GitHub
GitHub - skorov/ridrelay: Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.
Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv. - skorov/ridrelay