Information Security
@sec_nerd_en
408
subscribers
157
photos
5
videos
9
files
2.28K
links
Information Security News
we are
@sec_nerd
twin brother
Download Telegram
Join
Information Security
408 subscribers
Information Security
https://github.com/SkyBulk/bin2sc
GitHub
GitHub - vulnwarex/bin2sc: Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF
Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF - GitHub - vulnwarex/bin2sc: Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF
Information Security
https://www.youtube.com/watch?v=SyWUsN0yHKI
YouTube
HackTheBox - Wall
00:55 - Start of recon
02:30 - Running GoBuster to discover the /monitoring directory
03:50 - Running hydra to try to brute force the HTTP Authentication (Does not work due to it being a secure password)
05:20 - Bypassing the AUTH Request by changing to a…
Information Security
https://github.com/worawit/CVE-2019-0708/blob/master/NOTE.md
GitHub
CVE-2019-0708/NOTE.md at master · worawit/CVE-2019-0708
CVE-2019-0708 (BlueKeep). Contribute to worawit/CVE-2019-0708 development by creating an account on GitHub.
Information Security
https://krebsonsecurity.com/2019/12/the-iphone-11-pros-location-data-puzzler/
Information Security
http://www.labofapenetrationtester.com/2016/02/getting-domain-admin-with-kerberos-unconstrained-delegation.html
Labofapenetrationtester
Getting Domain Admin with Kerberos Unconstrained Delegation
Home of Nikhil SamratAshok Mittal. Posts about Red Teaming, Offensive PowerShell, Active Directory and Pen Testing.
Information Security
https://www.cyberciti.biz/faq/linux-hide-processes-from-other-users/
nixCraft
Linux hide processes from other users and ps command with hidepid option
Explains how to hide process & prevent users from seeing processes that do not belong to them on a Linux when using ps/top & other commands
Information Security
https://www.youtube.com/watch?v=3IEAfyQqUKc
YouTube
WHY YOUR HACKING QUESTIONS ARE FRUSTRATING!!!
Being the two time Cyber Security Challenge Germany winner I get a lot of questions. Here I'm talking about what frustrates me and how to do it better.
FYI: Before posting this video, I have sent it to the redditor and asked if it's okay to share. The person…
Information Security
https://securityonline.info/pymultitor-python-multi-threaded-tor-proxy-to-bypass-restrictions-based-on-ip-counters/
Penetration Testing
pymultitor v4.0 releases: Python Multi Threaded Tor Proxy to bypass restrictions based on IP counters
PyMultitor works with EventLoop (Gevent) and multiple Tor processing (Sub Processes). Each Tor process is responsible for the connection between a single IP address (Proxy) and the target. Furthermore, each Tor process has two addresses – an internet address…
Information Security
https://www.dionach.com/blog/umbraco-cms-local-file-inclusion
Information Security
https://github.com/shroudedcode/apk-mitm
GitHub
GitHub - niklashigi/apk-mitm:
🤖
A CLI application that automatically prepares Android APK files for HTTPS inspection
🤖
A CLI application that automatically prepares Android APK files for HTTPS inspection - niklashigi/apk-mitm
Information Security
https://medium.com/bugbountywriteup/android-ctf-kgb-messenger-d9069f4cedf8
Medium
Android CTF — KGB Messenger
This is a write up of an open source CTF practice challenge.
Information Security
https://github.com/realoriginal/doublepulsar-poc
GitHub
realoriginal/doublepulsar-poc
sample driver for hooking srv!SrvTransactionNotImplemented in srv!SrvTransaction2DispatchTable (DoublePulsar PoC) (x64) - realoriginal/doublepulsar-poc
Information Security
https://github.com/jra89/CVE-2019-19634/
GitHub
GitHub - jra89/CVE-2019-19634: This is a filter bypass exploit that results in arbitrary file upload and remote code execution…
This is a filter bypass exploit that results in arbitrary file upload and remote code execution in class.upload.php <= 2.0.4 - GitHub - jra89/CVE-2019-19634: This is a filter bypass exploit ...
Information Security
https://github.com/eladshamir/Internal-Monologue
GitHub
GitHub - eladshamir/Internal-Monologue: Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS
Internal Monologue Attack: Retrieving NTLM Hashes without Touching LSASS - eladshamir/Internal-Monologue
Information Security
http://securityviacode.in/view_article/+MalwinX:+A+framework+for+learning+Malware+and+win32+functions
Information Security
https://github.com/sailay1996/UAC_Bypass_In_The_Wild
GitHub
GitHub - sailay1996/UAC_Bypass_In_The_Wild: Windows 10 UAC bypass for all executable files which are autoelevate true .
Windows 10 UAC bypass for all executable files which are autoelevate true . - GitHub - sailay1996/UAC_Bypass_In_The_Wild: Windows 10 UAC bypass for all executable files which are autoelevate true .
Information Security
https://github.com/SukaraLin/CVE-2019-2890
GitHub
GitHub - l1nk3rlin/CVE-2019-2890
Contribute to l1nk3rlin/CVE-2019-2890 development by creating an account on GitHub.
Information Security
Ppl should be aware about -D options in
#nmap
, decoys are sooooo useful for detection evasion
Information Security
https://know.bishopfox.com/blog/2015/08/coldfusion-bomb-a-chain-reaction-from-xss-to-rce
Bishop Fox
Blog
Listing of Bishop Fox Security Research in the form of technical, security advisories, and industry blog posts.
Information Security
https://github.com/Metnew/telegram-links-nsworkspace-open
GitHub
GitHub - Metnew/telegram-links-nsworkspace-open: Telegram (v4.9.155353) was rendering file:// links + opening them via NSWorkspace.open…
Telegram (v4.9.155353) was rendering file:// links + opening them via NSWorkspace.open -> code execution. - GitHub - Metnew/telegram-links-nsworkspace-open: Telegram (v4.9.155353) was render...