nol

1.2K posts

nol banner
nol

nol

@nol_tech

Infosec

🟨⬜️🟪⬛️ Joined Eylül 2020
765 Following773 Followers
nol retweeted
Alexandre Borges
Alexandre Borges@ale_sp_brazil·
The Exploiting Reversing Series (ERS) currently features 945 pages of exploit development based on real-world targets: [+] ERS 08: exploitreversing.com/2026/03/31/exp… [+] ERS 07: exploitreversing.com/2026/03/04/exp… [+] ERS 06: exploitreversing.com/2026/02/11/exp… [+] ERS 05: exploitreversing.com/2025/03/12/exp… [+] ERS 04: exploitreversing.com/2025/02/04/exp… [+] ERS 03: exploitreversing.com/2025/01/22/exp… [+] ERS 02: exploitreversing.com/2024/01/03/exp… [+] ERS 01: exploitreversing.com/2023/04/11/exp… In the coming weeks, I will publish new articles covering exploration in areas such as Windows, Chrome, iOS/macOS, and hypervisors. Have a great day and enjoy reading. #exploit #exploitation #windows #chrome #macOS #iOS #hypervisors #vulnerabilityresearch
Alexandre Borges tweet media
English
2
107
447
19.8K
nol
nol@nol_tech·
@payloadartist it is LLM's advantage is massive quantity over quality
English
0
0
0
111
nol retweeted
chompie
chompie@chompie1337·
this is legit the most impressive part. the exploit is nothing lol
h0mbre@h0mbre_

@moyix i cant believe you can get these old environments set up

English
1
9
161
23.4K
nol
nol@nol_tech·
@lildylannn did you check if `winget configure --enable` has to have been ran first on the machine for this to work ? I encountered this issue where if you use winget's DSC thing on a fresh computer that never used winget it would not run at all.
English
1
0
0
138
nol
nol@nol_tech·
@lildylannn I used this winget DSC thing for initial access and persistence recently and it seems to be fairly reliable
English
1
0
3
1.2K
dylan davis
dylan davis@lildylannn·
I just dropped some research: DSCourier and would love for your opinion and to check it out!! It’s a novel post-exploitation technique abusing WinGet’s COM API to execute code through Microsoft-signed binaries. GitHub: github.com/DylanDavis1/DS… Blog: dylansec.com/DSCourier/
English
4
102
355
61.6K
nol retweeted
solst/ICE of Astarte
solst/ICE of Astarte@IceSolst·
🚨‼️We have published a guide on mitigating the imminent AI security apocalypse Step #1: buy our tool Golden age of snake oil I stg. And the ‘tool’ is a prompt.
English
33
33
360
24.3K
nol retweeted
SwiftOnSecurity
SwiftOnSecurity@SwiftOnSecurity·
When I started out in Security I was worrying about Chinese government 0days, as we ran unpatched XP SP2 with local admin set to "everyone."
English
6
7
181
9.2K
John Hammond
John Hammond@_JohnHammond·
@AzakaSekai_ WELL i meaaaann does directly opening it count??? 😂
English
3
3
86
8.2K
nol retweeted
SkelSec
SkelSec@SkelSec·
@UK_Daniel_Card pypykatz had this logic implemented since last year, most of this article is just porting that logic to mimikatz... without mentioning me. Again. At this point this is a running joke that I'm getting 0 fucking kudos either deliberately or by "forgetting"
English
9
7
115
6.3K
nol
nol@nol_tech·
@vxunderground saw multiple exploit devs saying it was likely them, but I don't have more intel
English
1
0
0
325
vx-underground
vx-underground@vxunderground·
Another zero day exploit released by some nerd (can't remember name right now) because they're annoyed with Microsoft. It's been confirmed by other nerds. It is yet another legit zero day. Whew. github.com/Nightmare-Ecli…
English
87
534
4.7K
309.7K
nol
nol@nol_tech·
@vxunderground pretty sure the nerd in question is sandboxescaper which used to work at msft but got fired for whatever stupid reason
English
1
0
7
1.1K
vx-underground
vx-underground@vxunderground·
> be random nerd > find zero day > report to Microsoft > microsoft being dumb > (idk the lore lol) > doesn't pay > nerd get mad > ooga booga > drops zero day > something else happens > microsoft doesn't pay (again) > nerd get mad (again) > drops zero day > pic related?
GIF
English
14
23
902
35.8K
nol
nol@nol_tech·
2) Deep Blue: A mixed client and server-side challenge involving client-side path traversal and a deep dive into PHP's source code to find parser discrepancies between PHP's and V8's JSON parsers for smuggling a JSON file as an image: - palm-screw-745.notion.site/Deep-Blue-33f5…
English
0
0
0
58
nol
nol@nol_tech·
1) Secure Mood Notes: A two part challenges involving achieving a blind file read via an injection in a .htacess file, bypassing signature-based PHP hardenings on unserialize, and escaping a disable_functions PHP sandbox: - palm-screw-745.notion.site/Secure-Mood-No… 🔽
English
1
0
0
70
nol
nol@nol_tech·
I just published my two writeups for this year FCSC's web challenges, I did my best to make them as exhaustive and detailed as possible: 🔽🔽🔽
English
1
0
3
130
keddy
keddy@deepdark888·
@payloadartist Bro, not knowing cpp, java and python but expecting to understand IDA ?? Btw, IDA pro is expensive. I’d prefer ghidra
English
2
0
2
1.3K
nol
nol@nol_tech·
U+00AF démission
Français
0
0
0
63