nopslide

70 posts

nopslide banner
nopslide

nopslide

@nopsIide

InfoSec • “Pen”tester

internet Katılım Eylül 2019
208 Takip Edilen84 Takipçiler
nopslide retweetledi
Clandestine
Clandestine@akaclandestine·
GitHub - machine1337/TelegramRAT: Cross Platform Telegram based RAT that communicates via telegram to evade network restrictions github.com/machine1337/Te…
English
2
97
305
31.4K
nopslide retweetledi
terjanq
terjanq@terjanq·
A really cool writeup from @kevin_mizu about a bug in draw.io. It looks like the writeup has some of tricks learnt from my research! Super happy to see the real world applications of my techniques 😊 And thanks for the shout out! huntr.dev/bounties/4c1c5…
English
4
46
210
20K
nopslide retweetledi
blueblue
blueblue@piedpiper1616·
GitHub - duc-nt/CVE-2022-44268-ImageMagick-Arbitrary-File-Read-PoC: CVE-2022-44268 ImageMagick Arbitrary File Read - Payload Generator - github.com/duc-nt/CVE-202…
English
0
13
37
6.1K
nopslide retweetledi
pwn.ai
pwn.ai@pwn_ai·
Can you find the token here? 10$ for first solver. 🔥💀 octagon.net/chal/6
pwn.ai tweet media
English
31
19
198
0
nopslide retweetledi
blueblue
blueblue@piedpiper1616·
GitHub - CsEnox/CVE-2022-2992: Authenticated Remote Command Execution in Gitlab via GitHub import - github.com/CsEnox/CVE-202…
English
0
22
44
0
nopslide retweetledi
Corellium
Corellium@CorelliumHQ·
✅iPhone 14 Pro ✅iOS 16 ✅Jailbroken
Corellium tweet media
Nederlands
80
405
2.9K
0
nopslide
nopslide@nopsIide·
@doctorthompson yes the same thing with polkit pkexec it has to be an old vulnerability but they bring this up now and the impact is pretty much the same.
English
1
0
3
0
Dr. Thompson 🤘🏼😈🏴‍☠️
@nopsIide How in the hell had none of us ever tried this before? I mean, it seems like it should have been discovered years ago, no? Ever hear a stand-up comedian ask, “Why didn’t I think of that joke?” … I get it.
Edmonton, Alberta 🇨🇦 English
2
0
3
0
nopslide
nopslide@nopsIide·
The lowest user "nobody" could use this simple bash script and allows anybody to overwrite data in arbitrary read-only files (CVE-2022-0847) It is similar to CVE-2016-5195 “Dirty Cow” but is easier to exploit. dirtypipe.cm4all.com #infosec #CVE
nopslide tweet media
English
3
32
73
0
nopslide retweetledi
PortSwigger Research
PortSwigger Research@PortSwiggerRes·
We've posted some in-depth guidance on how to make Turbo Intruder attacks go as fast as possible. If you think we're missing any tricks, let us know! #tuning" target="_blank" rel="nofollow noopener">portswigger.net/research/turbo…
English
1
89
243
0
nopslide
nopslide@nopsIide·
yup.. Apache 2.4.50 ✅
nopslide tweet media
English
1
1
5
0