norbemi.bsky.social
@norbemi.bsky.social
SecureFlag | GTFOBins | Weevely | Former Red Teamer
Reposted
Hijacking NodeJS’ Jenkins Agents For Code Execution and More www.praetorian.com/blog/agent-o...
April 30, 2025 at 9:07 PM
Reposted
Scream Cipher xkcd.com/3054
February 21, 2025 at 5:43 PM
Reposted
New from 404 Media: anyone can push updates to the Doge.gov site. Two sources independently found the issue, one made their own decision to deface the site. "THESE 'EXPERTS' LEFT THEIR DATABASE OPEN."

www.404media.co/anyone-can-p...
February 14, 2025 at 7:06 AM
Reposted
I keep coming across all these "pseudocode" examples on Wikipedia and in academic papers, and what I don't understand is why the authors can't just learn a real programming language
February 6, 2025 at 7:49 PM
Reposted
I got Linux running in a PDF file using a RISC-V emulator.

PDFs support Javascript, so Emscripten is used to compile the TinyEMU emulator to asm.js, which runs in the PDF. It boots in about 30 seconds and emulates a riscv32 buildroot system.

linux.doompdf.dev/linux.pdf
github.com/ading2210/li...
January 31, 2025 at 8:02 PM
Reposted
Vox Regis by @sheepolution.bsky.social - play as a King and control rebellious factions through strategic scapegoating.
Great first-person interface.

Web | Free | 10 min
sheepolution.itch.io/vox-regis
January 20, 2025 at 4:11 PM
Reposted
Duck typing? You're thinking too small. With AI, we can finally take Guido van Rossum's dream to its logical conclusion
January 6, 2025 at 9:16 PM
Reposted
good morning and welcome to 2025
January 6, 2025 at 4:20 PM
Reposted
AWS introduced same RCE vulnerability three times in four years www.reddit.com/r/netsec/com...
AWS introduced same RCE vulnerability three times in four years
www.reddit.com
January 5, 2025 at 5:52 AM
Reposted
While developing XBOW over the past three months, we played around with using it for bug bounties and ended up at #11 in the US on HackerOne:
December 17, 2024 at 4:17 PM
Reposted
My latest blog post is live! Check your Ruby on Rails applications for the use of params[:_json]

nastystereo.com/security/rai...
December 10, 2024 at 8:30 AM
Reposted
Interesting Git repos of the week:

Detection:

* https://github.com/exein-io/pulsar - IoT security framework powered by eBPF

Exploitation:

* https://github.com/danielmiessler/SecLists - lists for fuzzing
* https://github.com/swisskyrepo/PayloadsAllTheThings - more payloads for apps
* […]
Original post on infosec.exchange
infosec.exchange
December 7, 2024 at 11:55 PM
Reposted
Here is a great follow up blog post to my blog Remote Code Execution with Spring properties written by Elliot Ward: snyk.io/articles/rem...
Remote Code Execution with Spring Boot 3.4.0 Properties | Snyk
this article introduces two methods for leveraging Logback configuration to achieve Remote Code Execution (RCE) in Spring Boot applications. These techniques are effective on the latest version of Spr...
snyk.io
December 6, 2024 at 9:46 PM
Reposted
Apparently, navigating to a javascript: URL returning a string will write it as HTML to the DOM. This allows for an interesting XSS payload:
x.com/icesfont2/st...
December 5, 2024 at 11:52 AM
Reposted
I really liked how this research turned out. I hope you did too.
December 4, 2024 at 3:24 PM
Reposted
Fellas, I don’t post here a lot but you should absolutely know this // help me spread the word!

Violent crackdowns are happening in Tbilisi, Georgia. We are fighting for our lives here.

Please, please, please help us spread the word.
November 30, 2024 at 5:39 AM
Reposted
I just wrote a new blog post! This is how I (ab)used a jailed file write bug in Tomcat/Spring. Enjoy!

Remote Code Execution with Spring Properties :: srcincite.io/blog/2024/11...
Remote Code Execution with Spring Properties
Recently a past student came to me with a very interesting unauthenticated vulnerability in a Spring application that they were having a hard time exploiting...
srcincite.io
November 26, 2024 at 11:57 PM
Reposted
OWASP Members Benefit: OWASP-reserved instance on the @SecureFlag secure coding training platform & the AI-powered threat modeling tool ThreatCanvas: www.secureflag.com/o...

Join the #OWASP community today & start building secure software! #securecodingtraining #threatmodeling
SecureFlag x OWASP
SecureFlag and OWASP have partnered to offer OWASP members access to a reserved instance of the SecureFlag platform.
www.secureflag.com
November 20, 2024 at 8:57 PM
Reposted
Interesting Git repos of the week:

Exploitation:

* https://github.com/BishopFox/BrokenHill - a productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)
* https://github.com/DaddyBigFish/enumx - the tool enumx is a framework built for Kali Linux that uses a […]
GitHub - BishopFox/BrokenHill: A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs)
A productionized greedy coordinate gradient (GCG) attack tool for large language models (LLMs) - BishopFox/BrokenHill
github.com
November 30, 2024 at 10:32 AM
Reposted
If you are interested in client-side hacking and browser quirks I strongly recommend going through this writeup by @maitai.bsky.social!
It was also cool to collab w/ him on the second chall 🤜🏿🤛🏻
blig.one/2024/11/29/f...
Flatt Security XSS Challenge - Writeup | maitai's blog
blig.one
November 30, 2024 at 6:20 AM
Reposted
Got a CSRF attack being blocked by Content-Type validation? You might be able to bypass it with this quality technique.
My latest blog post is live! nastystereo.com/security/cro...

Read how to send a cross-site POST without including a Content-Type header (without CORS). It even works with navigator.sendBeacon
November 27, 2024 at 1:28 PM