Paul Axe (@paul_axe) 's Twitter Profile
Paul Axe

@paul_axe

ID: 125585584

linkhttp://paul-axe.blogspot.com calendar_today23-03-2010 07:29:48

500 Tweet

1,1K Followers

153 Following

kl_secservices (@kl_secservices) 's Twitter Profile Photo

Threat Hunting workshop from Teymur on #phdays 2018 slides speakerdeck.com/heirhabarov/ph… and lab yadi.sk/d/qB1PNBj_3ViW…. Also check out his previous talk at #zeronights 2017.zeronights.org/wp-content/upl…

kl_secservices (@kl_secservices) 's Twitter Profile Photo

We've gathered some statistical data based on results of security assessment engagements performed in 2017 by Kaspersky Lab Security Services team. github.com/klsecservices/…

Paul Axe (@paul_axe) 's Twitter Profile Photo

Slides (2018.zeronights.ru/wp-content/upl…) and video (youtube.com/watch?v=Jmv-0P…) for my research about redis post exploitation ZeroNights

Leet More (@leetmore) 's Twitter Profile Photo

Watch Vlad (vos) from LC↯BC get pwned live on YouTube this saturday! Mar 9th 15:00 UTC. Kudos to Calle Svensson for hosting such great stuff

Gynvael Coldwind (@gynvael.bsky.social) (@gynvael) 's Twitter Profile Photo

Paged Out! #1 is out! (and it's free to download!) pagedout.institute/?page=issues.p… There are 57 articles in 12 categories: Electronics Programming Assembly Reverse Engineering Sec/Hack Retro File Formats Algorithmics SysAdmin Radio Phreaking OS Internals Enjoy! #PagedOut!

Omar "Beched" Ganiev (@thebeched) 's Twitter Profile Photo

Freshly patched RCE in PHP-FPM: bugs.php.net/bug.php?id=785… Exploit: github.com/neex/phuip-fpi… Many nginx+PHP configurations vulnerable, watch out!

Emil Lerner (@emil_lerner) 's Twitter Profile Photo

Nano-#ctf for my 30th birthday: execute system('id') by providing <=280 bytes of stdin to the script code = input() for c in 'hui"\'(': assert c not in code exec(code, {'__builtins__': {}}) run on Python 3.9.2+Linux (=python:latest). Will send .031337 ETH to the first pwner

Emil Lerner (@emil_lerner) 's Twitter Profile Photo

I just posted a write-up on how I leaked uninitialized memory (e.g., other users' HTTP requests/responses) from Fastly using a bug in the H2O webserver. Also, there you can learn a fraction of how HTTP/3 + QUIC works) medium.com/@emil.lerner/l…

Eldar Zaitov (@kyprizel) 's Twitter Profile Photo

All this CA stuff was cursed, but now, when CAs revoke certificates on a geographical basis, it is especially clearly visible.

Phith0n (@phithon_xg) 's Twitter Profile Photo

#Vulhub Redis Lua Sandbox Escape && RCE (CVE-2022-0543) Awesome vulnerability, without any binary technique, just one Redis command. So how to reproduce the vulnerability: github.com/vulhub/vulhub/… Original vulnerability reference: ubercomp.com/posts/2022-01-…

#Vulhub Redis Lua Sandbox Escape &amp;&amp; RCE (CVE-2022-0543)
Awesome vulnerability, without any binary technique, just one Redis command.
So how to reproduce the vulnerability: github.com/vulhub/vulhub/…
Original vulnerability reference: ubercomp.com/posts/2022-01-…
Aleksei Tiurin (@antyurin) 's Twitter Profile Photo

Need to send a cross-origin Post request without Content-Type header? Just create a Blob without type and send it using fetch or beacon API. It can be useful for bypassing a buggy CSRF-protection. xxx.dbggl.pw/send_no_ct.html