noraj (@noraj_rawsec) 's Twitter Profile
noraj

@noraj_rawsec

šŸ‡«šŸ‡· Pentester, ethical hacker and #BlackArch Linux maintainer.
#OSCP & #OSWE certified.

ID: 1038523262106566656

linkhttps://pwn.by/noraj calendar_today08-09-2018 20:23:35

1,1K Tweet

2,2K Followers

375 Following

Synacktiv (@synacktiv) 's Twitter Profile Photo

A pre-auth RCE combining 2 critical vulnerabilities on the Production Environment extension of the PHP low-code website generator ScriptCase has been found by noraj and cabir. No upstream fix yet, please apply the workaround. synacktiv.com/advisories/scr…

Synacktiv (@synacktiv) 's Twitter Profile Photo

šŸ” Data encryption in Laravel environments is based on one secret: the APP_KEY. Our ninja Remsio studied the impact of its leakage on the internet during an entire year. synacktiv.com/en/publication…

noraj (@noraj_rawsec) 's Twitter Profile Photo

The challenge has no interest in itself, it's just an excuse to test bruteforce attacks with nmap and legba rather than the classic hydra, wfuzz or burp. blog.raw.pm/en/TryHackMe-L…

noraj (@noraj_rawsec) 's Twitter Profile Photo

Zero-click #NTLM credential leakage in explorer.exe (CVE-2025-50154) by putting a shortcut (.lnk) on a SMB share (bypass CVE-2025-24054).

noraj (@noraj_rawsec) 's Twitter Profile Photo

Fallback procedure to install or update AUR packages when aur.archlinux.org is down gist.github.com/noraj/50a76c4d…

YesWeHack ā µ (@yeswehack) 's Twitter Profile Photo

Drumroll, please… 🄁 We have the winners for our latest Dojo challenge! Congrats nater1ver, Ali@s and noraj: you win a swag pack! Keep an eye on your mailbox šŸ‘€ Want to win swag and program invites? Stay tuned šŸ‘‰ dojo-yeswehack.com/challenge-of-t… #YesWeRHackers

Drumroll, please… 🄁 We have the winners for our latest Dojo challenge!

Congrats nater1ver, <a href="/_Ali4s_/">Ali@s</a> and <a href="/noraj_rawsec/">noraj</a>: you win a swag pack! Keep an eye on your mailbox šŸ‘€

Want to win swag and program invites? Stay tuned šŸ‘‰ dojo-yeswehack.com/challenge-of-t…

#YesWeRHackers
Synacktiv (@synacktiv) 's Twitter Profile Photo

In our new blogpost, noraj shows how one can abuse Unicode characters to bypass filters and abuse shell globbing, regexp, HTTP query parameters or WAFs when #MySQL strict SQL mode is off šŸ‘‡ synacktiv.com/en/publication…