GitHub Security Lab Profile Banner
GitHub Security Lab Profile
GitHub Security Lab

@GHSecurityLab

Followers
26,044
Following
15
Media
208
Statuses
1,373

GitHub Security Lab’s mission is to inspire and enable the community to secure the open source software we all depend on.

Joined October 2019
Don't wanna be here? Send us removal request.
Explore trending content on Musk Viewer
Pinned Tweet
@GHSecurityLab
GitHub Security Lab
5 months
Why does GitHub Security Lab do research like @mmolgtm ’s recent work on bypassing MTE on the Pixel 8? This question was asked on Hacker News and we think it’s worth a short thread.
3
12
53
@GHSecurityLab
GitHub Security Lab
3 years
Do you want to learn how to find vulnerabilities in Google Chrome? @Nosoynadiemas just released the last exercise of Fuzzing101!
Tweet media one
0
146
416
@GHSecurityLab
GitHub Security Lab
5 years
Hi 👋 we are the GitHub Security Lab. Find more information about us here:
29
125
350
@GHSecurityLab
GitHub Security Lab
3 years
Learn how to fuzz Adobe Reader and finding bugs in closed-source applications in exercise 8 of Fuzzing 101 :
Tweet media one
0
107
330
@GHSecurityLab
GitHub Security Lab
3 years
Do you want to learn how to fuzz an interactive application like GIMP using Persistent Fuzzing? Our wizard of fuzz @Nosoynadiemas just published exercize 6 of Fuzzing101!
Tweet media one
3
102
316
@GHSecurityLab
GitHub Security Lab
3 years
Go on an RCE hunting journey with @pwntester as he demonstrates how he used CodeQL to find multiple RCE vulnerabilities in Apache Dubbo: "All roads lead to RCE"
Tweet media one
2
83
281
@GHSecurityLab
GitHub Security Lab
3 years
"Exploits are really the closest thing to magic spells we have in this world" according to Halvar Flake. @kevin_backhouse demystifies an exploit of a double-free vulnerability in Ubuntu
Tweet media one
1
61
255
@GHSecurityLab
GitHub Security Lab
4 years
Continuing our series analyzing recent CVEs, with a remote code execution on Exchange servers. Read @pwntester 's "CVE-2020-0688 Losing the keys to your kingdom"
3
98
253
@GHSecurityLab
GitHub Security Lab
4 years
The first CodeQL online course is now available for free on GitHub Learning Lab! This course invites CodeQL beginners to follow in the footsteps of our security research team and find real vulns in Das-UBoot (patched since). Join other CodeQL learners:
3
80
242
@GHSecurityLab
GitHub Security Lab
4 years
Learn all about how to fuzz network services in this practical case study by @nosoynadiemas in which he fuzzes 3 of the most popular Open Source FTP servers!
0
81
236
@GHSecurityLab
GitHub Security Lab
3 years
Go dumpster diving for arbitrary code execution in v8's garbage collector with @mmolgtm in his Chrome vulnerability RCA for CVE-2021-37975
0
96
224
@GHSecurityLab
GitHub Security Lab
4 years
Looking for a vulnerability hunting challenge? Then this Java CTF challenge is for you! You will hone your bug finding skills to find a pre-auth RCE and also learn all about CodeQL's taint tracking features.
1
71
200
@GHSecurityLab
GitHub Security Lab
4 years
Bugfix and chill! @pwntester reported 2 Server-Side Template Injections in Netflix open source libraries, enabling attackers to inject arbitrary Java EL expressions, leading to a pre-auth Remote Code Execution (RCE) vuln: First one in Netflix Conductor
1
84
200
@GHSecurityLab
GitHub Security Lab
2 years
In this post @mmolgtm goes through the details of CVE-2022-1134, a type confusion in Chrome, and shows how to gain remote code execution in the Chrome renderer using this bug.
2
87
196
@GHSecurityLab
GitHub Security Lab
4 years
Read how @kevin_backhouse gets root access on Ubuntu 20.04 by pretending nobody’s /home #LPE
Tweet media one
4
75
192
@GHSecurityLab
GitHub Security Lab
3 years
Curious how the recently patched Chrome 0days (CVE-2021-30632, CVE-2021-30633) affected you? @mmolgtm explores the fascinating intricacies of exploiting optimized property access based type confusions in Chrome's v8 JIT
Tweet media one
2
77
188
@GHSecurityLab
GitHub Security Lab
3 years
The Qihoo 360 Alpha Lab presented a great example of how #CodeQL driven variant analysis can be used to hunt for 0day in Chrome and amplify your security research results at Blackhat 2021:
Tweet media one
0
62
186
@GHSecurityLab
GitHub Security Lab
4 years
Sometimes the beans you plant grow into RCE! Read all about Java exploit gardening in @pwntester 's new post
2
62
183
@GHSecurityLab
GitHub Security Lab
3 years
Happy new year fuzzing learners! In the new episode of @Nosoynadiemas 's Fuzzing101 you will learn how to fuzz Windows applications
2
49
164
@GHSecurityLab
GitHub Security Lab
3 years
Learn how to take aim at HTTP attack surfaces in @Nosoynadiemas series on fuzzing the Apache Web Server
Tweet media one
3
44
140
@GHSecurityLab
GitHub Security Lab
5 years
Learn how our security researcher @agustingianni is hunting bugs in rsyslog with CodeQL:
1
41
132
@GHSecurityLab
GitHub Security Lab
3 years
Dive into the exploitation of a Chrome WebAudio UAF in this third and final installment of @mmolgtm 's Full Chain series
Tweet media one
0
51
134
@GHSecurityLab
GitHub Security Lab
4 years
A glibc heap exploitation tutorial, using a heap buffer overflow in SANE Backends as an example, by @kevin_backhouse
0
46
133
@GHSecurityLab
GitHub Security Lab
5 years
If you don't learn from past CVEs you are doomed to repeat the same mistakes. @pwntester starts a new series of articles deconstructing CVEs. Let's start with a RFD in the Spring framework.
0
52
128
@GHSecurityLab
GitHub Security Lab
2 years
NEW Security Feature: 🎉 PRIVATE VULNERABILITY REPORTING 🎉
7
34
118
@GHSecurityLab
GitHub Security Lab
1 year
Want to learn software security and have fun doing it? 🎉 🔒 Check out Secure Code Game - a FREE, hands-on training simulating what you do on a daily basis. Start playing now at 🎮 Read more at
0
37
119
@GHSecurityLab
GitHub Security Lab
4 years
Learn all the tricks @nosoynadiemas used to fuzz twelve vulnerabilities out of FreeRDP in the second instalment of his Fuzzing with Sockets series!
1
45
117
@GHSecurityLab
GitHub Security Lab
4 years
ICYMI: Fuzzing sockets with AFL++:
1
38
120
@GHSecurityLab
GitHub Security Lab
1 year
How do static analysis tools detect vulnerabilities in software? Learn more about the fundamentals of static analysis and security research, and challenge yourself with exercises in the first part of CodeQL Zero to Hero series by @BlazingWindSec
5
32
118
@GHSecurityLab
GitHub Security Lab
2 years
In this post "Corrupting memory without memory corruption" @mmolgtm is showing how a powerful kernel bug, CVE-2022-20186, can be used to root a Pixel 6 from a malicious app
1
45
117
@GHSecurityLab
GitHub Security Lab
4 years
GHSL-2020-009: UAF leads to RCE in ProFTPD - CVE-2020-9273
1
53
114
@GHSecurityLab
GitHub Security Lab
2 years
In this blog post @mmolgtm shows how to bypass various modern mitigation implemented in the Android kernel and exploit CVE-2022-22057 to gain root from a malicious Android app
2
36
110
@GHSecurityLab
GitHub Security Lab
1 year
Unravel some hidden vulnerabilities in mTLS systems with @artsploit . As presented at @BlackHatEvents and @defcon this year, the research is now available in our blog.
2
47
112
@GHSecurityLab
GitHub Security Lab
4 years
Dive even deeper down the fuzzing rabbit hole with part 2 of @nosoynadiemas 's advanced fuzzing series!
0
37
114
@GHSecurityLab
GitHub Security Lab
4 months
🚀 CodeQL zero to hero part 3: Security research with CodeQL! Learn how to audit applications for vulnerabilities with CodeQL, tricks we can use for security research workflow, and how to find bugs in thousands of GitHub repos at once using MRVA.
Tweet media one
2
31
109
@GHSecurityLab
GitHub Security Lab
5 years
0
18
108
@GHSecurityLab
GitHub Security Lab
4 years
We paid a $4,000 bounty to @JLLeitschuh , for his amazing bug slayer submission. He didn't only reported 1,597 bugs, but also sent the PRs to fix them. That's what we call open source security at scale!
2
10
108
@GHSecurityLab
GitHub Security Lab
3 years
GHSL-2021-034_043: Multiple pre-auth RCEs in Apache Dubbo - CVE-2021-25641, CVE-2021-30179, CVE-2021-30180, CVE-2021-30181, CVE-2021-32824
0
45
105
@GHSecurityLab
GitHub Security Lab
3 years
Take your next step down the fuzzy brick road to become a Wizard of Fuzz with @nosoynadiemas Fuzzing 101 Exercise #2
Tweet media one
1
22
102
@GHSecurityLab
GitHub Security Lab
4 years
GHSL-2020-205: Remote Code Execution in Apache Struts 2 - S2-061 - CVE-2020-17530
1
33
96
@GHSecurityLab
GitHub Security Lab
4 years
Curious how @mmolgtm managed to actually exploit that Chrome WebAudio Use After Free he found back in March? 🎃 Mo shares his tricks and treats us with his latest post on Chrome UAF exploitation 👻
Tweet media one
0
26
100
@GHSecurityLab
GitHub Security Lab
5 years
Awesome CodeQL query from @ggolawski that detects many variants of LDAP Injections in Java: Plain Java JNDI, UnboundID, Spring LDAP and Apache LDAP API. We are pleased to award him our maximum bounty reward $3000
Tweet media one
4
29
95
@GHSecurityLab
GitHub Security Lab
4 years
{} yourselves, our 4th CTF (in Java) is coming!
Tweet media one
0
11
92
@GHSecurityLab
GitHub Security Lab
3 years
Put your GitHub Actions skills to the test and learn about workflow security considerations. Our Capture the Flag (CTF) starts this Wednesday 🏴
0
24
95
@GHSecurityLab
GitHub Security Lab
5 years
Check out @Nosoynadiemas ' tips on Fuzzing, to overcome known challenges and maximize results:
0
46
93
@GHSecurityLab
GitHub Security Lab
1 year
Fixing ReDoS vulnerabilities can be tricky, but fear not - we've got a 4-step process that'll save the day. Check out our latest blog below.
3
33
90
@GHSecurityLab
GitHub Security Lab
4 years
Join @oxfordmaths and @nicowaisman for LiveQL, an unscripted live auditing session, as they cover some methods of finding non-intuitive string manipulation vulnerabilities in C code on tomorrow's Security Live Stream!
Tweet media one
2
26
89
@GHSecurityLab
GitHub Security Lab
4 years
Tweet media one
2
12
90
@GHSecurityLab
GitHub Security Lab
2 years
Being transparent about potential security vulnerabilities helps increase trust in your project. We believe it's much better to request a CVE and publish a security advisory than to stay silent and hope for the best, even for low severity vulnerabilities.
3
42
86
@GHSecurityLab
GitHub Security Lab
1 year
Get root privileges on an Android phone! Learn how @mmolgtm discovered CVE-2022-46395 in the Arm Mali kernel driver via root cause analysis of a Project Zero bug and then used it to get root privileges!
0
24
87
@GHSecurityLab
GitHub Security Lab
3 years
Follow @pwntester on another CodeQL adventure as he builds and iterates on top of prior community findings to find and fix additional vulnerabilities in NSA's Emissary software: "Don't shoot the emissary"
Tweet media one
0
39
88
@GHSecurityLab
GitHub Security Lab
2 years
We’re launching a series of office hours for open source maintainers! Do you need advice to secure your project’s code? Grab some time to chat with our team. Spots are limited and run until end of April
Tweet media one
6
46
83
@GHSecurityLab
GitHub Security Lab
5 years
You have two weeks left to join our Capture the Flag contest and win a Nintendo Switch, or cool GitHub swag! Write a CodeQL query to find a specific class of DOM-based XSS vulnerabilities.
1
43
85
@GHSecurityLab
GitHub Security Lab
4 years
Can you #spotthebug in this code?
Tweet media one
10
14
82
@GHSecurityLab
GitHub Security Lab
3 years
Learn how @mmolgtm dug his way out of the Chrome sandbox using a credit card as a shovel! "The fugitive in Java: Escaping to Java to escape the Chrome sandbox"
Tweet media one
1
37
81
@GHSecurityLab
GitHub Security Lab
4 years
ICYMI @mmolgtm explains how to exploit CVE-2020-6449, a use-after-free (UAF) in the WebAudio module of Chrome, and achieve a sandboxed RCE. Read also how he used #CodeQL to accelerate his code audit
0
29
77
@GHSecurityLab
GitHub Security Lab
3 years
If you’re out of popcorn you’re in luck because @mmolgtm popped some fresh Android kernels for you to enjoy! "One day short of a full chain: Part 1 - Android Kernel arbitrary code execution"
Tweet media one
0
35
77
@GHSecurityLab
GitHub Security Lab
5 years
Assert yourself on the browser playground with @mmolgtm ’s guide to hunting Chrome IPC sandbox escapes:
0
37
75
@GHSecurityLab
GitHub Security Lab
4 years
Securing the fight against covid19 through open source software, by @pwntester
Tweet media one
1
18
74
@GHSecurityLab
GitHub Security Lab
4 years
Can you #spotthebug in this code?
Tweet media one
12
12
72
@GHSecurityLab
GitHub Security Lab
7 months
Learn to find and fix security issues while having fun with Secure Code Game, now with new challenges focusing on JavaScript, Python, Go, and GitHub Actions! 🎮🔐
2
18
73
@GHSecurityLab
GitHub Security Lab
4 years
It’s amazing what you can find for free in the garbage sometimes! Read @mmolgtm ’s research into how Chrome’s garbage collector can be used to trigger UAF
0
25
73
@GHSecurityLab
GitHub Security Lab
5 years
We would like welcome our newest Security Lab members: Bas @basalberts and Hauwa @HauwaOtori !
8
11
72
@GHSecurityLab
GitHub Security Lab
7 months
The 2nd season of Secure Code Game has arrived! 🎉 🎮 Play at
2
21
66
@GHSecurityLab
GitHub Security Lab
1 year
Learn more about how developers and administrators can secure their assets through the use of SELinux in this introduction to SELinux by Kevin Stubbings!
0
29
65
@GHSecurityLab
GitHub Security Lab
4 years
"Our goal is for every CVE in OSS that gets found that could be generalized, we create a CodeQL query that will cover that. Instead of manually fixing bugs one at a time, we can eradicate whole categories of vulnerabilities across software" @natfriedman
2
21
68
@GHSecurityLab
GitHub Security Lab
5 years
Can't Grep This! The slides of @agustingianni 's workshop at @offensive_con are available at
0
25
65
@GHSecurityLab
GitHub Security Lab
3 years
Having a hard time remembering where you put those Apache bugs? Join @Nosoynadiemas as he builds custom ASAN interceptors for memory bugs in Part 2 of "Fuzzing sockets: Apache HTTP"
Tweet media one
0
20
64
@GHSecurityLab
GitHub Security Lab
3 years
Fuzz Apache HTTP server for fun (and CVEs) with @nosoynadiemas at @hackinparis starts in 15 min - 10am Paris time (GMT+1)
0
22
63
@GHSecurityLab
GitHub Security Lab
4 years
Take a deep dive into command injection vulns with @mdisec 's talk at the GitHub Security meetup. Tune in Wednesday July 15, 2020, at 5pm CET (Central Europe) - 8am PDT (Pacific Time)
0
12
64
@GHSecurityLab
GitHub Security Lab
1 year
In his latest post, @mmolgtm sheds light on a patching problem in Pixel 6 (GHSL-2023-005) that can leave your device vulnerable to a variant of CVE-2022-38181, enabling malicious apps to gain root access. Read 👉
Tweet media one
1
25
60
@GHSecurityLab
GitHub Security Lab
3 years
If you write a nice CodeQL query and propose it to the open source community, you can get not one, but TWO bounty rewards from the Security Lab. We're making changes to the Bug Slayer bug bounty program:
Tweet media one
0
10
62
@GHSecurityLab
GitHub Security Lab
4 years
Join us for the very first episode of LiveQL! An interactive CodeQL-driven security research session featuring @nicowaisman and @oxfordmaths on Tuesday July 7th, 11am PDT.
1
22
62
@GHSecurityLab
GitHub Security Lab
3 years
Your challenge, should you choose to accept it, is to elevate your privileges from read-only to full write access on a designated game repository and claim your victory! Ready?
1
30
62
@GHSecurityLab
GitHub Security Lab
5 years
Congrats to our CTF winners! 1st place goes to @paraschetal , with an impressive query, with tests and exploits! 2nd place goes to @Kachakil who took the time to give very detailed explanations. Well done guys! Hope you had fun! Solutions are coming soon
1
9
60
@GHSecurityLab
GitHub Security Lab
5 years
ICYMI: We're running a CTF until December 31st. Write a CodeQL query to find a specific class of DOM-based XSS vulns. The 2 best submissions will win Nintendo Switches, and 10 additional entries will receive coupons that can be used for GitHub Swag.
1
19
58