vasu sethia

@SethiaVasu

Malware researcher,Reverse Engineer. Infosec guy who is passionate about exploit development and penetration testing

Vrijeme pridruživanja: kolovoz 2018.

Tweetovi

Blokirali ste korisnika/cu @SethiaVasu

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @SethiaVasu

  1. 25. ruj 2019.

    I am really excited to see my project getting accepted in Black Arsenal Europe 2019. We will be showing how our project () uses ML and graphdb to visualize, classify and detect the malware.

    Poništi
  2. 24. svi 2019.

    I am really excited to see my project getting accepted in Black Arsenal. We will be showing how our project () uses ML and graphdb to visualize, classify and detect the malware.

    Poništi
  3. proslijedio/la je Tweet
    3. ruj 2018.

    Just wanted to say thanks to all the support me by watching and sharing my videos. As a thank you, I placed the skeleton code to the Forward Shell I use here: . Go practice on Stratosphere, Sokar, and Inception. May help you on a certain box in .

    Poništi
  4. proslijedio/la je Tweet

    We depend on research from the academic community for security & anonymity analysis, new ideas, and for reviewing our ideas. We've got open topics on network performance, network security, censorship circumvention, and application research. Can you help?

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·