Season Cherian

@_s34s0n_

Reverse Engineer | Embedded System | CTF Player | CSE Undergraduate | Do everything within my power to make life better.

India
Vrijeme pridruživanja: siječanj 2017.

Tweetovi

Blokirali ste korisnika/cu @_s34s0n_

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @_s34s0n_

  1. proslijedio/la je Tweet
    29. sij

    If you are into C++ reverse engineering and never tried OOAnalyzer you are missing out big time!

    Poništi
  2. proslijedio/la je Tweet
    22. sij

    Our member found yet another bug in QEMU's network backend and was asssigned with CVE-2020-7039. For more info, checkout:

    Poništi
  3. proslijedio/la je Tweet
    20. sij

    Happy to announce that you now can find the lecture notes for my Hardware and Embedded Systems Security course online, including tex sources:

    Poništi
  4. proslijedio/la je Tweet
    7. sij

    2019 was a spectacular year for us. We finished 21st worldwide, our best ranking ever and 1st in India for the 4th consecutive year. We finished Top 10 in 12 CTFs this year. Noteworthy performances include securing 1st in ISITDTU CTF, 3rd in etc..

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    29. pro 2019.

    A walkthrough through the Security Expo at will make your phone's tracked, smart devices hacked 😵😝💯 Learnt that we aren't even secure, let alone private 😣🤯

    Poništi
  6. proslijedio/la je Tweet
    28. pro 2019.

    We thank the team from Cisco for flying in here and delivering amazing talks! We are extremely grateful to Cisco for being our Event Sponsor.

    Poništi
  7. proslijedio/la je Tweet
    29. pro 2019.

    Here is what Mr Koustav Sadhukhan, security engineer from Amazon had to say about the Hardware Badge developed by the secure-hardware team from .

    Poništi
  8. proslijedio/la je Tweet
    28. pro 2019.

    Had a lot of fun, designing the hardware badge with my small Hardware team at . Here's explaining about the design philosophy.

    Poništi
  9. proslijedio/la je Tweet
    24. pro 2019.

    With just a few days to go for InCTF 2019, here is a glimpse of the much-awaited hardware badge.

    Poništi
  10. proslijedio/la je Tweet
    18. pro 2019.

    No more crash, full emulation!

    Poništi
  11. proslijedio/la je Tweet
    18. pro 2019.
    Poništi
  12. proslijedio/la je Tweet
    10. pro 2019.

    18 days left for the 10th edition Amrita InCTF. Here is team CTF_Probably's experience at InCTF last year: This year we are taking it to whole other level.

    Poništi
  13. proslijedio/la je Tweet
    4. pro 2019.

    Dump AES keys from wireless Logitech receivers using Chrome Browser. Demo page: Source:

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    1. pro 2019.

    Congratulations to our member who won the latest episode of . Thanks to for organising the event. Check it out at:

    Poništi
  15. proslijedio/la je Tweet
    29. stu 2019.

    I always keep searching the net for rfid hacking material. Found this little Well written blog

    Poništi
  16. proslijedio/la je Tweet
    27. lis 2019.

    Our members & did a small research in which they created a fuzzing tool that found new functions to bypass PHP disable_functions & can also tell how strong your disable_functions is. Full report: Tool:

    Poništi
  17. proslijedio/la je Tweet
    24. lis 2019.

    We finished 2nd locally and 11th globally in the CTF among 973 academic and professional teams. Thanks to for the nice challenges. Can't wait to get our hands on the prizes ;)

    Poništi
  18. proslijedio/la je Tweet
    21. lis 2019.

    Delighted to see members giving training at and . It is deeply satisfying to see young girls finding international platforms to exhibit their talents. Awesome to see the conscious effort to include diversity.Thx to organizers/.

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    17. lis 2019.

    Sneak peek preview: prototype of upcoming Quince that will soon shake the open source industry - covering all the channels at the same time with inexpensive hardware and a single antenna

    Poništi
  20. proslijedio/la je Tweet
    16. lis 2019.

    Our members @s34s0n_ and are demonstrating vulnerabilities posed by an IoT based Smart Home and their exploits at Cisco SecCon APJ 2019 .

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·