Sudhakar Verma

@_sudhackar

playing with pointers and numbers CTFs with Chapter lead

Vrijeme pridruživanja: travanj 2014.

Tweetovi

Blokirali ste korisnika/cu @_sudhackar

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @_sudhackar

  1. Prikvačeni tweet
    9. sij 2019.

    Added PoC for CVE-2018-8389 to Also attached the presentation I used at to present the same bug with internals of JScript's GC. Feedback Welcome! cc

    Poništi
  2. proslijedio/la je Tweet
    24. sij

    is around the corner! We want you to be ready for it. On 30th Jan, Sudhakar Verma () will take you through Do’s & Don’ts of . Register for the :

    , , i još njih 2
    Poništi
  3. 19. sij
    Poništi
  4. proslijedio/la je Tweet
    10. pro 2019.

    Announcing session on 14 December at Proposed sessions: NewsMegaBytes by Scan me and get pwned by Stack Smashing on Hardware by Introduction to OSINT by RSVP:

    Poništi
  5. 27. stu 2019.

    Solved an old unsolved challenge by . Writeup here : It involved inspecting a VM, using , IDA and pintool. The challenge's source released yesterday

    Poništi
  6. proslijedio/la je Tweet
    10. stu 2019.

    We stood first in Indian region of ctf this year. #9 overall. Congrats to other indian teams GG

    Poništi
  7. 26. ruj 2019.

    From an old blog, thinks that plt entries are email addresses and censors them.

    Poništi
  8. proslijedio/la je Tweet
    31. kol 2019.
    Poništi
  9. proslijedio/la je Tweet
    9. srp 2019.

    Null Pune community now has a new home on discord. Join

    Poništi
  10. proslijedio/la je Tweet
    25. lip 2019.

    Have you ever looked at programs & wondered how do they function? How to analyze & the operating system & malware? Found a , got infected by ? & will answer these questions during training. Register➡️ cc:

    Poništi
  11. 24. svi 2019.

    Added PoC for CVE-2019-0930 to which was found by sometime back in January and patched this month by MS. cc

    Poništi
  12. proslijedio/la je Tweet
    13. tra 2019.

    has ended! It was an exciting 24 hours with teams competing all around the globe. Congrats to , and for topping the leaderboard ! Congratulations to for being the Top Indian Team!

    Poništi
  13. 12. tra 2019.

    Enjoyed my easy-shell and peasy-shell for HackIM CTF, tune in here for more - lemon-shell and squeezy-shell and some obfuscated RE challs! Also thanks to and for challs!

    Poništi
  14. proslijedio/la je Tweet
    17. ožu 2019.

    When I was working in the MSRC and SDL teams, I ran a series of contests. The goals were to encourage learning, foster a team culture around technical excellence, and have some fun. I wanted them to be accessible across program managers, vuln researchers, and engineers.

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    28. velj 2019.

    Planning to add some more scenarios to the Tiredful API based on jwt issues.Any ideas /suggestions what other kind of issues should I include?

    Poništi
  16. 25. velj 2019.

    Already at Who's around? – mjesto: Dona Sylvia Beach Resort Cavelossim

    Poništi
  17. proslijedio/la je Tweet
    6. velj 2019.

    Announcing Puliya session : Machine Learning and InfoSec by @nikhilj_73 on 16th Feb at office at MG Road. Invite only event. Register to participate :

    Poništi
  18. 3. velj 2019.

    While setting reverse challs for HackIM CTFs I wrote an LLVM pass for the obfusc8 much chall. Today I wrote a blog about how I implemented that LLVM pass for obfuscation Expected solutions and techniques to be covered in later post

    Poništi
  19. proslijedio/la je Tweet
    2. velj 2019.

    We have released sources of all challenges for HackIM 2019 at Thank you all for playing Thanks to admins @harshafriend4al @pwni5h3r Rate us on CTFtime: Feedback welcome!

    Poništi
  20. proslijedio/la je Tweet
    2. velj 2019.

    We have set up a form to get feedback about the ctf, challenges and infra in general. You can vote for your favorite challs here

    Prikaži ovu nit
    Poništi
  21. proslijedio/la je Tweet
    1. velj 2019.

    Opened one more pwn chall peasy-shell by A little harder version of easy-shell

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·