Himanshu Kumar Das

@mehimansu

CTF With SegFault. Hacking Since Y2K3. Interested In Fuzzing. Learning System Hardening. Passionate Gamer. An Electronic Freak. Proud Dad. Loves Cooking!

Vrijeme pridruživanja: travanj 2010.
Rođen/a 31. listopada

Tweetovi

Blokirali ste korisnika/cu @mehimansu

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @mehimansu

  1. proslijedio/la je Tweet
    2. velj

    📢Online starts on 7th Feb 22:30 IST and will run for 36 hours. ⛳️Register your teams 1st winner 🏆 gets: • $750 cash prize • Corporate conference pass & accommodation for Goodies

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    10. velj 2018.

    Congratulations to who today plays his 100th ODI for India! 🙌

    Poništi
  3. 25. sij
    Poništi
  4. proslijedio/la je Tweet
    19. sij
    Poništi
  5. proslijedio/la je Tweet
    19. sij

    Be a volunteer at . Make an impact. A call for applications will open on 22 Jan 2020 at 06:00 am and close on 24 Jan 2020 at 08:00 am. Keep your eyes on our website for more details.

    Poništi
  6. proslijedio/la je Tweet
    18. sij

    We are back with a popular (CTF) contest. Be ready to participate in the CTF . The will run for 36 hours, from 7th Feb 2020 2230 IST to 9th Feb 1030 IST. Team registration is now open to all:

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    12. sij

    Himanshu Kumar Das & Prajal Kulkarni will deliver 2-days training on "Building An Enterprise-Grade Security Analytics Platform Using Elastic Stack" at . ℹ️ Register today & avail pre-con discount to save up to Rs. 6,000➡️

    Poništi
  8. proslijedio/la je Tweet
    8. sij

    i wanted a better way to keep up with all new features from . ie. just show me the apis that changed with diffs. does just that, thanks for the feedback.

    Poništi
  9. proslijedio/la je Tweet
    4. sij

    I've recently been fuzzing the PHP interpreter, and took a UaF bug all the way from crashing-sample to weaponized code execution. Here is the first of several blog posts I plan to write about the process.

    Poništi
  10. proslijedio/la je Tweet

    You want to play some before 2019 ends? got you covered! -> (powered by ) ->

    Poništi
  11. proslijedio/la je Tweet
    27. pro 2019.
    Poništi
  12. proslijedio/la je Tweet
    23. pro 2019.

    Ever wondered what makes a CTF challenge good? I've asked myself that many times. I wrote this to help me answer that question based on discussions with others in the community

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    24. pro 2019.

    Writeup on how I made $40,000 breaking the new Chromium Edge using essentially two XSS flaws.

    Poništi
  14. proslijedio/la je Tweet
    20. pro 2019.

    Elemental: An ATT&CK Threat Library for defending against cyber miscreants, combining MITRE ATT&CK, Atomic Red Team, and Sigma.

    Berkelium
    Poništi
  15. proslijedio/la je Tweet
    20. pro 2019.

    JavaScript fuzzing with libFuzzer

    Poništi
  16. proslijedio/la je Tweet
    14. pro 2019.

    I repropose my notes about x86, Linux and virtualization in a single text file (~2500 lines only) for my fellow students in Sapienza.

    Poništi
  17. proslijedio/la je Tweet
    1. pro 2019.

    Hello world! fwd:cloudsec is a new cloud security conference taking place in Houston on June 29, 2020. We're interested in all clouds, attack and defense, and more. We want to talk about the stuff that the vendor conferences don't. Read more at

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet

    There wasn't a lightweight network vulnerability scanner that we felt was a good match for our needs, so we recently created our own. It's called Flan Scan, and today we are open-sourcing it

    Poništi
  19. proslijedio/la je Tweet
    19. stu 2019.

    We just released the challenges of this year's finals together with a short write up of the intended solutions: If anything is not clear, feel free to DM me and I can share more details about the challenges.

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    18. stu 2019.

    ❤️ See ⬇️as sets the stage to executes a cloud kill chain - from abusing IAM previliges in AWS to exfilling data, mimicking the Capital One Breach -- followed by detection logic. cc:

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·