Payatu

@payatulabs

Research Powered Cybersecurity Services and Training. IoT | Embedded | mobile | cloud | Infra security. Organizers of

Netherlands| India| Aus| UAE
Vrijeme pridruživanja: lipanj 2017.

Tweetovi

Blokirali ste korisnika/cu @payatulabs

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @payatulabs

  1. prije 7 sati

    Nikhil is also conducting training on "ML for security and security for ML": (i) 3rd to 5th March 2020 at Goa, India |  (ii) 16th & 17th March 2020 at Germany | 

    Prikaži ovu nit
    Poništi
  2. prije 7 sati

    . bandit, Nikhil Joshi () will be coming up with a series of for () blog posts. In this first post of the series, he writes about model stealing attack on locally deployed models.

    Prikaži ovu nit
    Poništi
  3. 4. velj

    The address bar is the most important indicator in modern browsers. Recently bandit - Nikhil Mittal () - discovered an address bar spoof vulnerability in for .

    Poništi
  4. 3. velj

    kubectl-fields is a kubectl resources hierarchy parsing tool. This blog by bandit - , focuses on kubectl plugin which saves time for developers & users while writing or editing object configuration files.

    Poništi
  5. proslijedio/la je Tweet
    3. velj
    Poništi
  6. proslijedio/la je Tweet
    25. sij

    💡Did you know, you can now use me to interact with AWS IoT ☁️. Go ahead and try me out - pip3 install expliot

    Poništi
  7. 24. sij
    Poništi
  8. 23. sij

    are increasingly found to be vulnerable. This blog from bandit shows you exactly how vulnerable they are and how they can be hacked.

    Poništi
  9. proslijedio/la je Tweet
    22. sij

    | crown prince has been accused for hacking into ' phone. thinks that the case is bizarre but also says that this is a widely used practice for hacking. Tune in!

    Poništi
  10. proslijedio/la je Tweet
    17. sij

    We have released a custom client for Quick Heal AV which can be directly used for fuzzing with WinAFL. Go it cc:

    Poništi
  11. 16. sij

    Secure communication & protect sources in this day & age where targeted attacks like Spyware are becoming new normal. Calling at-risk groups to be part of workshop in . RSVP: Workshops are kept free of charge to educate max at-risk groups.

    Poništi
  12. 15. sij

    This post from bandit talks about tools that you must absolutely be aware of if you are into of smart IoT devices or even for bug bounties.

    Poništi
  13. 15. sij

    Excited to be on the voting list for top ten web hacking techniques of 2019. 🔥 Excellent work done by on QR code hacking! Please vote for your favourite hacks! 🙏

    Poništi
  14. proslijedio/la je Tweet

    We need your vote to encourage and support more of such amazing blogs coming out of the family ! Kudos to & thank you to share with the community on web hacking blogs and techniques

    Poništi
  15. 14. sij

    In this blog post, bandit Gaurav Nayak () writes about the implementation of Tcache bins from the perspective of development.

    Poništi
  16. 12. sij

    He spoke about breaking Edge extensions security policies. He will take you through the mechanism of the edge extension permission model and how to bypass the same.

    Prikaži ovu nit
    Poništi
  17. 12. sij

    On December 29, 2019 - bandit Nikhil Mittal () spoke at the largest hacker conference in Europe - . Here is the recording. Watch it and give us feedback.

    Prikaži ovu nit
    Poništi
  18. 11. sij

    Capture The Flag () competitions are not just about solving challenges and winning. • CTFs are a great way to learn hacking • With CTFs you get to practice your / skills • You always require creative thinking to solve the challenges

    Prikaži ovu nit
    Poništi
  19. 11. sij

    In this blog post, bandit Sudhakar Verma () talks about writing an LLVM pass for CTFs. If you are into then check this blog post.

    Prikaži ovu nit
    Poništi
  20. 10. sij

    In these trainings, you will: (i) Understand exploitation techniques to defeat mitigation like SMEP & kASLR (ii) Learn to write exploits for the found vulnerabilities in the kernel or kernel mode components (iii) Upgrade your skill-set to the kernel level

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·