
Parsia Hakimian
@CryptoGangsta
Followers
3K
Following
22K
Media
876
Statuses
9K
“I trust this man, he has a Power Glove.” Security @ MSFT. He/Him
Vancouver, BC ⬅️➡️ Redmond, WA
Joined June 2009
Thanks everyone for attending my talk. Hope you enjoyed it. Here are the slides:.
github.com
Presentation videos and slides. Contribute to parsiya/Presentations development by creating an account on GitHub.
Don't miss "The Year of the Bounty Desktop: Bugs from Binaries" by Parsia Hakimian (@CryptoGangsta) on Friday, August 8 at 3:30 PM inside the Village. Read more at #BugBounty #DEFCON33
1
9
44
How Burp AI works internally. I touched this briefly in my BB village talk. We will learn how to proxy Burp and what the requests/responses look like. This allows us to write an extension to redirect Burp to our own AI instance.
parsiya.net
This is a quick peek inside Burp AI. I'll show how to proxy its requests, what actually happens when you trigger a feature. This knowledge allows us to redirect Burp AI to your own AI instance. As...
0
6
17
Thanks everyone for coming to my second talk. Here are all the slides for “The PowerPoint Glove.”.
github.com
Presentation videos and slides. Contribute to parsiya/Presentations development by creating an account on GitHub.
0
2
9
دوست هموطنی که صحبت کردید با من. من یادم رفت نامتون رو بپرسم و ازتون تشکر کنم. ببخشید من قبل و بعدش حواسم پرت بود.
Don't miss "The Year of the Bounty Desktop: Bugs from Binaries" by Parsia Hakimian (@CryptoGangsta) on Friday, August 8 at 3:30 PM inside the Village. Read more at #BugBounty #DEFCON33
0
1
8
I will be in Vegas 6-10th Aug at DEF CON. 1. "The Year of the Bounty Desktop: Bugs from Binaries" at the Bug bounty village, Friday 8th 3:30-4:00 PM (see below). 2. "The Power(Point) Glove" in Creator stages as part of the Hardware Hacking village, Saturday 9th 2:30-3:00 PM.
Don't miss "The Year of the Bounty Desktop: Bugs from Binaries" by Parsia Hakimian (@CryptoGangsta) on Friday, August 8 at 3:30 PM inside the Village. Read more at #BugBounty #DEFCON33
1
4
40
RT @HaifeiLi: Oh, today is Patch Tuesday again. Microsoft has patched two of my Office (Word) bugs:. - Word RCE, -….
0
14
0
RT @BugBountyDEFCON: We’re excited to announce that Parsia Hakimian (@CryptoGangsta) will be speaking at the Bug Bounty Village at DEF CON….
0
2
0
RT @POC_Crew: 🛠️ [POC2025] TRAINING. MacOS/iOS Kernel User Fuzzing Training.by Meysam Firouzi (@R00tkitSMM). 📅 Nov 10-12 (3 days).📍 Four Se….
0
23
0
Do you why they give cool names to threat actors? E.g., Midnight Blizzard, Crimson Sandstorm. Because no company wants to say "we got hacked by threat actor Poopy Pants.".
Microsoft has discovered worldwide cloud abuse activity by new Russia-affiliated threat actor Void Blizzard (LAUNDRY BEAR), whose cyberespionage activity targets gov't, defense, transportation, media, NGO, and healthcare in Europe and North America.
0
0
4
I had to optimize a #Kusto query because it was hitting the cluster limits. Here's what I learned with a public example.
parsiya.net
A few weeks ago I wrestled with a complex Kusto query. I shared what I learned at work in a presentation. In this blog, I'll use a public example to walk you through it.
0
0
4