Nilotpal Saini
@_r00t3r_
Followers
147
Following
441
Media
3
Statuses
127
Cyber Security Enthusiast
Hyderabad, India
Joined October 2016
Here's my repository of Sourcegraph scripts: https://t.co/OLymssEug8. Sourcegraph is a great way to find vulns like RCE, XSS, and improper deserialization in GitHub repos. The scripts allow you to download files from Sourcegraph results and to run static analysis tools on them
4
22
108
#flareon8 The hall of fame for this year is live. Congrats everybody, prizes start shipping this week.
0
18
71
🎉To celebrate the release of the Free Edition, here's a thread of some cool stuff you can do with REVEN ⬇️
3
29
93
The CrackMe challenge is on, good luck to everyone! https://t.co/6dU8O0wMIq
malwarebytes.com
The Malwarebytes CrackMe challenge is back!
ℹ️ Malwarebytes' CrackMe returns! Designed by @hasherezade, a Capture-The-Flag type of a task featuring techniques from real-life malware. 2 tracks, 3 winners for each: ➡️ Fastest to solve ➡️ Best write-up Stay tuned for the details and link this Friday (Oct. 29).
2
48
121
🔥 New video about #browser security available 🔴 You will learn how to: - Download Firefox ASAN - Hook @firefox with Frida - List all Firefox modules & exports functions - Hook methods & print HTTP traffic - Create in-process fuzzing @fridadotre script https://t.co/l2VMIAnph0
4
90
303
Finally, here is the blog for the prototype pollution research we did. "A tale of making internet pollution free" - Exploiting Client-Side Prototype Pollution in the wild https://t.co/jsShZGlgKB
11
329
718
New Advisory: Use-After-Free in the Android ION Allocator - with commentary by @gymiru on why we are publishing a 0-day (hint: Google's own advertised disclosure policy goals)
labs.taszk.io
Vmalloc Use-After-Free in the ION/DMA-Buff subsystems
3
61
138
It has been silence about TastelessCTF'21 for a while! Thus, time for announcements: 1) For maximum challenge quality and CTF experience, we reduced the playtime to 24h! New start time: Oct 2nd 13:00 UTC! 2) Vet your gamehacking skills! We will present "Tasteless Shores" to you!
3
14
45
我发现主流的Git和Svn泄露利用工具存在极大的安全漏洞。 服务器可以构造恶意的文件名,利用路径穿越漏洞反制黑客,如果幸运的话可以拿到黑客电脑的权限。 经过测试,市面上公开的工具几乎*全军覆没* 详细的分析和POC生成方法以及测试结果已发在我的blog中↓ https://t.co/heMx4tK51c
22
131
577
yarh- for some reason on win11 the SAM file now is READ for users. So if you have shadowvolumes enabled you can read the sam file like this: I dont know the full extent of the issue yet, but its too many to not be a problem I think.
34
397
980
One year ago #SigRed (CVE-2020-1350) was patched. The RCE vulnerability allows an attacker to gain access as Domain Admin and own the entire network. Read our writeup on the the first public exploit from our very own @chompie1337!
0
100
226
Introducing DOM Invader: DOM XSS just got a whole lot easier to find https://t.co/ZaQblsLNVF
portswigger.net
Of the three main types of XSS, DOM-based XSS is by far the most difficult to find and exploit. But we come bearing good news! PortSwigger just released a new tool for Burp Suite Professional and Burp
9
232
579