Nilotpal Saini Profile
Nilotpal Saini

@_r00t3r_

Followers
147
Following
441
Media
3
Statuses
127

Cyber Security Enthusiast

Hyderabad, India
Joined October 2016
Don't wanna be here? Send us removal request.
@KarimPwnz
Karim Rahal
4 years
Here's my repository of Sourcegraph scripts: https://t.co/OLymssEug8. Sourcegraph is a great way to find vulns like RCE, XSS, and improper deserialization in GitHub repos. The scripts allow you to download files from Sourcegraph results and to run static analysis tools on them
4
22
108
@thedavidbrumley
David Brumley
4 years
😀 I am starting a fundraise for @picoctf. PicoCTF is free to everyone, and costs about $500k a year (🙀) to run. If you've had a positive experience with pico, please reply or DM. I'll use it in my fundraise pitch. Pls RT for awareness. #ctf #hacking
30
256
563
@_r00t3r_
Nilotpal Saini
4 years
Finally arrived today! #flareon8
3
1
18
@nickharbour
nickharbour
4 years
#flareon8 The hall of fame for this year is live. Congrats everybody, prizes start shipping this week.
0
18
71
@lodurel
Louis Dureuil
4 years
🎉To celebrate the release of the Free Edition, here's a thread of some cool stuff you can do with REVEN ⬇️
3
29
93
@Threat_Down
ThreatDown
4 years
The CrackMe challenge is on, good luck to everyone! https://t.co/6dU8O0wMIq
malwarebytes.com
The Malwarebytes CrackMe challenge is back!
@Threat_Down
ThreatDown
4 years
ℹ️ Malwarebytes' CrackMe returns! Designed by @hasherezade, a Capture-The-Flag type of a task featuring techniques from real-life malware. 2 tracks, 3 winners for each: ➡️ Fastest to solve ➡️ Best write-up Stay tuned for the details and link this Friday (Oct. 29).
2
48
121
@_r00t3r_
Nilotpal Saini
4 years
First time completed all challenges. Still wondering how the challenge #9 code was written to give me so much suffering. Waiting to see various write-ups. #flareon8
0
0
12
@FuzzingLabs
FuzzingLabs
4 years
🔥 New video about #browser security available 🔴 You will learn how to: - Download Firefox ASAN - Hook @firefox with Frida - List all Firefox modules & exports functions - Hook methods & print HTTP traffic - Create in-process fuzzing @fridadotre script https://t.co/l2VMIAnph0
4
90
303
@S1r1u5_
s1r1us (mohan)
4 years
Finally, here is the blog for the prototype pollution research we did. "A tale of making internet pollution free" - Exploiting Client-Side Prototype Pollution in the wild https://t.co/jsShZGlgKB
11
329
718
@_r00t3r_
Nilotpal Saini
4 years
Challenge 7 completed. The best challenge so far! #flareon8
0
0
6
@TaszkSecLabs
Taszk Security Labs
4 years
New Advisory: Use-After-Free in the Android ION Allocator - with commentary by @gymiru on why we are publishing a 0-day (hint: Google's own advertised disclosure policy goals)
Tweet card summary image
labs.taszk.io
Vmalloc Use-After-Free in the ION/DMA-Buff subsystems
3
61
138
@TeamTasteless
Tasteless
4 years
It has been silence about TastelessCTF'21 for a while! Thus, time for announcements: 1) For maximum challenge quality and CTF experience, we reduced the playtime to 24h! New start time: Oct 2nd 13:00 UTC! 2) Vet your gamehacking skills! We will present "Tasteless Shores" to you!
3
14
45
@_r00t3r_
Nilotpal Saini
4 years
Challenge #5 was anything but reversing. Anyway, that's done and dusted. Now, will do #6 over the weekend. #flareon8
1
0
4
@_r00t3r_
Nilotpal Saini
4 years
People are trolling about level 3 but it is a nice challenge #flareon8
0
0
6
@drivertomtt
drivertom
4 years
我发现主流的Git和Svn泄露利用工具存在极大的安全漏洞。 服务器可以构造恶意的文件名,利用路径穿越漏洞反制黑客,如果幸运的话可以拿到黑客电脑的权限。 经过测试,市面上公开的工具几乎*全军覆没* 详细的分析和POC生成方法以及测试结果已发在我的blog中↓ https://t.co/heMx4tK51c
22
131
577
@jonasLyk
Jonas L
4 years
yarh- for some reason on win11 the SAM file now is READ for users. So if you have shadowvolumes enabled you can read the sam file like this: I dont know the full extent of the issue yet, but its too many to not be a problem I think.
34
397
980
@GraplSec
Grapl Inc.
4 years
One year ago #SigRed (CVE-2020-1350) was patched. The RCE vulnerability allows an attacker to gain access as Domain Admin and own the entire network. Read our writeup on the the first public exploit from our very own @chompie1337!
0
100
226