_sudhackar Profile Banner
Sudhakar Verma Profile
Sudhakar Verma

@_sudhackar

Followers
855
Following
322
Media
15
Statuses
181

playing with pointers and numbers ex @crowdstrike @payatulabs @IITIOfficial CTFs with @BanditsByte

India
Joined April 2014
Don't wanna be here? Send us removal request.
@_sudhackar
Sudhakar Verma
7 years
Added PoC for CVE-2018-8389 to https://t.co/xrJkaNDIHZ Also attached the presentation I used at @bsidesdelhi to present the same bug with internals of JScript's GC. https://t.co/q4u6qEwaAz Feedback Welcome! cc @HackSysTeam
Tweet card summary image
gist.github.com
GitHub Gist: instantly share code, notes, and snippets.
0
64
177
@_sudhackar
Sudhakar Verma
2 months
For #flareon12 my intial notes are here for 9, 8, 7 and 5 https://t.co/uBnf3cIUaS Currently traveling, but plan to do a full writeup with all thr deobfuscation scripts later in November Thanks @Mandiant and the orgs @nickharbour @m_r_tz et al. for the great challenges
Tweet card summary image
sudhackar.notion.site
General Commentary
1
10
36
@_sudhackar
Sudhakar Verma
2 months
Finished #flareon12 this weekend 7 and 9 were probably my favorite ones this year
1
0
15
@_sudhackar
Sudhakar Verma
11 months
the prize for #flareon11 has landed in the mail this weekend
1
1
22
@nullcon
NULLCON
1 year
Cybersecurity professionals 📢 Join @_sudhackar at #NullconGoa2025 to ace at everything reverse engineering 🦠 Analyze malware 🔧 Build vulnerability research tools 🤖 Automate analysis processes Training Objective: https://t.co/e0DkrXMk3y #reverseengineering #malwareanalysis
0
3
12
@_sudhackar
Sudhakar Verma
3 years
Went through @saidelike dbg3011 and arch2021 previews on @OpenSecTraining beta this last week. Very good content. Like the simple VM setup script in dbg3011.
0
1
9
@BanditsByte
ByteBandits
5 years
Stood #1 this year in CSAW India @CSAW_IITK Grats to other teams @InfoSecIITR and @teambi0s #CSAW #CSAW20
5
4
23
@HarshitRMahajan
Harshit Mahajan
5 years
Have you ever looked at programs and wondered how do they function? How to analyze and debug the operating system and malware? Get to know it from @_sudhackar in his training at @nullcon November Online Training | 7 - 10 Nov. 2020 https://t.co/G7iz0gTOUK
0
10
19
@_jaiverma
Jai
5 years
I did a follow-up post on @ShiftLeftInc Joern. In this post I talk about solving the @GHSecurityLab CodeQL U-Boot challenge with Joern. https://t.co/OxqL8e5vXJ
4
10
30
@_sudhackar
Sudhakar Verma
5 years
Played @teambi0s @InCTF this weekend. Here are the writeups for 4 reverse challnges - ArchRide, jazz, RE warmup and P1Ayground
sudhackar.github.io
INCTF
0
4
15
@_sudhackar
Sudhakar Verma
5 years
wtf is ruler, it's scale.
@sohkhan15
Soh khan
5 years
Wtf is biscuit, it's biscoot. (Continue this)
0
0
6
@_jaiverma
Jai
5 years
I did a small introductory write-up about using @ShiftLeftInc Joern for code analysis. https://t.co/q0wJGpT2nG
0
28
53
@_sudhackar
Sudhakar Verma
5 years
Finally got some time to try @MiasmRe to solve a crackme. I wrote a blog on how to use its Dynamic Symbolic Execution engine to automatically find and solve constraints since there are not many blogs on it https://t.co/rUUyH0e9kE
sudhackar.github.io
miasm
1
40
187
@qiling_io
Qiling Framework
6 years
Another CTF writeup using Qiling. ByteBandits CTF 2020 (Autobot) by @chinmay_dd https://t.co/p1gpqTe7Cb
0
4
24
@_sudhackar
Sudhakar Verma
6 years
Yay! First memory corruption in WebKit for me CVE-2020-10018 https://t.co/t0lwAOJAVy with cloudfuzz, @HackSysTeam and @payatulabs
1
19
136
@nbsriharsha
N B Sri Harsha
6 years
We have released the source of HackIM-2020 and we have crossed 50 weight on CTFtime. https://t.co/ZRLEI3eKP0 https://t.co/9TNlkyVzM4 @nullcon #hackim2020
Tweet card summary image
ctftime.org
0
7
38
@_sudhackar
Sudhakar Verma
6 years
Had fun running it this year too. Thanks to other admins @yamantasbagv2 @0xpwnisher @nbsriharsha @_r00t3r_ @lionaneesh and @_jaiverma I hope everyone had fun. Please rate us on CTFTime
@nullcon
NULLCON
6 years
Phew! #HackIMCTF just got over. Here's a summary Total registrations: 2279 Active teams with atleast 1 point : 1209 Scoreboard will be up in a while on CTFtime Sources for #HackIMCTF at https://t.co/1QzHCcv9CE Time to sleep?
0
12
29
@_sudhackar
Sudhakar Verma
6 years
The CTF runs for 18 more hours. Go get them all!! #HackIMCTF
@nullcon
NULLCON
6 years
Attention: All challenges have been opened now. There a quite a few still with 0 solves. Go get the flags #HackIMCTF
0
5
10
@nullcon
NULLCON
6 years
@_jaiverma We have just a flag from the 600th team! Woohoo! In just under 3 hours. The CTF website has seen ~300k requests. #HackIMCTF
1
1
3
@nullcon
NULLCON
6 years
#HackIMCTF is around the corner! We want you to be ready for it. On 30th Jan, Sudhakar Verma (@_sudhackar) will take you through Do’s & Don’ts of #CTF. Register for the #webinar: https://t.co/oUTMs7u4sY #HackIM #Nullcon #Nullcon2020 #CaptureTheFlag #Security #InfoSec
0
7
21
@_sudhackar
Sudhakar Verma
6 years
Same as last year but with more interesting and fun challs from @_jaiverma @_r00t3r_ @nbsriharsha @0xpwnisher and @yamantasbagv2
@nullcon
NULLCON
6 years
We are back with a popular #CaptureTheFlag (CTF) contest. Be ready to participate in the #HackIM CTF #contest. The #CTF will run for 36 hours, from 7th Feb 2020 2230 IST to 9th Feb 1030 IST. Team registration is now open to all: https://t.co/zH9oMLtsj8 #Nullcon2020 #Nullcon
1
11
26