Sandipan Roy (@bytehackr) 's Twitter Profile
Sandipan Roy

@bytehackr

Senior Product Security Engineer @RedHat | SDE @Fedora | #PSIRT #RHEL | Ex @parrotsec

ID: 978668951822635009

linkhttps://linktr.ee/bytehackr calendar_today27-03-2018 16:23:55

417 Tweet

204 Followers

1,1K Following

Red Hat Developer (@rhdevelopers) 's Twitter Profile Photo

Whether you need to build a new policy from the ground up or customize an existing one, these tools allow administrators to fine-tune #security settings to match their unique requirements. #RHEL red.ht/3TZfjLa

Sandipan Roy (@bytehackr) 's Twitter Profile Photo

Boost your API security skills with DVAPI! 🚀 Learn hands-on with OWASP API Top 10 - 2023 to spot and fix common vulnerabilities.🔍 Ref: blog.bytehackr.in/api-security-t… Payatu DVAPI 👨‍💻 #APISecurity #DVAPI #OWASP #CyberSecurity #API #EthicalHacking #SecureCoding #DevSecOps

Red Hat (@redhat) 's Twitter Profile Photo

.Michael Ferris is making bold statements 💪 See why the largest orgs in almost every sector depend on Red Hat Enterprise #Linux: red.ht/4ha2Caf.

Coursera (@coursera) 's Twitter Profile Photo

Want a chance to get a free backpack from Coursera? 🎒 Simply repost and DM us your full name, address, email and phone number. 😊 (Exclusive to learners in the US, UK and India)

Want a chance to get a free backpack from Coursera? 🎒

Simply repost and DM us your full name, address, email and phone number. 😊

(Exclusive to learners in the US, UK and India)
Sandipan Roy (@bytehackr) 's Twitter Profile Photo

🚀 Check out my latest blog on Linux Device Drivers! Ref: blog.bytehackr.in/unlocking-the-… #Linux #DeviceDrivers #Programming #TechEducation #OpenSource Hashnode

Sandipan Roy (@bytehackr) 's Twitter Profile Photo

Protect your code from stack-based attacks! Learn about stack canaries, control flow integrity, and other powerful defenses in GCC & Clang. Blog: blog.bytehackr.in/top-5-compiler… #CyberSecurity #SoftwareDevelopment #Hacking #StackProtection #Privacy

Sandipan Roy (@bytehackr) 's Twitter Profile Photo

SELinux is a powerful tool for enforcing security in Red Hat Enterprise Linux (RHEL). Learn how it works, key commands, and how it mitigates vulnerabilities. Read more 👉 redhat.com/en/blog/selinu… #SELinux #rhel #linuxsecurity #cybersecurity #redhat #redhatlinux

Red Hat Security (@redhatsecurity) 's Twitter Profile Photo

"Red Hat Enterprise Linux (RHEL) has long been a leader in integrating robust security mechanisms." Discover new insight in our latest blog: #SELinux and #RHEL: A technical exploration of #security hardening red.ht/42RfOMC

Binni Shah (@binitamshah) 's Twitter Profile Photo

Bypassing kASLR via Cache Timing : r0keb.github.io/posts/Bypassin… kASLR Internals and Evolution : r0keb.github.io/posts/kASLR-In… credits ö

Bypassing kASLR via Cache Timing : r0keb.github.io/posts/Bypassin…

kASLR Internals and Evolution : r0keb.github.io/posts/kASLR-In… credits <a href="/r0keb/">ö</a>
FFmpeg (@ffmpeg) 's Twitter Profile Photo

Arguably the most brilliant engineer in FFmpeg left because of this. He reverse engineered dozens of codecs by hand as a volunteer. Then security "researchers" and corporate employees came along repeatedly insisted "critical" security issues were fixed immediately waving their

mthcht (@mthcht2) 's Twitter Profile Photo

🧅 TOR archive feed: tor-archive.github.io Every IP that has ever been a TOR node! Searchable with full timeline, exit/guard/middle role, country, ASN, updated hourly since 2024.

🧅 TOR archive feed:
tor-archive.github.io

Every IP that has ever been a TOR node!
Searchable with full timeline, exit/guard/middle role, country, ASN, updated hourly since 2024.
0xor0ne (@0xor0ne) 's Twitter Profile Photo

Reverse engineer and get full root access on the TP-Link Tapo C200 (2025) quentinkaiser.be/security/2025/… Research by Quentin Kaiser #infosec

Reverse engineer and get full root access on the TP-Link Tapo C200 (2025)

quentinkaiser.be/security/2025/…

Research by <a href="/qkaiser/">Quentin Kaiser</a>

#infosec
DeepSeek (@deepseek_ai) 's Twitter Profile Photo

🚀 DeepSeek-V4 Preview is officially live & open-sourced! Welcome to the era of cost-effective 1M context length. 🔹 DeepSeek-V4-Pro: 1.6T total / 49B active params. Performance rivaling the world's top closed-source models. 🔹 DeepSeek-V4-Flash: 284B total / 13B active params.

🚀 DeepSeek-V4 Preview is officially live &amp; open-sourced! Welcome to the era of cost-effective 1M context length.

🔹 DeepSeek-V4-Pro: 1.6T total / 49B active params. Performance rivaling the world's top closed-source models.
🔹 DeepSeek-V4-Flash: 284B total / 13B active params.
V4bel (@v4bel) 's Twitter Profile Photo

💥 Introducing "Dirty Frag" A universal Linux LPE chaining two vulns in xfrm-ESP and RxRPC. A successor class to Dirty Pipe & Copy Fail. No race, no panic on failure, fully deterministic. ~9 years latent. Ubuntu / RHEL / Fedora / openSUSE / CentOS / AlmaLinux, and more. Even