Sushil Singh (@sushilsin) 's Twitter Profile
Sushil Singh

@sushilsin

The quieter you become, the more you are able to hear.

ID: 740077500

calendar_today06-08-2012 07:35:36

5,5K Tweet

443 Followers

733 Following

Yassine Aboukir 🐐 (@yassineaboukir) 's Twitter Profile Photo

I've had people requesting my slides from #NahamCon2022EU so happy to share them and hopefully, they'll post the recording soon too. yassineaboukir.com/talks/NahamCon… DM me if you have got any questions or feedback. Happy holidays 🎉

I've had people requesting my slides from #NahamCon2022EU so happy to share them and hopefully, they'll post the recording soon too.  
 yassineaboukir.com/talks/NahamCon…

DM me if you have got any questions or feedback. Happy holidays 🎉
RedDrip Team (@reddrip7) 's Twitter Profile Photo

#APT The email that exploited #Outlook #CVE-2023-23397 in the wild was submitted to VT as early as on Apr 1st, 2022 and targeted State Migration Service of #Ukraine. Filename: "2022-03-18 - лист.eml" UNC Link: \\5[.]199.162.132\SCW virustotal.com/gui/file/ece08…

#APT 
The email that exploited #Outlook #CVE-2023-23397 in the wild was submitted to VT as early as on Apr 1st, 2022 and targeted State Migration Service of #Ukraine.

Filename: "2022-03-18 - лист.eml"
UNC Link: \\5[.]199.162.132\SCW

virustotal.com/gui/file/ece08…
7h3h4ckv157 (@7h3h4ckv157) 's Twitter Profile Photo

Defcon Conference Slides Presentations 22-30 Credit: Joas Antonio ↓↓ Defcon 22 All Slides media.defcon.org/DEF%20CON%2022… Defcon 23 All Slides media.defcon.org/DEF%20CON%2023… Defcon 24 All Slides media.defcon.org/DEF%20CON%2024… Defcon 25 All Slides media.defcon.org/DEF%20CON%2025… Defcon 26 All Slides

NULLCON (@nullcon) 's Twitter Profile Photo

😎For the past 3 editions, Airtel has been a strong supporter! 👊Super thrilled to welcome back Airtel airtel India as our 🥈Silver Sponsor Keep an eye out on Live bug bounty 💰bit.ly/3VWR8g6 #NullconGoa2023 #Infosec #Conference

😎For the past 3 editions, Airtel has been a strong supporter! 👊Super thrilled to welcome back Airtel <a href="/airtelindia/">airtel India</a> as our 🥈Silver Sponsor

Keep an eye out on Live bug bounty 💰bit.ly/3VWR8g6

#NullconGoa2023 #Infosec #Conference
NULLCON (@nullcon) 's Twitter Profile Photo

😎For the past 3 editions, Airtel has been a strong supporter! 👊Super thrilled to welcome airtel India as our 🥈Silver Sponsor with a new identity Keep an eye out on Live bug bounty 💰bit.ly/3VWR8g6 #NullconGoa2023 #Infosec #Conference

😎For the past 3 editions, Airtel has been a strong supporter!

👊Super thrilled to welcome <a href="/airtelindia/">airtel India</a> as our 🥈Silver Sponsor with a new identity

Keep an eye out on Live bug bounty 💰bit.ly/3VWR8g6

#NullconGoa2023 #Infosec #Conference
NULLCON (@nullcon) 's Twitter Profile Photo

Hey #bughunters! 🟢Application for Private Live Bug Hunting is now open Rewards upto ₹10,00,000 | 🎯Target to hunt #vulnerabilities provided by airtel India & Fractal Apply before 7th Sep➡️rebrand.ly/Livebughunting #NullconGoa2023 #bughunting #Infosec #Conference

Hey #bughunters! 🟢Application for Private Live Bug Hunting is now open

Rewards upto ₹10,00,000 | 🎯Target to hunt #vulnerabilities provided by <a href="/airtelindia/">airtel India</a> &amp; <a href="/fractalai/">Fractal</a> 

Apply before 7th Sep➡️rebrand.ly/Livebughunting

#NullconGoa2023 #bughunting #Infosec #Conference
NULLCON (@nullcon) 's Twitter Profile Photo

👨‍💻Unleash your #hacking skills! Rewards up to 💰₹10,00,000 at stake with Targets to hunt provided by airtel India & Fractal 👊Application for Private Live Bug Hunting ends on 7th Sep➡️rebrand.ly/Livebughunting #NullconGoa2023 #bughunting #Infosec #Conference

👨‍💻Unleash your #hacking skills! Rewards up to 💰₹10,00,000 at stake with Targets to hunt provided by <a href="/airtelindia/">airtel India</a> &amp; <a href="/fractalai/">Fractal</a> 
 
👊Application for Private Live Bug Hunting ends on 7th Sep➡️rebrand.ly/Livebughunting

#NullconGoa2023 #bughunting #Infosec #Conference
NULLCON (@nullcon) 's Twitter Profile Photo

🕰️You have just few hours left to submit your application for 👩‍💻Live Bug hunting! ⚠️Select 50 participants will get a chance | Apply soon ➡️ rebrand.ly/Livebughunting #NullconGoa2023 #Infosec #Conference #bugbounty | airtel India | Fractal

Sushil Singh (@sushilsin) 's Twitter Profile Photo

Calling all security enthusiasts, bug bounty seekers, and researchers. A live bug bounty competition is being held by Bharti Airtel at NULLCON Goa-2023 Antriksh (Yoda) #hardwear_ioNL2025 Rahul Gehlaut airtel India register here: share.hsforms.com/1aCwUg2GhSYWXB…

Calling all security enthusiasts, bug bounty seekers, and researchers.
A live bug bounty competition is being held by Bharti Airtel at <a href="/nullcon/">NULLCON</a> Goa-2023 <a href="/antriksh_s/">Antriksh (Yoda) #hardwear_ioNL2025</a> <a href="/rahul_gehlaut/">Rahul Gehlaut</a> <a href="/airtelindia/">airtel India</a> 
register here: share.hsforms.com/1aCwUg2GhSYWXB…
Rahul Gehlaut (@rahul_gehlaut) 's Twitter Profile Photo

🎉🎉 Celebrating Success! Airtel's Live Bug Bounty Triumph at nullcon Goa 🛡️ Huge shoutout to the talented ethical hackers and security experts who made this event a tremendous success. Your dedication to cybersecurity is truly commendable. 🙌👏 #nullconGoa #BugBounty #Airtel

🎉🎉 Celebrating Success! Airtel's Live Bug Bounty Triumph at nullcon Goa 🛡️

Huge shoutout to the talented ethical hackers and security experts who made this event a tremendous success. Your dedication to cybersecurity is truly commendable. 🙌👏 #nullconGoa #BugBounty #Airtel
Dark Web Informer - Cyber Threat Intelligence (@darkwebinformer) 's Twitter Profile Photo

Telegram Maltego: A free set of Transforms for Maltego that enables OSINT investigations in the Telegram messenger GitHub: github.com/vognik/maltego…

Telegram Maltego: A free set of Transforms for Maltego that enables OSINT investigations in the Telegram messenger

GitHub: github.com/vognik/maltego…
vx-underground (@vxunderground) 's Twitter Profile Photo

This is very good malware. This is solid-solid-SOLID B+ malware, very close to A- malware. APT37 is using a old-school playbook. They're doing EPO (Entry Point Obfuscation) on a self-delivered binary for evasion. They also unironically are using something akin to cavity