Dimas Maulana (@dimasma__) 's Twitter Profile
Dimas Maulana

@dimasma__

Active CTF Player and Member of TCP1P, SKSD, & Project Sekai | Bug Bounty Hunter at PatchStack | Cybersecurity Enthusiast

ID: 1329319444552638466

linkhttps://github.com/dimasma0305 calendar_today19-11-2020 07:04:03

75 Tweet

45 Followers

28 Following

Dimas Maulana (@dimasma__) 's Twitter Profile Photo

Belajar dasar cryptography. Membuat program konversi string ke binary, binary ke desimal, desimal ke string, dan seterusnya. program: github.com/dimasma0305/He…

Belajar dasar cryptography. Membuat program konversi string ke binary, binary ke desimal, desimal ke string, dan seterusnya.

program:
github.com/dimasma0305/He…
Dimas Maulana (@dimasma__) 's Twitter Profile Photo

I just completed module File Inclusion in HTB Academy! academy.hackthebox.com/achievement/38… #hackthebox #htbacademy #cybersecurity

Dimas Maulana (@dimasma__) 's Twitter Profile Photo

I just completed module Attacking Web Applications with Ffuf in HTB Academy! academy.hackthebox.com/achievement/38… #hackthebox #htbacademy #cybersecurity

Dimas Maulana (@dimasma__) 's Twitter Profile Photo

I just completed module Stack-Based Buffer Overflows on Linux x86 in HTB Academy! academy.hackthebox.com/achievement/38… #hackthebox #htbacademy #cybersecurity

Dimas Maulana (@dimasma__) 's Twitter Profile Photo

I just completed module SQL Injection Fundamentals in HTB Academy! academy.hackthebox.com/achievement/38… #hackthebox #htbacademy #cybersecurity

Dimas Maulana (@dimasma__) 's Twitter Profile Photo

link ke grup discord: dWdnY2Y6Ly9xdmZwYmVxLnR0L3NRc0djelpjSTkgem5ucyBsbiBhdHJlcmNiZ3ZhOik= note: grup kita masih kecil, jadi jangan terlalu berekspetasi besar ya:) clue: base64 + rot?

Dimas Maulana (@dimasma__) 's Twitter Profile Photo

I just completed module Using the Metasploit Framework in HTB Academy! academy.hackthebox.com/achievement/38… #hackthebox #htbacademy #cybersecurity

0x999 🇮🇱 (@_0x999) 's Twitter Profile Photo

Very cool technique by Luke Jahnke for POST based CSRF without a content-type header using a Blob object, Interestingly it also seems to work using a Uint8Array

Very cool technique by <a href="/lukejahnke/">Luke Jahnke</a> for POST based CSRF without a content-type header using a Blob object, Interestingly it also seems to work using a Uint8Array
Project Sekai CTF (@projectsekaictf) 's Twitter Profile Photo

Over the weekend, our team competed in XCTF Finals in China as the only international team among 28. We placed 3rd place overall and 1st in the professional division. Huge thanks to XCTF for the amazing event and high quality challenges. Hope to be back next year!

Over the weekend, our team competed in XCTF Finals in China as the only international team among 28. We placed 3rd place overall and 1st in the professional division. Huge thanks to <a href="/XCTF_League/">XCTF</a> for the amazing event and high quality challenges. Hope to be back next year!
Dimas Maulana (@dimasma__) 's Twitter Profile Photo

Yes! We won! Project Sekai CTF took first place in the professional category at XCTF 2025 in China! all credit given to all project Sekai member that participate in this ctf👌

Yes! We won! Project Sekai CTF took first place in the professional category at XCTF 2025 in China!

all credit given to all project Sekai member that participate in this ctf👌