Asutosh Kumar (@h4ckibl3) 's Twitter Profile
Asutosh Kumar

@h4ckibl3

Learning to Pentest | Automotive & IOT Security | Linux | Bash

ID: 1645139212541526017

calendar_today09-04-2023 18:58:58

134 Tweet

53 Followers

219 Following

Asutosh Kumar (@h4ckibl3) 's Twitter Profile Photo

๐Ÿšจ OFFICIAL STATEMENT ๐Ÿšจ I am now an Evangelist for #StatusCode2. Expectations: Spreading innovation, coding vibes, and hype. Reality: Bragging rights and memes. Status Code 2 Indian Institute of Information Technology Kalyani #hackathon #TechTwitter

๐Ÿšจ OFFICIAL STATEMENT ๐Ÿšจ

I am now an Evangelist for #StatusCode2.

Expectations: Spreading innovation, coding vibes, and hype.
Reality: Bragging rights and memes.

<a href="/Status_Code_/">Status Code 2</a> <a href="/IIITKalyani/">Indian Institute of Information Technology Kalyani</a> 
#hackathon #TechTwitter
Open Letter (@openletteryt) 's Twitter Profile Photo

airtel is offering 1 year perplexity pro for free in India google is offering 1 year gemini pro free for students in India India ke data par apna AI train karne ki ninja technique ๐Ÿคฃ

Asutosh Kumar (@h4ckibl3) 's Twitter Profile Photo

They teach you how to pitch to investors, win hackathons, and build pitch decks. But not how to survive a no-sales month. Not how to fire your first hire. Not how to answer your co-founderโ€™s doubt at 2 AM. Thatโ€™s the real startup curriculum. No slides. No mentors. Just scars.

AutoSecurityy (@autosecurityy) 's Twitter Profile Photo

๐Ÿ”Œ๐Ÿ’ณ ๐‘๐…๐ˆ๐ƒ โ€œ๐‹๐š๐š๐๐๐ซ๐ฎ๐ฉ๐ฉ๐ž๐ฅโ€ ๐…๐ซ๐š๐ฎ๐ ๐‚๐จ๐ฌ๐ญ๐ฌ ๐‚๐จ๐ฆ๐ฉ๐š๐ง๐ฒ โ‚ฌ๐Ÿ๐ŸŽ๐ŸŽ,๐ŸŽ๐ŸŽ๐ŸŽ A recent case in the Netherlands exposed a critical flaw in EV charging access systems: RFID token abuse. rtl.nl/nieuws/economiโ€ฆ

AutoSecurityy (@autosecurityy) 's Twitter Profile Photo

๐€๐ฎ๐ญ๐จ๐ฆ๐จ๐ญ๐ข๐ฏ๐ž ๐๐‘ ๐ฉ๐ก๐ข๐ฌ๐ก๐ข๐ง๐  ๐š๐ญ๐ญ๐š๐œ๐ค - ๐Š๐ˆ๐€ ๐ˆ๐ง๐Ÿ๐จ๐ญ๐š๐ข๐ง๐ฆ๐ž๐ง๐ญ ๐‚๐จ๐ง๐ฌ๐จ๐ฅ๐ž ๐‡๐š๐œ๐ค๐ž๐ The vulnerability in the image integrity verification bypass during the boot process of iRTOS to implant a malicious PNG image. github.com/revers3everythโ€ฆ

๐€๐ฎ๐ญ๐จ๐ฆ๐จ๐ญ๐ข๐ฏ๐ž ๐๐‘ ๐ฉ๐ก๐ข๐ฌ๐ก๐ข๐ง๐  ๐š๐ญ๐ญ๐š๐œ๐ค - ๐Š๐ˆ๐€ ๐ˆ๐ง๐Ÿ๐จ๐ญ๐š๐ข๐ง๐ฆ๐ž๐ง๐ญ ๐‚๐จ๐ง๐ฌ๐จ๐ฅ๐ž ๐‡๐š๐œ๐ค๐ž๐

The vulnerability in the image integrity verification bypass during the boot process of iRTOS to implant a malicious PNG image.

github.com/revers3everythโ€ฆ