Hardik Mehta (@hardw00t) 's Twitter Profile
Hardik Mehta

@hardw00t

Security Researcher

ID: 106189409

linkhttps://www.hardw00t.io calendar_today18-01-2010 19:44:59

631 Tweet

761 Followers

544 Following

8kSec (@8ksec) 's Twitter Profile Photo

New Blog Post: Part 2 of Blacktop 's ipsw tool is here 8ksec.io/ipsw-walkthrou… One of the best tools out there for *OS security research

New Blog Post:  Part 2 of <a href="/blacktop__/">Blacktop</a> 's ipsw tool is here 8ksec.io/ipsw-walkthrou…
One of the best tools out there for *OS security research
8kSec (@8ksec) 's Twitter Profile Photo

Showcase your iOS Application Security expertise with our Certified iOS Security Engineer (CISE) Certification for security professionals. This certification is designed for anyone interested in validiating their proficiency in the realm of iOS security at an advanced

Showcase your iOS Application Security expertise with our Certified iOS Security Engineer (CISE) Certification for security professionals. This certification is designed for anyone interested in validiating their proficiency in the realm of iOS security at an advanced
8kSec (@8ksec) 's Twitter Profile Photo

📱In Part 4, Learn the intricate process of sniffing and manipulating location data on iOS using Frida. ➡️8ksec.io/advanced-frida… #Frida #iOSsecurity #AdvancedTech #MobileSecurity #CyberSecurity #MobileSecurity

📱In Part 4, Learn the intricate process of sniffing and manipulating location data on iOS using Frida. ➡️8ksec.io/advanced-frida… #Frida #iOSsecurity #AdvancedTech #MobileSecurity #CyberSecurity #MobileSecurity
8kSec (@8ksec) 's Twitter Profile Photo

In Part 4 of the Mobile Malware Series, we will cover about iOS malware analysis, methods of gathering forensics information and take a look at some interesting system files from a forensics perspective➡️ 8ksec.io/mobile-malware… #iOSSecurity #MobileSecurity #Malware

In Part 4 of the Mobile Malware Series, we will cover about iOS malware analysis, methods of gathering forensics information and take a look at some interesting system files from a forensics perspective➡️ 8ksec.io/mobile-malware… #iOSSecurity #MobileSecurity #Malware
8kSec (@8ksec) 's Twitter Profile Photo

Check out Part-5 of our Mobile Malware Analysis series: Analyzing An Infected Device. Read the full article here: 8ksec.io/mobile-malware… #MobileSecurity #MobileMalware

Check out Part-5 of our Mobile Malware Analysis series: Analyzing An Infected Device. Read the full article here: 8ksec.io/mobile-malware… #MobileSecurity #MobileMalware
8kSec (@8ksec) 's Twitter Profile Photo

❗️This blog delves into Android Deep Linking and WebView vulnerabilities, discussing their targets, exploitation and security measures. 8ksec.io/android-deepli… #DeepLinks #WebViewExploitation #AndroidSecurity #mobilesecurity #CyberSecurity

❗️This blog delves into Android Deep Linking and WebView vulnerabilities, discussing their targets, exploitation and security measures. 8ksec.io/android-deepli… #DeepLinks #WebViewExploitation #AndroidSecurity #mobilesecurity  #CyberSecurity
nicolas vamous (@nvamous) 's Twitter Profile Photo

Finally, the slides release: i.blackhat.com/EU-23/Presenta… We succeeded in performing arbitrary code execution in Samsung NPU firmware with CVE-2023-42483. Moreover, we got ROOT on another Qualcomm device with CVE-2023-33114. Zy 🫡

8kSec (@8ksec) 's Twitter Profile Photo

In sixth part of our Mobile Malware Series, learn about Xenomorph malware➡️ 8ksec.io/mobile-malware… This article navigates the complexities of handling obfuscated code, providing insights into uncovering the original malware payload loaded dynamically through our in-depth

In sixth part of our Mobile Malware Series, learn about Xenomorph malware➡️ 8ksec.io/mobile-malware… This article navigates the complexities of handling obfuscated code, providing insights into uncovering the original malware payload loaded dynamically through our in-depth
8kSec (@8ksec) 's Twitter Profile Photo

#Frida is incredibly powerful toolkit for developers, reverse engineers and security researchers. Learn to unlock its full potential with our comprehensive 5-Part Blog Series on Advanced Frida Usage: Part 1 - 8ksec.io/advanced-frida… Part 2 - 8ksec.io/advanced-frida… Part 3 -

#Frida is incredibly powerful toolkit for developers, reverse engineers and security researchers. Learn to unlock its full potential with our comprehensive 5-Part Blog Series on Advanced Frida Usage:
Part 1 - 8ksec.io/advanced-frida…
Part 2 - 8ksec.io/advanced-frida…
Part 3 -
0xor0ne (@0xor0ne) 's Twitter Profile Photo

Excellent series by 8kSec on arm reversing and exploitation 8ksec.io/arm64-reversin… 8ksec.io/arm64-reversin… 8ksec.io/arm64-reversin… 8ksec.io/arm64-reversin… 8ksec.io/arm64-reversin… 8ksec.io/arm64-reversin… 8ksec.io/arm64-reversin… #arm #cybersecurity

Excellent series by <a href="/8kSec/">8kSec</a> on arm reversing and exploitation 

8ksec.io/arm64-reversin…
8ksec.io/arm64-reversin…
8ksec.io/arm64-reversin…
8ksec.io/arm64-reversin…
8ksec.io/arm64-reversin…
8ksec.io/arm64-reversin…
8ksec.io/arm64-reversin…

#arm #cybersecurity
Steve Weis (@sweis) 's Twitter Profile Photo

This iMessage exploit is crazy. TrueType vulnerability that has existed since the 90s, 2 kernel exploits, a browser exploit, and an undocumented hardware feature that was not used in shipped software: securelist.com/operation-tria…

This iMessage exploit is crazy. TrueType vulnerability that has existed since the 90s, 2 kernel exploits, a browser exploit, and an undocumented hardware feature that was not used in shipped software:
securelist.com/operation-tria…
cemaxecuter (@cemaxecuter) 's Twitter Profile Photo

Third time's the charm, right? Unveiling the 5Ghoul exploit setup – because even ghosts need the latest tech scares! #5ghoul WarDragon 5Ghoul: Setup for 5G NR Vulnerabilities and Security Testing (B210, GL-M2) youtu.be/HN2r6esRDjM

Third time's the charm, right? Unveiling the 5Ghoul exploit setup – because even ghosts need the latest tech scares! #5ghoul

 WarDragon 5Ghoul: Setup for 5G NR Vulnerabilities and Security Testing (B210, GL-M2)
youtu.be/HN2r6esRDjM
Airbus Security Lab (@airbusseclab) 's Twitter Profile Photo

We are happy to announce a new pre-release of BinCAT, our binary static analyzer! New is this release: IDA 8.3 integration for Windows and Linux github.com/airbus-seclab/…

ϻг_ϻε (@steventseeley) 's Twitter Profile Photo

Please contact me if you would like a 15% discount on Full Stack Web Attack - Java & C# edition at ROMHack. Discounts are limited to the first 5 only!

🤷‍♂️ (@floesen_) 's Twitter Profile Photo

Did you know that LSASS has the ability to execute arbitrary kernel-mode addresses? I wrote a small proof of concept that allows administrators to execute unsigned code in the kernel if LSA Protection is disabled. github.com/floesen/KExecDD

Security BSides Ahmedabad (@bsidesahmedabad) 's Twitter Profile Photo

🔓📱 Our latest video is live: 'Hacking into iOS's VoLTE Implementation.' 🎙️Join us as Rajanish Pathak and Hardik Mehta delve into the intricacies of iOS security and explore the vulnerabilities within VoLTE. 🎥Watch now: youtu.be/BJ95zihVUY0 #hacking #ios #exploit #VoLTE

8kSec (@8ksec) 's Twitter Profile Photo

🚨🚨🚨Big Announcement! Introducing On-Demand Mobile Security Courses🚀 We’re thrilled to announce the start of pre-registration for our On-Demand Courses! At 8kSec Academy, you can advance your Mobile Security skills and earn certifications anytime, from anywhere🌍 Available

🚨🚨🚨Big Announcement! Introducing On-Demand Mobile Security Courses🚀

We’re thrilled to announce the start of pre-registration for our On-Demand Courses! At 8kSec Academy, you can advance your Mobile Security skills and earn certifications anytime, from anywhere🌍

Available
Dhiraj (@randomdhiraj) 's Twitter Profile Photo

SmuggleShield - A cross platform browser extension which aims to block basic HTML smuggling attack. github.com/RootUp/Smuggle… #infosec #purpleteam

8kSec (@8ksec) 's Twitter Profile Photo

🚨🚨🚨Free Mobile Security Labs – No One Has Solved Them Yet We’ve released a brand-new series of mobile exploitation challenges. Free, hands-on, and unlike anything you've tackled before: 8ksec.io/battle/. Think you can crack them? 📲What’s live now: 10 Android

8kSec (@8ksec) 's Twitter Profile Photo

🚨Announcing our brand new course: Practical AI Security: Attacks, Defenses, and Applications AI is reshaping cybersecurity. But most professionals don't know how to attack it, defend it, or leverage it effectively. Introducing our comprehensive AI Security course - A unique

🚨Announcing our brand new course: Practical AI Security: Attacks, Defenses, and Applications

AI is reshaping cybersecurity. But most professionals don't know how to attack it, defend it, or leverage it effectively.

Introducing our comprehensive AI Security course - A unique