
Sreeram KL
@kl_sree
Infosec enthusiast! | @googlevrp fan boy ๐ | CTF @thehackerscrew1 | CS student | Web Security
ID: 952234523965575168
https://blog.geekycat.in/ 13-01-2018 17:42:56
2,2K Tweet
2,2K Followers
863 Following




New: Repeater Strike Written by Gareth Heyes \u2028, powered by Burp AI! Scale IDOR & fuzzing like never before: ๐ค Auto-build regex rules with AI ๐ Scan proxy history for similar bugs ๐ ๏ธ Save, edit, and re-run rules easily #BurpAI






The Schedule is Live! Check out the lineup of talks, workshops, panel discussions, and hands-on activities happening at Adversary Village at DEF CON 33! Schedule: adversaryvillage.org/adversary-evenโฆ Mark your calendars - we can't wait to see you all at DEF CON! #AdversaryVillage #DEFCON33






Can you execute arbitrary Python code from only a comment? This was the premise of a recent CTF challenge, which I solved after diving into the CPython source code with the help of Hacktron AI (after a long night chasing a dead end, customising a few Hacktron agents helped me to





Thanks PortSwigger and Bug Bounty Village for this awesome event โ and also to my DEVCORE buddies for standing on stage to collect the trophy for me! A little follow-up article on this research is coming soon... stay tuned! ๐ค

