Sandipan Roy
@ByteHackr
Senior Product Security Engineer @RedHat | SDE @Fedora | #PSIRT #RHEL | Ex @parrotsec
You might like
Learn how RHEL 9 simplifies system-wide crypto policies for stronger security and compliance. Customize policies to meet your needs! Ref: developers.redhat.com/articles/2024/… @rhdevelopers @RedHatSecurity @RedHat #CyberSecurity #Linux #RHEL #CryptoPolicies #Compliance #Infosec #RedHat
Arguably the most brilliant engineer in FFmpeg left because of this. He reverse engineered dozens of codecs by hand as a volunteer. Then security "researchers" and corporate employees came along repeatedly insisted "critical" security issues were fixed immediately waving their…
🔍Malware Analysis & Reverse Engineering ☄️Awesome Malware Analysis github.com/rshipp/awesome… ☕️malware-study github.com/albertzsigovit… ✅RPISEC Malware Course github.com/RPISEC/Malware 🔫Reverse Engineering Roadmap github.com/x86byte/RE-MA-… ☄️Herramientas de Ciberseguridad…
𝗢𝗦𝗖𝗣/𝗖𝗣𝗧𝗦 𝗥𝗘𝗦𝗢𝗨𝗥𝗖𝗘𝗦 🔗 github.com/0xsyr0/Awesome… 🔗 swisskyrepo.github.io/InternalAllThe… 🔗thehacker.recipes 🔗 notchxor.github.io/oscp-notes/1-r… 🔗 github.com/A-poc/RedTeam-… 🔗 breachforce.net/active-directo… 🔗 lorenzomeacci.com/advanced-initi… 🔗 github.com/notthehiddenwi… 🔗…
Bypassing kASLR via Cache Timing : r0keb.github.io/posts/Bypassin… kASLR Internals and Evolution : r0keb.github.io/posts/kASLR-In… credits @r0keb
AI Turns CVEs into Exploits in Hours: The Case of CVE-2025-32433 securityexpress.info/ai-turns-cves-…
"Red Hat Enterprise Linux (RHEL) has long been a leader in integrating robust security mechanisms." Discover new insight in our latest blog: #SELinux and #RHEL: A technical exploration of #security hardening red.ht/42RfOMC
SELinux is a powerful tool for enforcing security in Red Hat Enterprise Linux (RHEL). Learn how it works, key commands, and how it mitigates vulnerabilities. Read more 👉 redhat.com/en/blog/selinu… #SELinux #rhel #linuxsecurity #cybersecurity #redhat #redhatlinux
Memory Segmentation Cheat Sheet
Protect your code from stack-based attacks! Learn about stack canaries, control flow integrity, and other powerful defenses in GCC & Clang. Blog: blog.bytehackr.in/top-5-compiler… #CyberSecurity #SoftwareDevelopment #Hacking #StackProtection #Privacy
🚀 Check out my latest blog on Linux Device Drivers! Ref: blog.bytehackr.in/unlocking-the-… #Linux #DeviceDrivers #Programming #TechEducation #OpenSource @hashnode
blog.bytehackr.in
Unlocking the Power of Linux Device Drivers
Introduction Linux is a versatile and widely-used operating system, from enterprise servers to embedded systems. At the heart of its functionality is the ability to interact with hardware, which is...
I got the Hacktoberfest 2024: Level 4 badge from Hacktoberfest! holopin.io/userbadge/cm2k… via @holopin_
Want a chance to get a free backpack from Coursera? 🎒 Simply repost and DM us your full name, address, email and phone number. 😊 (Exclusive to learners in the US, UK and India)
.@mikeferris is making bold statements 💪 See why the largest orgs in almost every sector depend on Red Hat Enterprise #Linux: red.ht/4ha2Caf.
Humko neeche utaar lenge log Ishq latka rahega pankhey pe❤️🩹 ~Zia Mazkoor
Boost your API security skills with DVAPI! 🚀 Learn hands-on with OWASP API Top 10 - 2023 to spot and fix common vulnerabilities.🔍 Ref: blog.bytehackr.in/api-security-t… @payatulabs DVAPI 👨💻 #APISecurity #DVAPI #OWASP #CyberSecurity #API #EthicalHacking #SecureCoding #DevSecOps
Whether you need to build a new policy from the ground up or customize an existing one, these tools allow administrators to fine-tune #security settings to match their unique requirements. #RHEL red.ht/3TZfjLa
Can You Get Root With Only a Cigarette Lighter? : da.vidbuchanan.co.uk/blog/dram-emfi… credits @David3141593
LINUX Systems Under Attack via Printing System (CUPS) With CVE-2024-47076, CVE-2024-47175, CVE-2024-47176, and CVE-2024-47177. Ref: blog.bytehackr.in/linux-systems-… #cups #cybersecurity #linux #RemoteCodeExecution #infosec #CVE #linuxsecurity #opensourcesoftware @evilsocket
🗞️Lares Labs: The final chapter in our Kerberos series is now live. Sr Adversarial Engineer @_RayRT provides an in-depth analysis of Kerberos Delegations, exploring the intricacies of Unconstrained, Constrained, and Resource-Based attacks. buff.ly/3MV6Y7n
United States Trends
- 1. Wemby 33.3K posts
- 2. Steph 70.2K posts
- 3. Spurs 31.4K posts
- 4. Draymond 13.9K posts
- 5. Clemson 11.2K posts
- 6. Louisville 10.9K posts
- 7. #SmackDown 51.4K posts
- 8. Zack Ryder 15.9K posts
- 9. Harden 14.2K posts
- 10. Aaron Fox 2,252 posts
- 11. #DubNation 2,023 posts
- 12. Massie 55.2K posts
- 13. Marjorie Taylor Greene 46.1K posts
- 14. Brohm 1,664 posts
- 15. Dabo 1,981 posts
- 16. Bill Clinton 186K posts
- 17. Landry Shamet 5,918 posts
- 18. Mitch Johnson N/A
- 19. UCLA 8,651 posts
- 20. Matt Cardona 2,902 posts
Something went wrong.
Something went wrong.