Personal Information
Organization / Workplace
Pune Area, India India
Occupation
Infosec Zealot
Website
http://7h3ram.github.com/
About
I'm an infosec enthusiast working in targeted research space with the goal of delivering innovative and intelligent solutions. I've a solid combination of skills and knowledge spanning following domains:
[+] IDS/IPS
[+] AntiMalware
[+] Threat Intelligence
Specialties:
[+] Network/file-format forensics
[+] Python, C/C++, x86 assembly
[+] Research methodologies and innovation
[+] Quick learner and self-driven
I've been working on various projects outside of work and present regularly at conferences like Nullcon, Black Hat and DEF CON.
Tags
nids
libemu
yara
regex
shellcode
netsec
buffer overflows
stack layouts
system basics
exploitation
endianness
See more
Presentations
(2)Likes
(55)Unix executable buffer overflow
Ammarit Thongthua ,CISSP CISM GXPN CSSLP CCNP
•
9 years ago
Attacking the Webkit heap [Or how to write Safari exploits]
Seguridad Apple
•
12 years ago
24 33 -_metasploit
wozgeass
•
13 years ago
Finding Diversity In Remote Code Injection Exploits
amiable_indian
•
16 years ago
Fermín J. Serna - Exploits & Mitigations: EMET [RootedCON 2010]
RootedCON
•
14 years ago
Owasp Top 10 - Owasp Pune Chapter - January 2008
abhijitapatil
•
16 years ago
A buffer overflow study attacks and defenses (2002)
Aiim Charinthip
•
13 years ago
Kernel Pool
guest215c4e
•
15 years ago
Debugging With Id
guest215c4e
•
15 years ago
Reliable Windows Heap Exploits
amiable_indian
•
17 years ago
Common mistakes in C programming
Larion
•
13 years ago
2.Format Strings
phanleson
•
14 years ago
Buffer Overflow Attacks
harshal kshatriya
•
14 years ago
1.Buffer Overflows
phanleson
•
14 years ago
Cisco IOS Attack & Defense - The State of the Art
amiable_indian
•
15 years ago
Sourcefire Vulnerability Research Team Labs
losalamos
•
14 years ago
Design and implementation_of_shellcodes
Amr Ali
•
13 years ago
Socket Programming In Python
didip
•
16 years ago
Basic socket programming
Kristian Arjianto
•
13 years ago
Auditing the Opensource Kernels
Silvio Cesare
•
13 years ago
Your First Guide to "secure Linux"
Toshiharu Harada, Ph.D
•
13 years ago
Linux Kernel Security: Adapting 1960s Technology to Meet 21st Century Threats
James Morris
•
13 years ago
Linux Kernel Security Overview - KCA 2009
James Morris
•
14 years ago
HES2011 - Jon Oberheide and Dan Rosenberg - Stackjacking
Hackito Ergo Sum
•
13 years ago
Linux Kernel Exploitation
Scio Security
•
13 years ago
Unusual Bugs
amiable_indian
•
17 years ago
Process' Virtual Address Space in GNU/Linux
Varun Mahajan
•
13 years ago
Everybody be cool, this is a roppery!
zynamics GmbH
•
13 years ago
Exploiting OpenBSD
amiable_indian
•
17 years ago
Failure Of DEP And ASLR
n|u - The Open Security Community
•
14 years ago
Personal Information
Organization / Workplace
Pune Area, India India
Occupation
Infosec Zealot
Website
http://7h3ram.github.com/
About
I'm an infosec enthusiast working in targeted research space with the goal of delivering innovative and intelligent solutions. I've a solid combination of skills and knowledge spanning following domains:
[+] IDS/IPS
[+] AntiMalware
[+] Threat Intelligence
Specialties:
[+] Network/file-format forensics
[+] Python, C/C++, x86 assembly
[+] Research methodologies and innovation
[+] Quick learner and self-driven
I've been working on various projects outside of work and present regularly at conferences like Nullcon, Black Hat and DEF CON.
Tags
nids
libemu
yara
regex
shellcode
netsec
buffer overflows
stack layouts
system basics
exploitation
endianness
See more