🙄
p1k4chu@p1k4chu-host
  • About Me
  • Tools
    • Defensive Tools
      • H0neyTr4p
    • Offensive Tools
      • Ransomware Simulator - PyRan
  • Security Research
    • AI Security Research
      • Attacking using (and defending against) Input manipulation attacks against AI
      • (Ab)using AI to attack M365 and other services to conduct plethora of attacks
    • Cloud Security Research
      • Azure Storage Account Security - Attack & Defend: Part 1
      • Attack and Defend Azure Serial Console - Part 1
      • Azure Serial Console Attack and Defense - Part 2
    • Adversarial Tradecraft Research & Detection
      • RDP Exfil - The technique that works almost every time
      • Smishing Traid targets India with large scale "India Post" themed iMessage phish texts
      • Quick Assist: Friend or Foe? How adversaries can exploit this tool and how can you defend?
      • EDR Silencer - Embracing the Silence
      • Dissecting & Detecting Lsass Shtinkering
      • Detecting malicious OOB: Part -1: Hunting for OOB server - Interact.sh
      • Abusing Windows VPN for EXFIL
      • Analyzing Nobelium's HTML Dropper - EnvyScout
    • Web & Mobile App Sec
      • [CVE-2015-2300] ENL-Newsletter CSRF Full Disclosure
      • Yandex Mobile App vulnerable to Insecure Data storage
      • Bug on paypal worth 1000$
      • Session fixation bug on coinbase.
      • CyanogenMod (In)Secure Folder Lock !
  • Security Talk
    • Review of CRTP - Pentester Academy
    • Review of Hacking and Securing Kubernetes
Powered by GitBook

About Me

NextDefensive Tools

Last updated 8 months ago

Was this helpful?

Hi Reader,

I'm Subhash and I work as a Security Engineer [Blue Team] at Microsoft. When I'm not working, I generally get my hands dirty and document my experiences and learnings here. All for a safer internet.

I used to be a Red Teamer back in the day and old habits die hard. I'm passionate about securing organizations (through offensive and defensive security research), security tooling/automation.

I'm still learning (like many others in the industry) and would love to take any constructive criticism or feedback you may have for me. Please reach out using details. I'd love to have a chat, learn, grow and contribute back to the community.

I believe that to fight the resourceful adversaries, the entire security community must come together and share the intel/learning.

Here are some quick links for you to explore my work:

How to reach out to me:

these
Security Tools
My feedback on security courses
Security Research articles
My LinkedIn
My Twitter
GitHub Profile