KEMBAR78
Mihir Shah, Information security analyst at Freelance
Mihir Shah, profile picture

Mihir Shah

Sort by
Windows custom shellcoding
Seh based attack
Kubernetes
Post exploitation using powershell
Securing docker containers
Buffer overflow
Cracking the crypto
Stego.ppt
Wi fi pentesting
Reversing with gdb
ROP
Return Oriented Programming - ROP
PMKID ATTACK!!
OAuth 2.0