0x41414141

@0x41414141yt

just another infosec youtube channel

Vrijeme pridruživanja: svibanj 2018.

Tweetovi

Blokirali ste korisnika/cu @0x41414141yt

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @0x41414141yt

  1. 16. pro 2019.

    Pokémon-themed CTF challenge, part 2: exploiting a type confusion

    Poništi
  2. 9. pro 2019.

    Reversing a Pokémon-themed pwnable challenge with

    Poništi
  3. 24. stu 2019.

    Video writeup using and pwnapi for the last challenge from ROP Emporium: "ret2csu"

    Poništi
  4. 6. lis 2019.
    Poništi
  5. 2. lis 2019.

    Video writeup for “babysh” from ‘s RomHack CTF 2019 Solved using and pwnapi (my python3 dumb clone of pwntools)

    Poništi
  6. 11. srp 2019.

    Playing With Pwntools: Easy ROP Challenges Solver

    Poništi
  7. 14. sij 2019.

    Exploiting "Arraymaster" from Junior CTF: from integer overflow to command execution

    Poništi
  8. 21. stu 2018.

    Video writeup for 2018 "Freeze!" : Reversing Simple Python Bytecode

    Poništi
  9. 21. lip 2018.

    Exploiting "pivot" challenge from ROP Emporium using stack pivoting and one-gadget

    Poništi
  10. 1. lip 2018.

    Exploiting "callme" challenge from ROP Emporium manually and using pwntools

    Poništi
  11. 24. svi 2018.

    Scripting with r2pipe to solve a self-modifying crackme

    Poništi
  12. 18. svi 2018.

    Exploiting "ret2win" challenge from ROP Emporium to get flags and a shell

    Poništi
  13. 12. svi 2018.

    Solving a Crackme with Cutter () and Z3

    Poništi
  14. 10. svi 2018.

    A collection of resources to start learning

    Poništi
  15. 8. svi 2018.

    LOADING... ██████████████]99%

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·