Oblivion

@0xbadface

pop's the stack all day everyday; CTF player with OverTheWireCTF and .nl; Fuzzing & RE fanatic; Resident Dutch Hacker.

Netherlands
Vrijeme pridruživanja: studeni 2015.

Tweetovi

Blokirali ste korisnika/cu @0xbadface

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @0xbadface

  1. 29. sij
    Poništi
  2. 24. sij

    Why is OpenBSD so fun to play with :>

    Poništi
  3. proslijedio/la je Tweet
    24. sij

    Got a sample which needs extra DLLs? Find out how to submit multiple files at once to Triage in this week's blog

    Poništi
  4. 22. sij

    What's going to be my next side project/blogpost/guide thingy 😎

    Poništi
  5. 20. sij

    What a great day to debug your PoC's :)

    Poništi
  6. 31. pro 2019.
    Poništi
  7. proslijedio/la je Tweet
    30. stu 2019.

    Don't miss the episode later today at 17:00 UTC: . We have a great competitor line-up consisting of: peace-maker, NotDeGhost, and Who will be the first one to solve today's tricky pwnable challenge?

    Prikaži ovu nit
    Poništi
  8. 27. stu 2019.

    The bible has arrived!!

    Poništi
  9. proslijedio/la je Tweet
    26. stu 2019.

    Just 5 days left!!! Let's all say thanks to for these awesome illustrations :D

    Poništi
  10. proslijedio/la je Tweet
    22. stu 2019.

    Introducing the fzero fuzzer! A target-architecture-agnostic grammar-based fuzzer (inspired by F1). With no input size constraints, multi-thread support, and all Rust code for no corruption bugs. 5x faster than the worlds fastest grammar-based fuzzer ;D

    Poništi
  11. 22. stu 2019.

    Do you remember when you joined Twitter? I do!

    Poništi
  12. 21. stu 2019.

    Trivia time! Will this wrap-around or not? ;)

    Poništi
  13. proslijedio/la je Tweet
    19. stu 2019.

    We're going to give a go, together with an IRC bridge. Let's see how it goes! :D

    Poništi
  14. 18. stu 2019.

    Is there anyone who wants to audit some kernel code with me sometime? Let's see if we can find some of them juicy bugs!

    Poništi
  15. proslijedio/la je Tweet
    17. stu 2019.

    We're in full force making challenges right now, don't forget to register :D Already 200 teams signed up!

    Poništi
  16. 16. stu 2019.

    Hmm I found an integer overflow in a core Apache2 module, time to find an exploit path!😎

    Poništi
  17. 12. stu 2019.

    I recently rewrote a tool I wrote with , it's autoSubTakeover, our subdomain-takeover tool. It's quite a lot faster now and on pypi too check it out and give me feature requests :)

    Poništi
  18. proslijedio/la je Tweet
    28. lip 2016.

    A couple of new levels deployed on and now one for the newbies too!

    Poništi
  19. 25. velj 2016.

    Yay, I'm oficially a participant of thanks!

    Poništi
  20. 25. stu 2015.

    Haven't even logged in yet > account is locked ?

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·