Mitsurugi Heishiro

@0xmitsurugi

Reverse, exploit, pwn. My blade is angry... Want a taste?! The name's 0xMitsurugi. Don't forget it. Member of HexpressoCTF

Vrijeme pridruživanja: studeni 2013.

Tweetovi

Blokirali ste korisnika/cu @0xmitsurugi

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @0xmitsurugi

  1. proslijedio/la je Tweet
    31. sij
    Poništi
  2. proslijedio/la je Tweet
    17. pro 2019.
    Poništi
  3. proslijedio/la je Tweet
    13. pro 2019.

    24 hours ago we started # 422 total players # 313 players passing at least step 1 # 11 players working on the last step before the final victory! Only 1 minute of down time, pretty good ratio :D 6 days remaining come and try:

    , , i još njih 4
    Poništi
  4. proslijedio/la je Tweet
    12. pro 2019.
    Poništi
  5. proslijedio/la je Tweet
    15. stu 2019.

    , ninjas and chartreuse...

    Poništi
  6. proslijedio/la je Tweet
    15. stu 2019.

    New blog post about Bug Bounty, Chrome, CORS, and Cache.

    Poništi
  7. proslijedio/la je Tweet
    23. srp 2019.
    Poništi
  8. proslijedio/la je Tweet
    18. lip 2019.

    The Synacktiv summer challenge is back, courtesy of ;-) Prices: ChipWhisperer Lite 32-bit Basic Board, HummingBoard Edge and a Diva IOT board.

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    3. svi 2019.

    C'est bon, votre opsec est foutue les mecs ! On sait que c'est le chan IRC :) Vu par

    Poništi
  10. proslijedio/la je Tweet
    25. tra 2019.

    Proud to welcome , , and in our new office in Lyon!

    Poništi
  11. proslijedio/la je Tweet
    30. ožu 2019.

    Un grand bravo à pour leur victoire, à LaDelikataj pour leur geste envers 1e asso et à pour ce superbe event! Tjrs un plaisir de revoir tte la commu . Cheers cc

    Poništi
  12. proslijedio/la je Tweet
    18. ožu 2019.
    Poništi
  13. proslijedio/la je Tweet
    6. ožu 2019.

    NSA: we are open sourcing a multi million line of code SRE tool to democratize the malware analysis space. Microsoft: Hold my beer

    Poništi
  14. 1. ožu 2019.

    two for the challs in the escape game challenge. Fun to crack, cc

    Poništi
  15. 20. velj 2019.

    Under linux you can simply copy a binary to memory and execv() it. No tracks, no filesystem manipulation, and it bypass noexec! it's a oneliner.

    Poništi
  16. proslijedio/la je Tweet
    18. velj 2019.

    First step completed! Took the 1st place. The challs were funny. Waiting now for the finals cc

    Poništi
  17. proslijedio/la je Tweet
    22. pro 2018.
    Prikaži ovu nit
    Poništi
  18. 11. pro 2018.
    Prikaži ovu nit
    Poništi
  19. 4. pro 2018.

    Just found a of +37k emails address and pwd. Sent to , will be available in a day or two. And please, please, use strong ... (estimated cracking time for pwd in pictures: less than 5 seconds)

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    2. pro 2018.

    This was an AMAZING event. Crazy hard but we learned so much and met a lot of people, the bests in their domain! Thanks cc

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·