Tweetovi

Blokirali ste korisnika/cu @5BCCTF

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @5BCCTF

  1. proslijedio/la je Tweet
    12. sij

    A bit late to the party but our write to Sicher² is up Thanks to , the magician of flags.

    Prikaži ovu nit
    Poništi
  2. 3. sij

    Awesome write-up for an awesome challenge

    Poništi
  3. proslijedio/la je Tweet
    2. sij

    2019 was a great year for Dragon Sector! 🏆1st place at global ranking for the 2nd year in a row & 3rd time in the history of our team 🥇1st place at 2 CTFs 🥈2nd place at 5 CTFs 🥉3rd place at 5 CTFs 💻And also organized a well received Dragon CTF 2019!

    CTFTime scoreboard screenshot:
1st place: Dragon Sector (Poland)
2nd place: Balsn (Taiwan)
3rd place: Plaid Parliament of Pwning (USA)
    Poništi
  4. proslijedio/la je Tweet
    29. pro 2019.

    Played CTF with . It was awesome and so diverse. With my teammates, I wrote heap exploit for AVR, ropchain for arm and shellcode for x86. Thanks !

    Poništi
  5. 30. pro 2019.

    Thanks for hosting CTF (for the first time!), the challenges were definitely a good exercise for our pwn (and zahjebischte) skills, see you next year. 😁

    Poništi
  6. proslijedio/la je Tweet
    29. pro 2019.

    <> congrats to Drunk Sector for finding out about their team name only 40 hours into the competition! I don't even 🤣🤣🤣

    Poništi
  7. 21. stu 2019.
    Poništi
  8. 4. stu 2019.

    2nd time at the 2nd place at , an honor, thank you for another awesome CTF, see you next year.

    Poništi
  9. proslijedio/la je Tweet

    Grab snacks and energy drinks, the is approaching fast! Team registration and Beginner's Quest will open tomorrow Friday 21 June 12:00 GMT at . We will start releasing the main CTF challenges on Sat 22 June 00:01 GMT. Have fun!

    Poništi
  10. proslijedio/la je Tweet

    Ready for Google CTF 2019? Join us June 22/23 for 48 hours of 3p1c 1337 h4x1ng!

    Poništi
  11. proslijedio/la je Tweet
    3. svi 2019.

    Yes, join us :) The tasks are going to be fun! :)

    Poništi
  12. proslijedio/la je Tweet
    20. tra 2019.

    Wrote up the Everland challenge I worked on during the Playing misc/re is always more fun, constantly learning new languages, technologies or techniques Props to and others in the team

    Poništi
  13. 16. tra 2019.

    Had the honor to play for the first time, thank you for an awesome and challenging CTF.

    Poništi
  14. proslijedio/la je Tweet
    14. tra 2019.

    That brings PlaidCTF2019 to an end! Congratulations to the winners (and all participants) of the 9th PlaidCTF: 217, TeaDeliverers, and seoulplusbadass

    Poništi
  15. proslijedio/la je Tweet
    11. tra 2019.

    With just over a day left until Plaid starts, we've opened up registration on ! Registration will also be open throughout the competition, for those teams that need it.

    Poništi
  16. proslijedio/la je Tweet
    27. pro 2018.

    The started and I some challenges: krautflare: write an exploit for namespaces: a linux user namespaces sandbox filemanager: a web challenge logrotate: exploit my logrotate(8) config to get a root shell And if you're at come and say hi!

    Poništi
  17. proslijedio/la je Tweet

    35C3 CTF registration is now up at . There will be a junior version again this year at Join us in IRC! And make sure to register an assembly in our cluster if you plan to play on site.

    Poništi
  18. proslijedio/la je Tweet
    30. lis 2018.

    My writeup about BOBNEEDSHELP challenge from Playing with was really awesome!

    Prikaži ovu nit
    Poništi
  19. 30. lis 2018.

    2nd place at , thanks to everyone at google for the challenges, we had a blast!

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·