Eat Sleep Pwn Repeat

@EatSleepPwnRpt

Eat Sleep Pwn Repeat – CTF Team

Vrijeme pridruživanja: ožujak 2016.

Tweetovi

Blokirali ste korisnika/cu @EatSleepPwnRpt

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @EatSleepPwnRpt

  1. proslijedio/la je Tweet
    27. pro 2019.

    For all women interested in playing the - There will be a short introduction at the blckpwny tables at 21:30 today with the opportunity to join the blckpwny team.

    Poništi
  2. You want to play some before 2019 ends? got you covered! -> (powered by ) ->

    Poništi
  3. proslijedio/la je Tweet
    9. pro 2019.

    We just got 2nd place in as FluxRepeat. Thanks for the awesome challenges and the participating members across , and . With the price money we will make sure to enable some conferences and CTFs. :-)

    Poništi
  4. proslijedio/la je Tweet
    18. kol 2019.

    ea tsle epp wn repeat!

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    18. kol 2019.
    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    9. srp 2019.

    How do you like my breadboard?

    Poništi
  7. proslijedio/la je Tweet
    12. lip 2019.

    On I made a little challenge dubbed 0pack, now the code is open source, redesigned as general purpose tool: HTML slides can be found here:

    Poništi
  8. So 35C3 was our last C3 CTF event. This year our friends from will be organizing the CTF and it will be grand!

    Poništi
  9. proslijedio/la je Tweet
    29. ožu 2019.
    Poništi
  10. proslijedio/la je Tweet
    16. sij 2019.

    The vuln I found at for the VirtualBox challenge was not the 0day intended.. and it just got patched :) Turns out finding 0days in CTFs is slowly becoming a thing :P

    Poništi
  11. proslijedio/la je Tweet
    7. sij 2019.

    haven't done CTFs in a while. here's my writeup for this (last?) year's challenge "php"

    Poništi
  12. proslijedio/la je Tweet

    "Collection" writeup - with an unintended solution. aka how to break out of a python sandbox without exploiting any bugs using the "LOAD_CONST" trick.

    Poništi
  13. proslijedio/la je Tweet
    7. sij 2019.

    Here is my writeup on how I solved the express-yourself challenge from the CTF.

    Poništi
  14. proslijedio/la je Tweet
    4. sij 2019.

    Due to some demand here are the sources and solutions for some challenges including the smart contracts + exploits:

    Poništi
  15. proslijedio/la je Tweet
    4. sij 2019.

    Writeup for the pillow challenge of can now be found here:

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    4. sij 2019.
    Poništi
  17. proslijedio/la je Tweet
    3. sij 2019.

    I just wrote another blog post. This time its a write up for a its the php challenge.

    Poništi
  18. proslijedio/la je Tweet
    3. sij 2019.

    I just released a Writeup for the WebKid challenge of . You can find it here: Writeup for pillow will follow soon...

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    2. sij 2019.

    filemanager: xs-search by abusing chrome's xss auditor as an oracle. Write-up from here: logrotate: if you configure logrotate to touch user-controlled directories, you can race it to get a root shell:

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    2. sij 2019.

    And here are the writeups for my challenges. krautflare: made a really amazing writeup with in detail description of v8 turbofan's inner workings: namespaces: chroot escape + ptracing the supervisor 1/2

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·