Sauercloud

@Sauercl0ud

Sauercloud (a.k.a. Krautstrike, a.k.a. Germany's next ROPModel) is a cooperation of many german speaking CTF teams, first assembled for DEFCON CTF 2018.

https://ctftime.org/team/54748
Vrijeme pridruživanja: srpanj 2018.

Tweetovi

Blokirali ste korisnika/cu @Sauercl0ud

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Sauercl0ud

  1. proslijedio/la je Tweet
    22. kol 2019.

    Camp CTF starts tomorrow at 10:00 UTC. Register now:

    Poništi
  2. proslijedio/la je Tweet
    14. kol 2019.

    Congratulations to for their 7th place at the DEF CON 2019 CTF Finals and 1st place at King-of-the-Hill challenge! NVISO is proud to support our German team to achieve this awesome result!

    Poništi
  3. 12. kol 2019.

    In the end we even received (kind of) 😉

    Poništi
  4. 12. kol 2019.

    These are the faces behind our (not so sour) on-site team for

    Poništi
  5. proslijedio/la je Tweet
    11. kol 2019.
    Poništi
  6. 11. kol 2019.

    Thanks HITCONxBFKinesiS for the sweet present! 😊

    Poništi
  7. 11. kol 2019.

    The ra1n is over. Thanks to for this awesome CTF and congrats to , HITCONxBFKinesiS and Tea Deliverers

    Poništi
  8. 11. kol 2019.
    Poništi
  9. 11. kol 2019.

    We have reached the last few minutes of 27 . Time to fire up those last exploits and prepare for the after party at the bar that just suddenly spawned in the CTF area. 🍾

    Poništi
  10. 10. kol 2019.

    Final scoreboard for this (awesome) King-of-the-Hill challenge by . We had a lot of fun with this one (also the team members who aren't that much into rev/pwn challenges) 🙂

    Prikaži ovu nit
    Poništi
  11. 10. kol 2019.

    "Bring a monitor" they said. Now we know why...

    Prikaži ovu nit
    Poništi
  12. 9. kol 2019.
    Poništi
  13. 9. kol 2019.
    Poništi
  14. 9. kol 2019.

    Preparing for the battle...

    Poništi
  15. 8. kol 2019.

    Could somebody at lend us such an DB9 Gender Changer (or alternatively an USB-to-Serial adapter with an DB-9F connector) for a few hours?

    Poništi
  16. 7. kol 2019.

    Time to move into our new temporary hack center

    Poništi
  17. 4. kol 2019.

    Very BIG thanks to for a generous donation, making it possible to collaborate on-site at 27

    Poništi
  18. 4. kol 2019.

    Another BIG shoutout to and for helping us out with network equipment and server resources!

    Poništi
  19. proslijedio/la je Tweet
    24. ruj 2018.

    Nice documentation on our trip to by my team member :

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    18. kol 2018.

    For DEF CON 2018, we built a bit of assembly code that prints out shellcode in 8 different architectures: AMD64, Clemency, PDP-1, LGP-30, and several others. Check out how we did it:

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·