spq

@__spq__

, , ; reverse, pwn, crypto, ctf. Security engineer at Google.

Vrijeme pridruživanja: studeni 2012.

Tweetovi

Blokirali ste korisnika/cu @__spq__

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @__spq__

  1. Prikvačeni tweet
    5. ožu 2017.
    Odgovor korisniku/ci

    played around with this a bit, here is an animated gif displaying its md5sum:

    Poništi
  2. proslijedio/la je Tweet
    7. sij
    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet

    You want to play some before 2019 ends? got you covered! -> (powered by ) ->

    Poništi
  4. proslijedio/la je Tweet
    23. pro 2019.

    Ever wondered what makes a CTF challenge good? I've asked myself that many times. I wrote this to help me answer that question based on discussions with others in the community

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    9. pro 2019.

    We just got 2nd place in as FluxRepeat. Thanks for the awesome challenges and the participating members across , and . With the price money we will make sure to enable some conferences and CTFs. :-)

    Poništi
  6. 8. pro 2019.

    actually valis might understand better which fake money :)

    Prikaži ovu nit
    Poništi
  7. 5. pro 2019.

    hello beijing o/

    Poništi
  8. proslijedio/la je Tweet
    30. stu 2019.

    Don't miss the episode later today at 17:00 UTC: . We have a great competitor line-up consisting of: peace-maker, NotDeGhost, and Who will be the first one to solve today's tricky pwnable challenge?

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    22. stu 2019.

    Speaking of: If someone is searching for a malware and/or reverse engineering person, preferable in Berlin, I would be interested in talking to them.

    Poništi
  10. proslijedio/la je Tweet
    3. stu 2019.
    Odgovor korisniku/ci

    My very hacky solution: I'll try to post cleaned-up version later, but no promise ;)

    Poništi
  11. proslijedio/la je Tweet
    3. stu 2019.

    I couldn't find a working RIDL exploit on the internet so I made it a challenge at the . 5/10 teams solved it in under 24h. I heard at least will publish an exploit soon, stay tuned ;)

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    3. stu 2019.
    Odgovor korisnicima

    can you fix this?

    Poništi
  13. 3. stu 2019.
    Poništi
  14. proslijedio/la je Tweet
    11. lis 2019.

    Dem wurde gekündig, wir suchen zeitnah neue Räume. Wenn ihr gute Ideen für neue Räumlichkeiten in Aachen habt, dann her damit!

    Poništi
  15. proslijedio/la je Tweet
    22. kol 2019.

    Camp CTF starts tomorrow at 10:00 UTC. Register now:

    Poništi
  16. proslijedio/la je Tweet
    21. kol 2019.

    Reminder: On-site special Pwny Racing episode tomorrow at 14:00 UTC: Come to the Dragon Sleep Pwn Sector village and cheer for our participants: , , and with commentary by me and

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    11. kol 2019.

    The ra1n is over. Thanks to for this awesome CTF and congrats to , HITCONxBFKinesiS and Tea Deliverers

    Poništi
  18. proslijedio/la je Tweet
    23. lip 2019.

    is over - congratz to , and , and all the other teams that qualified for the finals! :) GG WP

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet

    Grab snacks and energy drinks, the is approaching fast! Team registration and Beginner's Quest will open tomorrow Friday 21 June 12:00 GMT at . We will start releasing the main CTF challenges on Sat 22 June 00:01 GMT. Have fun!

    Poništi
  20. proslijedio/la je Tweet
    30. svi 2019.

    Announcing hxp 36C3 CTF —

    Poništi
  21. 7. svi 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·