Rezultati pretraživanja
  1. 29. pro 2016.
  2. 29. pro 2016.

    Nobody solved my recurse challenge. Solution was triggering a vfork+exit and then a bit heap-fu. Writeup:

  3. 6. sij 2017.

    A short (and maybe yet incomplete) collection of challenges that wrote for can now be found at .

  4. 29. pro 2016.

    Check out my writeups for web150-try and web250-yoso! Other writeups incoming ;)

  5. is over! All teams did great! It was really close in the end. Top 3: 1. 2. 3. b1o0p

  6. 27. pro 2016.

    Attention teams! is a qualifying event for at 25 next year

  7. 29. pro 2016.

    All my 33C3 CTF challenges writeup: by bruce30262 @ BambooFox

  8. 31. pro 2016.

    Code and exploit for the "read-eval-pwn loop" challenge (pwning a [mostly] unmodified Lua interpreter) of

  9. 20. sij 2017.

    PHP include and bypass the broken SSRF protection with two DNS A records - list0r (web 400)

  10. : 3000 Stickers 1150 Flags 278 active Teams 31 Challenges 8 unintended Bugs 3 red Herrings 2 unsolved Challenges 1 0-Day

  11. 29. pro 2016.
  12. 3. sij 2017.

    write-up for shia (web 175, )! Thx for the nice challenge and the cool CTF!

  13. 13. sij 2017.

    Format String to dump binary and gain RCE - ESPR (pwn 150)

  14. 3. sij 2017.

    Wanna hack some IoT gone wrong? Check out our code and exploit for the "smartfridge" challenge

  15. 30. pro 2016.

    Code and exploits for some of my tasks: and Had tons of fun making them!

  16. 19. ožu 2017.

    33C3 CTF 2016 - beeblebrox (Crypto 350)

  17. 3. velj 2017.

    Challenge `hohoho (misc 350)` was an amazing team effort during the

  18. 6. sij 2017.

    I have uploaded the source, exploit and all the scripts used for babyfengshui for the

  19. 2. sij 2017.

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.