Tripoloski!

@tripoloski_1337

Information security enthusiasts | information system student | CTF player with | pwn

Jakarta, ID
Vrijeme pridruživanja: travanj 2014.

Tweetovi

Blokirali ste korisnika/cu @tripoloski_1337

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @tripoloski_1337

  1. proslijedio/la je Tweet
    1. velj

    Here is my massive lib db (for ctfs/wargames/blind pwns etc.). It consists of thousands of libs across over a dozen Linux distributions and architectures spanning the last 20 years. It indexes symbols & gadgets (including one gadgets AKA magic gadgets).

    Poništi
  2. proslijedio/la je Tweet
    28. sij

    [Educational] One of the best blog posts that I ever read about going from 0 to unauth RCE in f**king Mikrotik OS step by step:

    Prikaži ovu nit
    Poništi
  3. 30. sij
    Poništi
  4. proslijedio/la je Tweet
    5. sij

    Retweet if you *also* don't have any CVE's but are still a valued member of the infosec community. 🖤

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    23. sij

    ========================= The Life and Incredible Adventures of One QEMU Bug (Which I Finally Fixed) ========================= A thread [1/n]

    Prikaži ovu nit
    Poništi
  6. 24. sij

    👀👀 seriously whatsapp?

    Poništi
  7. proslijedio/la je Tweet

    Techi, you suffered enough, & from ppl who didn't know you. You were so young to endure it but you held on for 3 years. It isn't your fault. You need your piece of mind. We love you, & will keep loving & supporting you. Stay healthy❤️💚!!

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    10. sij

    I'm releasing ghidra scripts that I made for pwn and reversing tasks, starting with this set of scripts to replace linux/libc magic numbers with readable names for aarch64, amd64/i386, arm/thumb, hppa, m68k, mips, ppc, ppc64, sh, sh4, sparc and sparc64.

    Poništi
  9. proslijedio/la je Tweet
    21. pro 2019.

    Pwning VMWare, Part 1: RWCTF 2018 Station-Escape

    Poništi
  10. proslijedio/la je Tweet
    25. pro 2019.

    RCE via PHP complex (curly) syntax

    Poništi
  11. proslijedio/la je Tweet
    19. stu 2019.

    Watch out for typos in your switch/case blocks, this actually compiles (lol). In this case it lets you overflow a kernel buffer with arbitrary data. From Dragon CTF 2019.

    Poništi
  12. proslijedio/la je Tweet
    15. pro 2019.

    the FORBIDDEN ctf tactics the pros DONT want you to know!

    Prikaži ovu nit
    Poništi
  13. 6. pro 2019.
    Poništi
  14. proslijedio/la je Tweet

    Woah, the scammer blocked me. All I did was ask how the weather is 😭

    Poništi
  15. proslijedio/la je Tweet
    3. pro 2019.

    This fashion store in Beijing is using a "SIGSEGV Segmentation fault" as backdrop! Picture taken by a team member currently traveling to China for the Real World CTF

    SIGSEGV segmentation fault in fashion store
    Poništi
  16. proslijedio/la je Tweet
    20. lis 2019.
    Poništi
  17. proslijedio/la je Tweet

    The code scrolling on deadmau5's cube v3 is from a Windows keylogger 😆

    Poništi
  18. proslijedio/la je Tweet
    12. lip 2019.

    On I made a little challenge dubbed 0pack, now the code is open source, redesigned as general purpose tool: HTML slides can be found here:

    Poništi
  19. proslijedio/la je Tweet
    3. lip 2019.

    LOL it turned out that Google's CTF team won Facebook's CTF (by solving ALL the challenges btw)!! And now they are trolling the scoreboard by redirecting users to their Google CTF website... (We finished 5th btw by solving 27/33 challenges.)

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·