thenopcode's profile picture. professional binary breaker | Red Teamer @ MTD | BSODs are my daily routine

nop

@thenopcode

professional binary breaker | Red Teamer @ MTD | BSODs are my daily routine

Pinned

Around one month ago I started my OSED journey. If you want to get into binexp as well, feel free to check out my OSED GitHub repository containing lots of resources & practice binaries: github.com/nop-tech/OSED/


nop reposted

„Generative AI in the Crosshairs - Angriffe auf KI & LLMs“ - @thenopcode hat einen interessanten Talk im Rahmen der heutigen #AlmatoDevCon gehalten! 😎

MantodeaSec's tweet image. „Generative AI in the Crosshairs - Angriffe auf KI & LLMs“ - @thenopcode hat einen interessanten Talk im Rahmen der heutigen #AlmatoDevCon gehalten! 😎

Back to reality after another amazing edition of @offensive_con Thank you to everyone that made this conference and the parties as great as usual and see you again next time!

thenopcode's tweet image. Back to reality after another amazing edition of @offensive_con 

Thank you to everyone that made this conference and the parties as great as usual and see you again next time!

On my way to @offensive_con 🔥

thenopcode's tweet image. On my way to @offensive_con 🔥

nop reposted

#SAFACon2025 is over. This edition was even more special than we could’ve imagined. Thank you all for coming, your wonderful energy and smiles are truly unforgettable. Already missing more time together 🤗 @SAFATeamGmbH

justandrijana's tweet image. #SAFACon2025 is over. This edition was even more special than we could’ve imagined. Thank you all for coming, your wonderful energy and smiles are truly unforgettable. Already missing more time together 🤗 @SAFATeamGmbH
justandrijana's tweet image. #SAFACon2025 is over. This edition was even more special than we could’ve imagined. Thank you all for coming, your wonderful energy and smiles are truly unforgettable. Already missing more time together 🤗 @SAFATeamGmbH
justandrijana's tweet image. #SAFACon2025 is over. This edition was even more special than we could’ve imagined. Thank you all for coming, your wonderful energy and smiles are truly unforgettable. Already missing more time together 🤗 @SAFATeamGmbH

This concludes my first #0x41con and #SAFAcon Thank you very much @xerub & @justandrijana for those outstanding conferences and great talks! And also a big thank you to all the people who made the events so incredible 😄

thenopcode's tweet image. This concludes my first #0x41con and #SAFAcon

Thank you very much @xerub & @justandrijana for those outstanding conferences and great talks! 

And also a big thank you to all the people who made the events so incredible 😄

nop reposted

Epic venue designed only for you! @0x41con @SAFATeamGmbH #SafaCon2025

justandrijana's tweet image. Epic venue designed only for you! @0x41con @SAFATeamGmbH #SafaCon2025

This will make a fine addition to my collection #flareon11

thenopcode's tweet image. This will make a fine addition to my collection

#flareon11

nop reposted

#Offensivecon25 Let’s go!

offensive_con's tweet image. #Offensivecon25 Let’s go!

nop reposted

/me sighs I said we were declining more giveaways, but I've made an exception and I've accepted 1 more. After this addition, NO MORE GIVEAWAYS will be accepted. Okay? New giveaway added to queue (this isn't the official giveaway yet, please don't spam the comment section) Our…


nop reposted

Releasing full 2+hr video of my browser exploitation workshop from VXCON 2024: youtube.com/live/b9OhamkAY… In which I show what goes inside the mind of a skilled hacker while exploiting a highly non-trivial vulnerability in v8, from zero to exploit concept. Especially this workflow…

alisaesage's tweet card. VXCON 2024 Workshop | Alisa Esage - Browser Exploitation Workshop

youtube.com

YouTube

VXCON 2024 Workshop | Alisa Esage - Browser Exploitation Workshop


nop reposted

🚀 The Flare-On Challenge is officially wrapped up! This year, we had 5,324 participants, but only 275 made it to the finish line! Check out our blog post for the solutions, winner stats, and a shoutout to our challenge authors! bit.ly/4fvzfh8

Mandiant's tweet image. 🚀 The Flare-On Challenge is officially wrapped up! This year, we had 5,324 participants, but only 275 made it to the finish line! 

Check out our blog post for the solutions, winner stats, and a shoutout to our challenge authors! bit.ly/4fvzfh8

Also, I am finally free #flareon11

thenopcode's tweet image. Also, I am finally free #flareon11

Today I learned there's a Yahoo Finance article talking about me: finance.yahoo.com/news/guided-ha…


Join me and @Steph3nSims for the next Off By One Security stream!

Join me this Friday (4-Oct) at 11AM PT for the next Off By One Security stream with guest @thenopcode for a stream on the impact the Control Flow Guard (CFG) mitigation has on Windows Exploits! youtube.com/watch?v=A-vtsq… discord.gg/offbyonesecuri… @offby1security

Steph3nSims's tweet image. Join me this Friday (4-Oct) at 11AM PT for the next Off By One Security stream with guest @thenopcode for a stream on the impact the Control Flow Guard (CFG) mitigation has on Windows Exploits!

youtube.com/watch?v=A-vtsq…

discord.gg/offbyonesecuri…
@offby1security


nop reposted

Upcoming Off By One Security Streams! More details coming soon. Tomorrow, I'm doing a private stream for YouTube members on Software Cracking via Discord. @offby1security discord.gg/offbyonesecuri… youtube.com/@OffByOneSecur…

Steph3nSims's tweet image. Upcoming Off By One Security Streams! More details coming soon. Tomorrow, I'm doing a private stream for YouTube members on Software Cracking via Discord.

@offby1security 
discord.gg/offbyonesecuri…
youtube.com/@OffByOneSecur…

nop reposted

Created a blog post explaining physical memory primitives, how they can be exploited and how we can abuse the address translation mechanism to access any memory on a system as well as inject code into any process. 0dr3f.github.io/Demystifying_P…

0dr3f.github.io

Demystifying Physical Memory Primitive Exploitation on Windows

In this blog post, we dive in the world of physical memory primitives and how the right primitives can be abused to access process memory as well as inject code, all without opening handles.


nop reposted

#flareon11 game board is now open for early registration. Go claim your username. See you in two days! flare-on11.ctfd.io


nop reposted

#flareon11 is starting soon, get your tools ready! And by tools of course I mean get your own randomized FLARE bingo card webapp you can fill in as you go bashing your head against the wall solving all the challenges. 👉 washi.dev/bingo.html

washi_dev's tweet image. #flareon11 is starting soon, get your tools ready!

And by tools of course I mean get your own randomized FLARE bingo card webapp you can fill in as you go bashing your head against the wall solving all the challenges.

👉 washi.dev/bingo.html

nop reposted

We are at #BruCON0x10! Poke us if you see us. 😎 #Brucon #HackingForBeer

MantodeaSec's tweet image. We are at #BruCON0x10! Poke us if you see us. 😎
#Brucon #HackingForBeer

Loading...

Something went wrong.


Something went wrong.