你可能會喜歡
So the challenge i wrote for @PotluckCTF introduced a new heap house (which I shamelessly dubbed "house of water" after my two teams), and a general technique I dubbed "safe link double protect". Both are now available here: github.com/shellphish/how… github.com/shellphish/how…
Made a fun little heap challenge for #37C3 @PotluckCTF called Tamagoyaki. It features a fun way to bypass protect_ptr without a leak I discovered while exploiting a bug. It only got one solve during the CTF, so made a writeup: github.com/UDPctf/CTF-cha…
It's so over
First mention of x86 memory tagging (aka MTE) by both Intel and AMD (codename ChkTag): community.intel.com/t5/Blogs/Tech-… amd.com/en/blogs/2025/… 🤘🤘🤘
Check out our newest blog about how we took advantage of a WebGPU feature to turn an integer underflow bug into an arbitrary read in Chrome’s WebGPU. This bug was fixed by Google long ago, but our ticket is still restricted. qriousec.github.io/post/oob-angle/ by @lanleft_ + @__suto
so excited to finally share something I’ve been working on alongside many brilliant colleagues. MTE will truly raise the bar for memory safety. security.apple.com/blog/memory-in…

🥈 Thrilled to nab 2nd as Blue Water, teamed up with @perfect_blue at DEFCON CTF Final 33! 🙌 Congrats to @mmm_ctf_team for their 4th straight 1st 💪 We’re gunning for the crown next year! Join our crew to make it happen! DM us or drop us an email! 🚀 #DEFCON #CTF
Getting 2nd place in Defcon finals for the third year in a row has triggered the great depression for the team xd
Mini Writeup of CVE-2025-6554. POC by @DarkNavyOrg. All errors in writeup my own. gist.github.com/mistymntncop/3…
Finding exploitable browser bugs during exam season sucks. Makes it very difficult to focus on studying when constantly thinking of the bug 🫠
🚨🚨🚨We just broke everyone’s favorite CTF PoW🚨🚨🚨 Our teammate managed to achieve a 20x SPEEDUP on kctf pow through AVX512 on Zen 5. Full details here: anemato.de/blog/kctf-vdf The Sloth VDF is dead😵 This is why kernelCTF no longer has PoW!
anemato.de
Beating the kCTF PoW with AVX512IFMA for $51k
PoW is gone 🦀🦀
My writeup for CVE-2024-7971. Just a POC. Let me know if u have any questions. github.com/mistymntncop/C…
Another year and we're still looking for exceptional talent that are looking to join an amazing research team and contribute to the story we're writing @dfsec_com, if you're interested or just curious about it, I'll be @offensive_con and available to chat :)
V8 is leaving the Sea-of-Nodes Turbofan compiler for the shores of CFG, read all about it in my colleague's blog post: v8.dev/blog/leaving-t…
Our latest blog post: Tracing Back to the Source | #SPTM Round 3 #TXM #iOS #macOS #DFF df-f.com/blog/sptm3
Compromised renderer can control your mouse and escape sbx (reward: $50000) crbug.com/370856871
flare-on 11 write up is out on my company's blog: gmo-cybersecurity.com/blog/flare-on-…
5 hours left and ChitChat remains unsolved. Come solve an MTE heap chal! 🫡

Attention CTFers! Blue Water CTF is this weekend, hosted by perfect blue and Water Paddler. It will run for 36 hours, starting from 2:00 PM UTC on Saturday, October 12. We'll have plenty of challenges for pwn, web, reversing, and crypto! Registration: bw.ctf.ing
Attention CTFers! Blue Water CTF is this weekend, hosted by perfect blue and Water Paddler. It will run for 36 hours, starting from 2:00 PM UTC on Saturday, October 12. We'll have plenty of challenges for pwn, web, reversing, and crypto! Registration: bw.ctf.ing
United States 趨勢
- 1. George Santos 37.1K posts
- 2. Carson Beck 1,659 posts
- 3. Louisville 8,558 posts
- 4. #SmackDown 9,111 posts
- 5. Dan Wilson 1,579 posts
- 6. #askdave N/A
- 7. Canzone 2,846 posts
- 8. Jeff Brohm N/A
- 9. Toney 2,601 posts
- 10. Bryce Miller 1,792 posts
- 11. Tina Peters 5,782 posts
- 12. #DaytimeEmmys 1,893 posts
- 13. Chris Bell N/A
- 14. Alejandro Kirk N/A
- 15. Bryan Woo N/A
- 16. End 1Q N/A
- 17. Prince Andrew 49K posts
- 18. No Kings 311K posts
- 19. End of 1 13.7K posts
- 20. Robles 2,686 posts
你可能會喜歡
Something went wrong.
Something went wrong.