ctx

662 posts

ctx banner
ctx

ctx

@_fxstack

ctfプレイヤー @CTFtime 🇯🇵 team | (wanna-be)zeroday security researcher | (wanna-be) security engineer

Inscrit le Eylül 2020
2.4K Abonnements208 Abonnés
Tweet épinglé
ctx
ctx@_fxstack·
@albinowax Had any interesting ideas for security research ??? currently going after ai models , looking for any ideas under client or server side :)
English
2
1
5
3K
ctx retweeté
OtterSec
OtterSec@osec_io·
We recently achieved renderer RCE and universal XSS on Samsung's default browser. Here's how we abused an out-of-date V8 to construct the exploit chain.
OtterSec tweet media
English
2
18
119
8K
ctx retweeté
POC_Crew
POC_Crew@POC_Crew·
🎃Chih-Yen Chang(@u1f383) - Modern Android Kernel Exploitation Through a Mali Driver Vulnerability
POC_Crew tweet media
English
0
19
136
6.3K
ctx retweeté
CODEGATE
CODEGATE@CODEGATE_KR·
CODEGATE 2026 CTF Qualifiers - Results are out! Congratulations🙌 to all teams who qualified for the Finals. See you in Seoul 🇰🇷 Details🔜 We’ll reach out to qualified teams. #CODEGATE #CTF
CODEGATE tweet media
English
0
6
28
1.7K
ctx retweeté
Chaofan Shou
Chaofan Shou@Fried_rice·
@HaifeiLi 3x @heapracer vulns in this release are found using Minimax M2.7+Agentflow and actually we also found those 6 WebMIDI/Audio Codecs/WebGL/WebGPU vulns in this release as well but dup.
English
4
8
120
8.8K
ctx retweeté
ippsec
ippsec@ippsec·
Warning - This is more political/philosophical/etc. than my normal postings, if that upsets you ignore my story and just go watch this talk from Nicholas Carlini, about his thoughts on AI and Cyber Security: youtube.com/watch?v=1sd26p…. (1/3)
YouTube video
YouTube
English
8
39
330
56.2K
ctx retweeté
Kalmarunionen
Kalmarunionen@kalmarunionenDM·
One of the challenges for #KalmarCTF this year includes some open source tooling we ran into on @_JohnHammond's GitHub. We still have many unsolved challenges left, and there's more than 24 hours left before the end of the CTF - so come play with us by going to kalmarc.tf, and try to make your presence on the scoreboard known!
Kalmarunionen tweet media
English
0
5
28
6.2K
HackerOnTwoWheels
HackerOnTwoWheels@HackerOn2Wheels·
I have a 2 high severity report just sitting as sent for 5 days now without getting picked up in Hackerone. Is this a normal thing now?
English
12
0
36
3.6K
ctx
ctx@_fxstack·
@satoki00 Welcome to the club buddy :)
English
0
0
1
162
ctx retweeté
Kalmarunionen
Kalmarunionen@kalmarunionenDM·
KalmarCTF 2026 has finished! Congratulations to the winning teams! 🥇- sarrus 🥈- @malta_ctf 🥉- rasmusfaber And also to the top teams on the human scoreboard! 🥇- @mhackeroni 🥈- @FlatNetworkOrg 🥉- @l3akctf Another huge thanks to our sponsors @HexRaysSA and @zellic_io! Thanks to everyone for playing, we hope you had fun - see you all again next year!
Kalmarunionen tweet media
English
2
4
36
4.2K
ctx retweeté
Zellic
Zellic@zellic_io·
How to find a $65,000 zero-day in Chrome V8: Meet @eternalsakura13, researcher at Zellic. - Top 3 Chrome VRP 2022–2024 - Top 2 Facebook whitehat in 2023 - Top 10 MSRC MVR in 2025 Here’s a walk through the mind of one of the world’s best Chrome researchers. Can you follow along?
Zellic tweet media
English
4
57
511
46.7K
ctx retweeté
Zellic
Zellic@zellic_io·
For a deeper look into this zero-day vulnerability, including the full root-cause analysis, proof of concept, exploitation, and patch analysis, check out our newly published blog post: zellic.io/blog/pwning-v8…
English
0
59
209
10.2K
ctx retweeté
N$
N$@nav1n0x·
In the era of AI-driven pentesting, I reported two SQLis I discovered through full manual recon. Both were time-based blind SQL injections, identified by injecting payloads into the X-Forwarded-For header. #BugBounty #SQLi
N$ tweet media
English
15
15
470
12.7K
ctx
ctx@_fxstack·
@zonduu1 Looks like hacking , or term called bug hunting should be refactored to new vector or novel class where i feel something new must emerge where hackers on upper hand something mostly like a innovative kind of !!!
English
0
0
1
561
zonduu
zonduu@zonduu1·
I got 30+ reports triaged and noticed 2 duplicates submitted just a few hours after my first batch. Most likely someone from the program or triage side saw the report and started mass scanning/reporting the same issue. Pretty wild how fast that happened. P.S: that really shouldn’t be happening
zonduu@zonduu1

There goes the first one 🥳

English
5
3
89
7.8K
ctx retweeté
JNS
JNS@_devJNS·
bro's gonna have 17 years of experience at 21.
JNS tweet media
English
24
153
3.9K
33.5K
Steve
Steve@Anebriate·
@FelixCLC_ To truly love the computer, you must first hate the computer
English
1
11
284
5.9K
@fclc
@fclc@FelixCLC_·
too many people who don't love The Computer have been given the privilege of working on The Computer
English
50
1.4K
14.9K
195K