splitline ๐Ÿ‘๏ธ๐Ÿˆโ€โฌ›

338 posts

splitline ๐Ÿ‘๏ธ๐Ÿˆโ€โฌ› banner
splitline ๐Ÿ‘๏ธ๐Ÿˆโ€โฌ›

splitline ๐Ÿ‘๏ธ๐Ÿˆโ€โฌ›

@_splitline_

@D3VC0R3 / CTF with ${cYsTiCk} / ๅ‹ๆฐ‘ๅ…š / Tai-gi, zh-TW, en-US, es-PY / ๐Ÿˆโ€โฌ›

Tsu-lรด-Kuฤn, Tรขi-uรขn Bergabung Temmuz 2019
592 Mengikuti1.4K Pengikut
splitline ๐Ÿ‘๏ธ๐Ÿˆโ€โฌ› me-retweet
slonser
slonser@slonser_ยท
And this makes sense given how many CTFs are held per year. However, the ideal CTF challenge, in my opinion, should follow this formula: "The author conducted a mini-research project and instead of publishing it, turned it into a challenge."
English
3
15
125
12.9K
splitline ๐Ÿ‘๏ธ๐Ÿˆโ€โฌ› me-retweet
LiveOverflow ๐Ÿ”ด
LiveOverflow ๐Ÿ”ด@LiveOverflowยท
What Iโ€™ve always found amazing about CTFs is that "flag is flag". Whether you found an unintentional solve or pwned the browser with n-day for a XSS challenge, it didn't matter. I totally get the frustration of AI, but there is no solution other than accepting the change.
siunam@siunam321

I started playing CTFs in 2022, and LLMs definitely changed the **competitive** CTF scene a lot, especially since mid-2025. I also started using LLMs in late 2025. Yes, those models did one-shot many challenges, but what's the fun of slopping them? I learned absolutely nothing ๐Ÿฅฒ

English
19
39
446
68K
splitline ๐Ÿ‘๏ธ๐Ÿˆโ€โฌ› me-retweet
dimden
dimden@dimdenยท
ZXX
74
798
7.4K
267.1K
splitline ๐Ÿ‘๏ธ๐Ÿˆโ€โฌ› me-retweet
NiNi
NiNi@terrynini38514ยท
The blog post is the full version of my talk at 38c3. It's about some vulnerabilities we found in libarchive and some interesting behaviors of libarchive that you don't want to miss. My favorite part is it only took us 56 seconds to trigger a crash by AFL++.
DEVCORE@d3vc0r3

Our latest deep dive explores libarchive vulnerabilities under recent Windows 11 updates. ๐Ÿ”๐Ÿ”“ Check out NiNi's (@terrynini38514) technical write-up for key insights and security implications. Read more here: devco.re/blog/2025/02/1โ€ฆ #VulnerabilityResearch #Cybersecurity

English
0
18
80
13.3K
splitline ๐Ÿ‘๏ธ๐Ÿˆโ€โฌ› me-retweet
Renwa
Renwa@RenwaX23ยท
@dicegangctf @strellic This is just a rumor to make themselves feel better, CTFers doesn't have life and probably all single
English
0
3
43
2K
Orange Tsai  ๐ŸŠ
Orange Tsai ๐ŸŠ@orange_8361ยท
Our talk at #BHEU is done! Hope you all enjoyed it. ๐Ÿ˜‰ A detailed blog is on the way, but in the meantime, check out the pre-alpha website worst.fit for early access and the slides! Huge thanks to @BlackHatEvents and my awesome co-presenter @_splitline_! ๐Ÿˆโ€
English
15
223
783
169.9K
splitline ๐Ÿ‘๏ธ๐Ÿˆโ€โฌ›
Cool findings ๐Ÿˆโ€โฌ›
Orange Tsai ๐ŸŠ@orange_8361

Remember CVE-2024-4577, the PHP-CGI RCE bypass? Actually, the Best-Fit 'feature' also impacts non-CJK codepages such as locales in the Americas, Western Europe, Oceania, and more! @_splitline_ and I will share these cool findings at @BlackHatEvents! ๐Ÿ”ฅ Let's make argument injection great again! ๐Ÿ˜‰ #worstfit-unveiling-hidden-transformers-in-windows-ansi-42637" target="_blank" rel="nofollow noopener">blackhat.com/eu-24/briefingโ€ฆ

English
0
1
10
2.5K
splitline ๐Ÿ‘๏ธ๐Ÿˆโ€โฌ› me-retweet
Angelboy
Angelboy@scwuaptxยท
Excited to share our research on Kernel Streaming! We discovered several vulnerabilities in it that we used at Pwn2Own this year. Check it out: devco.re/blog/2024/08/2โ€ฆ
English
5
125
325
45.1K
splitline ๐Ÿ‘๏ธ๐Ÿˆโ€โฌ› me-retweet
Orange Tsai  ๐ŸŠ
Orange Tsai ๐ŸŠ@orange_8361ยท
PHP just fixed one of my RCE vulnerabilities, which affects XAMPP by default. Check to see if you are affected and update now! ๐Ÿ”ฅ blog.orange.tw/2024/06/cve-20โ€ฆ
English
12
341
1.2K
134.8K