splitline 👁️🐈‍⬛

338 posts

splitline 👁️🐈‍⬛ banner
splitline 👁️🐈‍⬛

splitline 👁️🐈‍⬛

@_splitline_

@D3VC0R3 / CTF with ${cYsTiCk} / 友民党 / Tai-gi, zh-TW, en-US, es-PY / 🐈‍⬛

Tsu-lô-Kuān, Tâi-uân 参加日 Temmuz 2019
592 フォロー中1.4K フォロワー
splitline 👁️🐈‍⬛ がリツイート
slonser
slonser@slonser_·
And this makes sense given how many CTFs are held per year. However, the ideal CTF challenge, in my opinion, should follow this formula: "The author conducted a mini-research project and instead of publishing it, turned it into a challenge."
English
3
15
125
12.9K
splitline 👁️🐈‍⬛ がリツイート
LiveOverflow 🔴
LiveOverflow 🔴@LiveOverflow·
What I’ve always found amazing about CTFs is that "flag is flag". Whether you found an unintentional solve or pwned the browser with n-day for a XSS challenge, it didn't matter. I totally get the frustration of AI, but there is no solution other than accepting the change.
siunam@siunam321

I started playing CTFs in 2022, and LLMs definitely changed the **competitive** CTF scene a lot, especially since mid-2025. I also started using LLMs in late 2025. Yes, those models did one-shot many challenges, but what's the fun of slopping them? I learned absolutely nothing 🥲

English
19
39
446
68K
splitline 👁️🐈‍⬛ がリツイート
dimden
dimden@dimden·
ZXX
74
798
7.4K
267.1K
splitline 👁️🐈‍⬛ がリツイート
Pumpkin 🎃
Pumpkin 🎃@u1f383·
A bit late, but I just published my blog post on bypassing Ubuntu’s sandbox! Hope you enjoy it! u1f383.github.io/linux/2025/06/…
English
5
110
389
39.5K
splitline 👁️🐈‍⬛ がリツイート
NiNi
NiNi@terrynini38514·
The blog post is the full version of my talk at 38c3. It's about some vulnerabilities we found in libarchive and some interesting behaviors of libarchive that you don't want to miss. My favorite part is it only took us 56 seconds to trigger a crash by AFL++.
DEVCORE@d3vc0r3

Our latest deep dive explores libarchive vulnerabilities under recent Windows 11 updates. 🔍🔓 Check out NiNi's (@terrynini38514) technical write-up for key insights and security implications. Read more here: devco.re/blog/2025/02/1… #VulnerabilityResearch #Cybersecurity

English
0
18
80
13.3K
splitline 👁️🐈‍⬛ がリツイート
Renwa
Renwa@RenwaX23·
@dicegangctf @strellic This is just a rumor to make themselves feel better, CTFers doesn't have life and probably all single
English
0
3
43
2K
splitline 👁️🐈‍⬛
splitline 👁️🐈‍⬛@_splitline_·
@TalBeerySec @orange_8361 @BlackHatEvents I read that before, it was quite interesting! You’re right. Unicode normalization has always been a security concern, but I wouldn’t call it the core issue here. For me the root cause is still “Best-fit”. Unicode normalization is more of a broad bug category, like “injection”
English
1
0
4
227
Orange Tsai  🍊
Orange Tsai 🍊@orange_8361·
Our talk at #BHEU is done! Hope you all enjoyed it. 😉 A detailed blog is on the way, but in the meantime, check out the pre-alpha website worst.fit for early access and the slides! Huge thanks to @BlackHatEvents and my awesome co-presenter @_splitline_! 🐈‍
English
15
223
783
169.9K
splitline 👁️🐈‍⬛
splitline 👁️🐈‍⬛@_splitline_·
Cool findings 🐈‍⬛
Orange Tsai 🍊@orange_8361

Remember CVE-2024-4577, the PHP-CGI RCE bypass? Actually, the Best-Fit 'feature' also impacts non-CJK codepages such as locales in the Americas, Western Europe, Oceania, and more! @_splitline_ and I will share these cool findings at @BlackHatEvents! 🔥 Let's make argument injection great again! 😉 #worstfit-unveiling-hidden-transformers-in-windows-ansi-42637" target="_blank" rel="nofollow noopener">blackhat.com/eu-24/briefing…

English
0
1
10
2.5K
splitline 👁️🐈‍⬛ がリツイート
Angelboy
Angelboy@scwuaptx·
Excited to share our research on Kernel Streaming! We discovered several vulnerabilities in it that we used at Pwn2Own this year. Check it out: devco.re/blog/2024/08/2…
English
5
125
325
45.1K
splitline 👁️🐈‍⬛ がリツイート
Orange Tsai  🍊
Orange Tsai 🍊@orange_8361·
PHP just fixed one of my RCE vulnerabilities, which affects XAMPP by default. Check to see if you are affected and update now! 🔥 blog.orange.tw/2024/06/cve-20…
English
12
341
1.2K
134.8K