azox

485 posts

azox banner
azox

azox

@_Az0x_

가입일 Ocak 2012
561 팔로잉256 팔로워
azox 리트윗함
ph0wn
ph0wn@ph0wn·
Prizes for Ph0wn CTF, sponsored by @hardwear_io Huge thanks for supporting us each year, since 2017! We also have another prize sponsor, but for secrecy, we can't reveal their name and prize before the CTF ;-) Register on ph0wn.org - we're waiting for you!
ph0wn tweet media
English
0
3
1
382
azox 리트윗함
hydrabus.com
hydrabus.com@hydrabus·
HydraFW v0.12 Released ! New features: - SPI 3-wire (BIDIR) mode support - Read with timeout for all protocols - Timed read for smartcards - CI/CD with GitHub Actions Thanks to all contributors ! github.com/hydrabus/hydra…
English
0
5
12
3.4K
azox 리트윗함
PraSec
PraSec@PraSec_conf·
We have sent out all invites for this year. Make sure to check your inbox, as well as your spam folder :) some "+1" are still to be contacted.
English
1
2
5
333
azox 리트윗함
hydrasdr.com
hydrasdr.com@hydrasdr·
🚀 THE COUNTDOWN IS OVER! 🚀 hydrasdr.com is NOW LIVE with MAJOR open-source release ! ✅Complete host tools / API and firmware ✅SDR++ / SatDump (until official support is available) ✅SoapyHydraSDR, GNU Radio (gr-osmosdr) ✅urh, luaradio support ✅Full software ecosystem coverage 📂GitHub: github.com/hydrasdr 🛒Buy HydraSDR RFOne @digikey: digikey.com/en/products/de… Professional SDR meets open source ! 🇺🇸🇫🇷 #HydraSDR #SDR #OpenSource #SDRPlusPlus #GNURadio #SatDump
English
8
17
32
9.7K
azox 리트윗함
Zellic
Zellic@zellic_io·
For a deeper dive into BLS signatures, building aggregation, and multi-signatures, check out our recently published blog post below: zellic.io/blog/bls-signa…
English
1
4
20
1.5K
azox 리트윗함
hydrasdr.com
hydrasdr.com@hydrasdr·
The SDR community is about to get a new tool. Professional specs. Accessible pricing. Open source code. All details in less than 20 days. Follow the countdown: hydrasdr.com Stay Tuned
English
0
5
20
4.8K
azox 리트윗함
pilvar (Philippe Dourassov)
pilvar (Philippe Dourassov)@pilvar222·
My friend @manaaaaaaaf and I have created an AI hacker! 👨‍💻 It can find 0-days in web applications with 0% false positives, and it also works on CTF challenges! What you see ⬇️ is @haicker_app solving a web challenge from UMassCTF 2025 (only 45/557 teams were able to solve it!)
English
13
41
372
36K
azox 리트윗함
fjullien
fjullien@fjullien06·
I've been diving into electromagnetic (EM) side-channel attacks with Correlation Power Analysis (CPA) these past few weeks and just published a blog article about my journey: collshade.fr/articles/cpa/c…
English
0
6
20
1.6K
fjullien
fjullien@fjullien06·
@0x01K @Baldanos It's a uC and I'm using an EM probe. My traces were very unaligned. I just controlled the traces on a part where it looked fine.
English
1
0
1
84
fjullien
fjullien@fjullien06·
Hello AES!
fjullien tweet media
Español
2
0
15
600
Pico le Croco
Pico le Croco@picolecroco·
Oh la qu'est ce qu'on me fait là ? Maltraitance de crocodile ? #Ph0wn24
Pico le Croco tweet media
Français
1
2
3
269
azox
azox@_Az0x_·
🔥Back from #r2con2024 🔥 Shoutout to the organizers and @trufae for this wonderful event and for the goodies ! Also a special thanks to @travisgoodspeed for the workshop and the book ! It was a lot of fun !
azox tweet media
English
0
3
18
1.6K
azox 리트윗함
radare
radare@radareorg·
Decompiling with #decai provides a really nice output, as you can see in the example below. But even with more complex binaries the results are surprising. #r2con2024
radare tweet mediaradare tweet media
English
0
4
16
1.2K
azox 리트윗함
Solar Designer
Solar Designer@solardiz·
Until October 30, Okta generated "the cache key" by using bcrypt to "hash a combined string of userId + username + password", which allowed full password auth bypass for usernames of 52+ bytes and apparently required only partial knowledge of the password for other long usernames
Kinnaird McQuade 💻☁️💥@kmcquade3

Okta allowing login bypass for any usernames with 52+ characters is insane Official Security Advisory: trust.okta.com/security-advis…

English
1
6
19
3.5K