splitline ๐Ÿ‘๏ธ๐Ÿˆโ€โฌ›

338 posts

splitline ๐Ÿ‘๏ธ๐Ÿˆโ€โฌ› banner
splitline ๐Ÿ‘๏ธ๐Ÿˆโ€โฌ›

splitline ๐Ÿ‘๏ธ๐Ÿˆโ€โฌ›

@_splitline_

@D3VC0R3 / CTF with ${cYsTiCk} / ๅ‹ๆฐ‘ๅ…š / Tai-gi, zh-TW, en-US, es-PY / ๐Ÿˆโ€โฌ›

Tsu-lรด-Kuฤn, Tรขi-uรขn ๊ฐ€์ž…์ผ Temmuz 2019
592 ํŒ”๋กœ์ž‰1.4K ํŒ”๋กœ์›Œ
splitline ๐Ÿ‘๏ธ๐Ÿˆโ€โฌ› ๋ฆฌํŠธ์œ—ํ•จ
slonser
slonser@slonser_ยท
And this makes sense given how many CTFs are held per year. However, the ideal CTF challenge, in my opinion, should follow this formula: "The author conducted a mini-research project and instead of publishing it, turned it into a challenge."
English
3
15
125
12.9K
splitline ๐Ÿ‘๏ธ๐Ÿˆโ€โฌ› ๋ฆฌํŠธ์œ—ํ•จ
LiveOverflow ๐Ÿ”ด
LiveOverflow ๐Ÿ”ด@LiveOverflowยท
What Iโ€™ve always found amazing about CTFs is that "flag is flag". Whether you found an unintentional solve or pwned the browser with n-day for a XSS challenge, it didn't matter. I totally get the frustration of AI, but there is no solution other than accepting the change.
siunam@siunam321

I started playing CTFs in 2022, and LLMs definitely changed the **competitive** CTF scene a lot, especially since mid-2025. I also started using LLMs in late 2025. Yes, those models did one-shot many challenges, but what's the fun of slopping them? I learned absolutely nothing ๐Ÿฅฒ

English
19
39
446
68K
splitline ๐Ÿ‘๏ธ๐Ÿˆโ€โฌ› ๋ฆฌํŠธ์œ—ํ•จ
dimden
dimden@dimdenยท
ZXX
74
798
7.4K
267.1K
splitline ๐Ÿ‘๏ธ๐Ÿˆโ€โฌ› ๋ฆฌํŠธ์œ—ํ•จ
Pumpkin ๐ŸŽƒ
Pumpkin ๐ŸŽƒ@u1f383ยท
A bit late, but I just published my blog post on bypassing Ubuntuโ€™s sandbox! Hope you enjoy it! u1f383.github.io/linux/2025/06/โ€ฆ
English
5
110
389
39.5K
splitline ๐Ÿ‘๏ธ๐Ÿˆโ€โฌ› ๋ฆฌํŠธ์œ—ํ•จ
NiNi
NiNi@terrynini38514ยท
The blog post is the full version of my talk at 38c3. It's about some vulnerabilities we found in libarchive and some interesting behaviors of libarchive that you don't want to miss. My favorite part is it only took us 56 seconds to trigger a crash by AFL++.
DEVCORE@d3vc0r3

Our latest deep dive explores libarchive vulnerabilities under recent Windows 11 updates. ๐Ÿ”๐Ÿ”“ Check out NiNi's (@terrynini38514) technical write-up for key insights and security implications. Read more here: devco.re/blog/2025/02/1โ€ฆ #VulnerabilityResearch #Cybersecurity

English
0
18
80
13.3K
splitline ๐Ÿ‘๏ธ๐Ÿˆโ€โฌ› ๋ฆฌํŠธ์œ—ํ•จ
Renwa
Renwa@RenwaX23ยท
@dicegangctf @strellic This is just a rumor to make themselves feel better, CTFers doesn't have life and probably all single
English
0
3
43
2K
splitline ๐Ÿ‘๏ธ๐Ÿˆโ€โฌ›
@TalBeerySec @orange_8361 @BlackHatEvents I read that before, it was quite interesting! Youโ€™re right. Unicode normalization has always been a security concern, but I wouldnโ€™t call it the core issue here. For me the root cause is still โ€œBest-fitโ€. Unicode normalization is more of a broad bug category, like โ€œinjectionโ€
English
1
0
4
227
Orange Tsai  ๐ŸŠ
Orange Tsai ๐ŸŠ@orange_8361ยท
Our talk at #BHEU is done! Hope you all enjoyed it. ๐Ÿ˜‰ A detailed blog is on the way, but in the meantime, check out the pre-alpha website worst.fit for early access and the slides! Huge thanks to @BlackHatEvents and my awesome co-presenter @_splitline_! ๐Ÿˆโ€
English
15
223
783
169.9K
splitline ๐Ÿ‘๏ธ๐Ÿˆโ€โฌ›
Cool findings ๐Ÿˆโ€โฌ›
Orange Tsai ๐ŸŠ@orange_8361

Remember CVE-2024-4577, the PHP-CGI RCE bypass? Actually, the Best-Fit 'feature' also impacts non-CJK codepages such as locales in the Americas, Western Europe, Oceania, and more! @_splitline_ and I will share these cool findings at @BlackHatEvents! ๐Ÿ”ฅ Let's make argument injection great again! ๐Ÿ˜‰ #worstfit-unveiling-hidden-transformers-in-windows-ansi-42637" target="_blank" rel="nofollow noopener">blackhat.com/eu-24/briefingโ€ฆ

English
0
1
10
2.5K
splitline ๐Ÿ‘๏ธ๐Ÿˆโ€โฌ› ๋ฆฌํŠธ์œ—ํ•จ
Angelboy
Angelboy@scwuaptxยท
Excited to share our research on Kernel Streaming! We discovered several vulnerabilities in it that we used at Pwn2Own this year. Check it out: devco.re/blog/2024/08/2โ€ฆ
English
5
125
325
45.1K
splitline ๐Ÿ‘๏ธ๐Ÿˆโ€โฌ› ๋ฆฌํŠธ์œ—ํ•จ
Pumpkin ๐ŸŽƒ
Pumpkin ๐ŸŽƒ@u1f383ยท
I created a Linux Kernel challenge โ€œHalloweenโ€ for the HITCON CTF Qual 2024 :). Below are the official writeup for โ€œHalloweenโ€ and the unofficial writeups for "v8sbx" and "reEscape". Enjoy it! Halloween & v8sbx: u1f383.github.io/ctf/2024/07/16โ€ฆ reEscape: u1f383.github.io/ctf/2024/07/18โ€ฆ
English
1
39
147
13.9K
splitline ๐Ÿ‘๏ธ๐Ÿˆโ€โฌ› ๋ฆฌํŠธ์œ—ํ•จ
Orange Tsai  ๐ŸŠ
Orange Tsai ๐ŸŠ@orange_8361ยท
PHP just fixed one of my RCE vulnerabilities, which affects XAMPP by default. Check to see if you are affected and update now! ๐Ÿ”ฅ blog.orange.tw/2024/06/cve-20โ€ฆ
English
12
341
1.2K
134.8K