Sabitlenmiş Tweet
0xTen
308 posts

0xTen
@_0xTen
android kernel VR @vigilant_labs / ctfs @cor_ctf and @eltctfbr / prev @osec_io
Lavender Town Katılım Ağustos 2020
845 Takip Edilen1.6K Takipçiler

@_0xTen I mean fwiw ai being good at security is very real.
This specific instance is so obnoxiously misleading that it's upsetting to see
English

Six "Elite Hacking Competitions" where there are writeups for most of the challenges online 🙃
Forbes@Forbes
The Tenzai cofounders have created an AI hacking agent using OpenAI and Anthropic tools. They say AI has become so adept at hacking it might need regulatory controls, urgently. forbes.com/sites/thomasbr…
English
0xTen retweetledi

@alkalinesec @h0mbre_ The way I look at it is:
1. Short term: as a VR expert you can understand model capabilities better than the labs themselves with a 'reasonable' spend. That's fun.
2. Medium term: you *will* have an edge vs teams spending huge amounts. You just need to find it. That's also fun.
English

@LiveOverflow @_manfp @_mixy1 I don’t think every CTF chall rn is getting one shot by AI, but now there is no middle class. 90% of the challenges became irrelevant and the other 10% are the hard ones, so the progression is not as nice for learning as it was when I started playing 6 years ago.
English

@LiveOverflow @_manfp @_mixy1 Uhm for over half of dicectf I prompted “solve this CTF challenge” and it one-shot it so I’m not sure it prepares you for anything.
My point is that research is merely amplified by AI. If your research quality is equal to model quality then you are at the new 0 …
English

@LiveOverflow @_manfp @_mixy1 In that sense, the current CTF meta does not prepare you to the real world because agents are one shotting over half of the challenges and if you want to win you can waste time even looking at them
English

@LiveOverflow @_manfp @_mixy1 It might be tempting to assume the AI is the new meta for research when in reality AI is not that hard to harness and scale, but still rely on expert guidance if you want to generate more impact than others and maintain your delta/high ground …
English

i have it on good authority that higher MTE levels scale like the super saiyan power levels
your exploits are NOT ready for MTE4
Blacktop@blacktop__
usr/include/arm/cpu_capabilities_public.h 👀
English
0xTen retweetledi
0xTen retweetledi

Our @hexacon_fr talk is out on Youtube now😎
youtu.be/C-52Gwmce3w
Follow the slides at: storage.googleapis.com/static.cor.tea…

YouTube
English
0xTen retweetledi
0xTen retweetledi
0xTen retweetledi

We at CoR (+ @u1f383) had a great experience at @hexacon_fr this weekend
Met many skilled VR people, the venue was amazing, and the speaker gifts were simply🔥
Best offensive security conference we have seen so far - thanks again to the organizers for the opportunity!

English

@alisaesage v8ctf if it’s a v8 bug and the bug is alive in whatever version is live currently github.com/google/securit…
If it’s chrome and not v8 then I’m almost certain there is no ctf vrp currently
English
0xTen retweetledi
0xTen retweetledi

Say hello to Eternal Tux🐧, a 0-click RCE exploit against the Linux kernel from KSMBD N-Days (CVE-2023-52440 & CVE-2023-4130)
willsroot.io/2025/09/ksmbd-…
Cheers to @u1f383 for finding these CVEs + the OffensiveCon talk from gteissier & @laomaiweng for inspiration!
English










