5BC (@5bcctf) 's Twitter Profile
5BC

@5bcctf

ID: 1056977842385358848

calendar_today29-10-2018 18:35:30

22 Tweet

150 Followers

4 Following

Eat Sleep Pwn Repeat (@eatsleeppwnrpt) 's Twitter Profile Photo

35C3 CTF registration is now up at 35c3ctf.ccc.ac. There will be a junior version again this year at junior.35c3ctf.ccc.ac Join us in IRC! And make sure to register an assembly in our cluster if you plan to play on site.

stephen (@_tsuro) 's Twitter Profile Photo

The #35c3ctf started and I some challenges: krautflare: write an exploit for bugs.chromium.org/p/project-zero… namespaces: a linux user namespaces sandbox filemanager: a web challenge logrotate: exploit my logrotate(8) config to get a root shell And if you're at #35c3 come and say hi!

PlaidCTF (@plaidctf) 's Twitter Profile Photo

With just over a day left until Plaid starts, we've opened up registration on play.plaidctf.com! Registration will also be open throughout the competition, for those teams that need it.

PlaidCTF (@plaidctf) 's Twitter Profile Photo

That brings PlaidCTF2019 to an end! Congratulations to the winners (and all participants) of the 9th PlaidCTF: 217, TeaDeliverers, and seoulplusbadass

Ace Pace (@ace__pace) 's Twitter Profile Photo

Wrote up the Everland challenge I worked on during the PlaidCTF acepace.net/reverse-engine… Playing misc/re is always more fun, constantly learning new languages, technologies or techniques Props to Eyal Itkin and others in the 5BC team

Google VRP (Google Bug Hunters) (@googlevrp) 's Twitter Profile Photo

Ready for Google CTF 2019? Join us June 22/23 for 48 hours of 3p1c 1337 h4x1ng! security.googleblog.com/2019/05/google… youtube.com/watch?v=QzFuwl…

Google VRP (Google Bug Hunters) (@googlevrp) 's Twitter Profile Photo

Grab snacks and energy drinks, the #GoogleCTF is approaching fast! Team registration and Beginner's Quest will open tomorrow Friday 21 June 12:00 GMT at g.co/ctf. We will start releasing the main CTF challenges on Sat 22 June 00:01 GMT. Have fun!

Gynvael Coldwind (@gynvael.bsky.social) (@gynvael) 's Twitter Profile Photo

<Yves Hauser> congrats to Drunk Sector for finding out about their team name only 40 hours into the competition! I don't even 🤣🤣🤣 #TrolledAtCCCCTF #IDontEven #Potatos

&lt;<a href="/yyyyyyy/">Yves Hauser</a>&gt; congrats to Drunk Sector for finding out about their team name only 40 hours into the competition!

I don't even 🤣🤣🤣

#TrolledAtCCCCTF #IDontEven #Potatos
Yannayl (@yannayli) 's Twitter Profile Photo

Played #36c3 CTF with 5BC . It was awesome and so diverse. With my teammates, I wrote heap exploit for AVR, ropchain for arm and shellcode for x86. Thanks hxp !

5BC (@5bcctf) 's Twitter Profile Photo

Thanks hxp for hosting #36c3 CTF (for the first time!), the challenges were definitely a good exercise for our pwn (and zahjebischte) skills, see you next year. 😁

Dragon Sector (@dragonsectorctf) 's Twitter Profile Photo

2019 was a great year for Dragon Sector! 🏆1st place at CTFTime.org global ranking for the 2nd year in a row & 3rd time in the history of our team 🥇1st place at 2 CTFs 🥈2nd place at 5 CTFs 🥉3rd place at 5 CTFs 💻And also organized a well received Dragon CTF 2019!

2019 was a great year for Dragon Sector!
🏆1st place at CTFTime.org global ranking for the 2nd year in a row &amp; 3rd time in the history of our team
🥇1st place at 2 CTFs
🥈2nd place at 5 CTFs
🥉3rd place at 5 CTFs
💻And also organized a well received Dragon CTF 2019!
Liad (@liadmord) 's Twitter Profile Photo

A bit late to the party but our write to hxp Sicher² is up ctftime.org/writeup/17975 Thanks to Yoav Alon, the magician of flags. #36c3ctf #36c3 #ctf #hxp

Ace Pace (@ace__pace) 's Twitter Profile Photo

PlaidCTF included a regex parser in FAT32. I ended up solving it by ignoring the challenge idea acepace.net/ctf/misc/2020/… Thanks to 8051 enthusiast for creating regex2fat and helping me laugh a lot and thanks to 5BC for the fun!