rayman (@0xrayman) 's Twitter Profile
rayman

@0xrayman

| hacker | CCC | CTF with ALLES!

ID: 1200418101508104195

linkhttps://troopers.de calendar_today29-11-2019 14:18:11

70 Tweet

48 Takipçi

123 Takip Edilen

PotluckCTF (@potluckctf) 's Twitter Profile Photo

We're ten days away from the #CTF party of the year. The event guest list has just been published which you can find at potluckctf.com. These mighty gangs of hackers are fighting for the glory and our cool prizes but you can also join for fun and to learn a thing or two

Synacktiv (@synacktiv) 's Twitter Profile Photo

Have you ever wondered what the attack surface of Counter Strike: Global Offensive looks like? Our ninjas myr and vic studied it and found a server to client bug! Read more details about this research in our latest blogpost. synacktiv.com/publications/e…

CSCG (@c_s_c_g) 's Twitter Profile Photo

Only four days left until the start of the #CSCG2024 on the 1st of March. In this year the competition will last for two months. #ctf #Hacking #cybersecurity Until then, make sure to check out our Discord server! discord.gg/T4sJ9E2JpX

Only four days left until the start of the #CSCG2024 on the 1st of March. In this year the competition will last for two months. #ctf #Hacking #cybersecurity

Until then, make sure to check out our Discord server!  discord.gg/T4sJ9E2JpX
TROOPERS Conference (@wearetroopers) 's Twitter Profile Photo

And we are live! Celebrating 15 years of TROOPERS at #TROOPERS24! Great feeling having you all here at #halle02. Kicking it off with Ange and his keynote. 🥳

And we are live! Celebrating 15 years of TROOPERS at #TROOPERS24! Great feeling having you all here at #halle02. Kicking it off with <a href="/angealbertini/">Ange</a> and his keynote. 🥳
Sonar Research (@sonar_research) 's Twitter Profile Photo

A recording of our TROOPERS Conference talk "From ASCII to UTF-16: Leveraging Encodings to Break Software" is now available! The talk covers basic knowledge of character encodings and explains various vulnerability types and exploitation techniques: youtube.com/watch?v=z-ug2d…

SteamDB (@steamdb) 's Twitter Profile Photo

Arch Linux (used for SteamOS) is entering into a direct collaboration with Valve. Valve is providing backing for a build service infrastructure and a secure signing enclave.

Arch Linux (used for SteamOS) is entering into a direct collaboration with Valve. Valve is providing backing for a build service infrastructure and a secure signing enclave.
Dennis (@ttdennis) 's Twitter Profile Photo

At #38c3 Frieder and I will be talking about Bluetooth Auracast security. Come talk to us if you're interested in Auracast or happen to have a device that already supports Auracast! events.ccc.de/congress/2024/…

Moritz Sanft (@stdoutput) 's Twitter Profile Photo

After quite some CTFs and challenges solved, this awesome challenge from hxp 38C3 CTF is the first one I ever did a writeup for. Check it out: msanft.foo/blog/hxp-38c3-… #38C3 #ctf #hxpctf

rayman (@0xrayman) 's Twitter Profile Photo

Hey wvu, Im reaching out because I have some questions about this attackerkb.com/topics/evqSrqr… post from 4 years ago. What is the best way to contact you?

CSCG (@c_s_c_g) 's Twitter Profile Photo

The Cyber Security Challenge Germany 2025 has started! 🎉 The competition runs from March 1 - 18:00 CET to May 1 - 18:00 CEST. We're excited to announce that we are inviting the top 6 DACH players in the EARTH category to the Deutsche Hacking Meisterschaft! Participate now at: play.cscg.live

Deutsche Hacking Meisterschaft (@dhm_ctf) 's Twitter Profile Photo

🚨The Deutsche Hacking-Meisterschaft kicks off soon! 🚨 72 participants, 1 day of team building, and 2 days of intense hacking. Big thanks to our amazing partners: Schwarz IT, BSI, Allianz Technology, cirosec GmbH, hextree.io, PIMPEX, netmountains, and Arkadia. Great hacking!✨

Dennis (@ttdennis) 's Twitter Profile Photo

Yesterday at #Troopers25, Frieder and I published some of our research on Bluetooth headphones and earbuds. We found that there is a large number of Airoha-based headphones that can be fully compromised via Bluetooth. insinuator.net/2025/06/airoha…