Ectario (@ectari0) 's Twitter Profile
Ectario

@ectari0

Cryptography & Web3 enjoyer:

๐Ÿ‡จ๐Ÿ‡ต CTF Player w/ @MadeinFranceCTF & @Phreaks2600 and Junior Security Researcher @FuzzingLabs

ID: 756980381069479940

linkhttp://github.com/ectario calendar_today23-07-2016 22:32:41

26 Tweet

60 Takipรงi

196 Takip Edilen

PHREAKS 2600 (@phreaks2600) 's Twitter Profile Photo

The wait is over! ๐Ÿ”ฅ PwnMe CTF 2025 qualifications start this Friday! ๐Ÿ“… February 28 โ€“ March 2 ๐Ÿ’ป No team size limit ๐Ÿงฉ Pwn, Web, Crypto, Reverse & Misc Top 16 teams qualify (8 Academic, 8 Professional) Finals on April 12 at ecole2600 ๐Ÿ‡ซ๐Ÿ‡ท Sign up now ๐Ÿ‘‰ pwnme.phreaks.fr

The wait is over! ๐Ÿ”ฅ
<a href="/pwnmectf/">PwnMe CTF 2025</a> qualifications start this Friday!

๐Ÿ“… February 28 โ€“ March 2
๐Ÿ’ป No team size limit
๐Ÿงฉ Pwn, Web, Crypto, Reverse &amp; Misc
Top 16 teams qualify (8 Academic, 8 Professional) 
Finals on April 12 at <a href="/ecole2600/">ecole2600</a> ๐Ÿ‡ซ๐Ÿ‡ท

Sign up now ๐Ÿ‘‰ pwnme.phreaks.fr
PwnMe CTF 2025 (@pwnmectf) 's Twitter Profile Photo

PwnMe CTF qualifications are now over! Congratulations to the winning teams: ๐Ÿฅ‡ RedRocket.Club ๐Ÿฅˆ Flat Network Society ๐Ÿฅ‰ Friendly Maltese Citizens The journey isnโ€™t over yet, see you in France for the finals! ๐Ÿ‡ซ๐Ÿ‡ท Thanks to everyone who participated!๐Ÿ’˜

PwnMe CTF qualifications are now over!

Congratulations to the winning teams:
๐Ÿฅ‡ <a href="/redrocket_ctf/">RedRocket.Club</a> 
๐Ÿฅˆ <a href="/FlatNetworkOrg/">Flat Network Society</a> 
๐Ÿฅ‰ <a href="/malta_ctf/">Friendly Maltese Citizens</a> 

The journey isnโ€™t over yet, see you in France for the finals! ๐Ÿ‡ซ๐Ÿ‡ท

Thanks to everyone who participated!๐Ÿ’˜
FuzzingLabs (@fuzzinglabs) 's Twitter Profile Photo

๐Ÿš€ New Writeup Alert! ๐Ÿš€ We tackled the Stargazer challenge from HTB University CTF 2024, diving deep into smart contract hacking & proxy vulnerabilities. ๐Ÿ› ๏ธ Hereโ€™s a breakdown of how we solved it! ๐Ÿงต๐Ÿ‘‡

๐Ÿš€ New Writeup Alert! ๐Ÿš€

We tackled the Stargazer challenge from HTB University CTF 2024, diving deep into smart contract hacking &amp; proxy vulnerabilities. ๐Ÿ› ๏ธ

Hereโ€™s a breakdown of how we solved it! ๐Ÿงต๐Ÿ‘‡
Insomni'hack (@1ns0mn1h4ck) 's Twitter Profile Photo

๐Ÿšจ๐Ÿ“ข Insomni'hack 2025 ๐Ÿ›ก๏ธ๐Ÿ’ป Approximately 600 participants engaged in the hacking competition, tackling 33 challenges. Congratulations also to the academic winners: ๐Ÿฅ‡Polyflag ๐ŸฅˆLosFuzzys ๐Ÿฅ‰PHREAKS 2600 ๐Ÿš€ See you next year for new adventures! #INSO25 #CTF

๐Ÿšจ๐Ÿ“ข Insomni'hack 2025  

๐Ÿ›ก๏ธ๐Ÿ’ป Approximately 600 participants engaged in the hacking competition, tackling 33 challenges.

Congratulations also to the academic winners: 
๐Ÿฅ‡Polyflag 
๐Ÿฅˆ<a href="/LosFuzzys/">LosFuzzys</a> 
๐Ÿฅ‰<a href="/phreaks2600/">PHREAKS 2600</a>  

๐Ÿš€ See you next year for new adventures!  

#INSO25 #CTF
PHREAKS 2600 (@phreaks2600) 's Twitter Profile Photo

This weekend, we competed in Insomni'hack CTF and finished ๐Ÿฅ‰top 3 academic and top 10 overall! It's our third year in a row in the top 3 academic, and the competition keeps getting better every time. Big thanks to the organizers for a well-run event!๐Ÿ”ฅ

This weekend, we competed in <a href="/1ns0mn1h4ck/">Insomni'hack</a> CTF and finished ๐Ÿฅ‰top 3 academic and top 10 overall!

It's our third year in a row in the top 3 academic, and the competition keeps getting better every time. 

Big thanks to the organizers for a well-run event!๐Ÿ”ฅ
Ectario (@ectari0) 's Twitter Profile Photo

For those curious about how some of the PwnMe 2025 finals challenges worked, I just published two writeups on my GitHub: github.com/Ectario/articlโ€ฆ 1 Crypto Medium (super-increasing sequences + LWE) & 1 Blockchain Insane (fullchain exploit over a Diamond Proxy to drain a pool)

FuzzingLabs (@fuzzinglabs) 's Twitter Profile Photo

๐Ÿ” We were proud to sponsor #PwnMeCTF 2025, organized by PHREAKS 2600 & ecole2600 ! ๐ŸŽ‰ The finals took place last weekend at 2600 Campus with international teams battling it out onsite ๐Ÿ‡ซ๐Ÿ‡ท Huge congrats to everyone who played, and shoutout to the organizers (rayanlecat & co)

๐Ÿ” We were proud to sponsor #PwnMeCTF 2025, organized by <a href="/phreaks2600/">PHREAKS 2600</a> &amp; <a href="/ecole2600/">ecole2600</a> !

๐ŸŽ‰ The finals took place last weekend at 2600 Campus with international teams battling it out onsite ๐Ÿ‡ซ๐Ÿ‡ท

Huge congrats to everyone who played, and shoutout to the organizers (<a href="/rayanlecat/">rayanlecat</a> &amp; co)
FuzzingLabs (@fuzzinglabs) 's Twitter Profile Photo

Uncovering Hidden Threats in Ethereum Virtual Machines ๐Ÿšจ At #Zer0Con2025, we exposed critical vulnerabilities in Ethereum Virtual Machines (EVMs) using fuzzing. Hereโ€™s what you need to know ๐Ÿงต๐Ÿ‘‡ #Ethereum #EVM #Fuzzing #BlockchainSecurity

Uncovering Hidden Threats in Ethereum Virtual Machines ๐Ÿšจ

At #Zer0Con2025, we exposed critical vulnerabilities in Ethereum Virtual Machines (EVMs) using fuzzing. Hereโ€™s what you need to know ๐Ÿงต๐Ÿ‘‡

#Ethereum #EVM #Fuzzing #BlockchainSecurity
Node Guardians (@nodeguardians) 's Twitter Profile Photo

๐Ÿ“šA Study on STARKs is live. This campaign explores the theory behind how STARKs verify computation โ€” through two foundational steps: -AIR: express computation as polynomials -FRI: prove a function is a polynomial ๐Ÿ‘‡ nodeguardians.io/campaigns/a-stโ€ฆ

ANSSI (@anssi_fr) 's Twitter Profile Photo

#ECSC2025 | ๐Ÿ“ Dรฉcouvrez la #TeamFrance 2025 ! ๐Ÿ‡ซ๐Ÿ‡ท Sรฉlectionnรฉs ร  l'issue du FCSC, les joueurs de la ECSC Team France reprรฉsenteront la drapeau tricolore ร  Varsovie, en Pologne, dans le cadre de l'European Cybersecurity Challenge. ๐Ÿ”” RDV en octobre ! PS: #YouAreAllWinners

FuzzingLabs (@fuzzinglabs) 's Twitter Profile Photo

๐Ÿšจ Security Disclosure โ€” ICON Validators at Risk ๐Ÿšจ We (FuzzingLabs) privately disclosed a serious vulnerability in the ICON node client via Immunefi. The issue directly affects all validator nodes on the ICON network. Shortly after our report, ICON Foundation ๐ŸŒ๐Ÿ”€ cancelled their

๐Ÿšจ Security Disclosure โ€” ICON Validators at Risk ๐Ÿšจ

We (<a href="/FuzzingLabs/">FuzzingLabs</a>) privately disclosed a serious vulnerability in the ICON node client via <a href="/immunefi/">Immunefi</a>.

The issue directly affects all validator nodes on the ICON network.

Shortly after our report, <a href="/poweredbyicx/">ICON Foundation ๐ŸŒ๐Ÿ”€</a> cancelled their
Weilin (William) Li (@hklst4r) 's Twitter Profile Photo

A detailed analysis of the GMX ๐Ÿซ attack. (1) The "refund" logic makes a malicious -> The attacker jail-break the restrictions to perform multiple actions in 1 transaction. As my previous tweet analyzed, the attacker fooled the frontend (the keeper bot) to hijack the control

A detailed analysis of the <a href="/GMX_IO/">GMX ๐Ÿซ</a> attack.

(1) The "refund" logic makes a malicious -&gt; The attacker jail-break the restrictions to perform multiple actions in 1 transaction.

As my previous tweet analyzed, the attacker fooled the frontend (the keeper bot) to hijack the control
FuzzingLabs (@fuzzinglabs) 's Twitter Profile Photo

๐Ÿš€ We just released sol-azy on GitHub! A modular CLI for static analysis & reverse engineering of #Solana sBPF programs โ€” with disassembly, CFGs, and Starlark rule support. ๐Ÿงต github.com/FuzzingLabs/soโ€ฆ ๐Ÿ‘€ Docs: fuzzinglabs.github.io/sol-azy/introdโ€ฆ #Solana #RE #Security #Rust

FuzzingLabs (@fuzzinglabs) 's Twitter Profile Photo

Ever wanted a single tool to build, analyze (static analyzer), fetch, and reverse engineer Solana SBPF programs? ๐Ÿ’ป We built Sol-azy, a modular CLI toolkit for security researchers: fuzzinglabs.com/introducing-soโ€ฆ Letโ€™s break it down ๐Ÿงต

Ever wanted a single tool to build, analyze (static analyzer), fetch, and reverse engineer Solana SBPF programs? ๐Ÿ’ป

We built Sol-azy, a modular CLI toolkit for security researchers: fuzzinglabs.com/introducing-soโ€ฆ

Letโ€™s break it down ๐Ÿงต
Jeff Security (@jeffsecurity) 's Twitter Profile Photo

Sol-azy is a static analysis tool for the sol eco, allowing you to: - reverse โช - analyze ๐Ÿง - poke at Solana programs ๐Ÿ‘ˆ github.com/FuzzingLabs/soโ€ฆ

FuzzingLabs (@fuzzinglabs) 's Twitter Profile Photo

๐Ÿš€ We're excited to announce the release of FuzzForge Open Source (OSS)! FuzzForge is our open-source platform designed to automate offensive security workflows & AI Agents, from static analysis to fuzzing, debugging, and root cause analysis, all with AI assistance. ๐Ÿ”ท

FuzzingLabs (@fuzzinglabs) 's Twitter Profile Photo

๐Ÿ’ฃ We caught Y Combinatorโ€“backed Gecko Security stealing two of our CVEs, one on ollama , one on Gradio. They copied our PoCs, claimed CVE IDs, and even back-dated their blog posts. Hereโ€™s the full story ๐Ÿ‘‡

๐Ÿ’ฃ We caught <a href="/ycombinator/">Y Combinator</a>โ€“backed <a href="/gecko_sec/">Gecko Security</a>  stealing two of our CVEs, one on <a href="/ollama/">ollama</a> , one on <a href="/Gradio/">Gradio</a>.
They copied our PoCs, claimed CVE IDs, and even back-dated their blog posts.
Hereโ€™s the full story ๐Ÿ‘‡
SlowMist (@slowmist_team) 's Twitter Profile Photo

๐ŸšจOn Oct 16, the DeFi project Typus Finance on the #Sui was exploited. The team released a post-mortem report and thanked SlowMist for assisting in the investigation & fund tracing.๐Ÿค Weโ€™ve published a deep dive into the root cause โ€” a permission validation flaw that allowed