Ectario (@ectari0) 's Twitter Profile
Ectario

@ectari0

Cryptography & Web3 enjoyer:

πŸ‡¨πŸ‡΅ CTF Player w/ @MadeinFranceCTF & @Phreaks2600 and Junior Security Researcher @FuzzingLabs

ID: 756980381069479940

linkhttp://github.com/ectario calendar_today23-07-2016 22:32:41

26 Tweet

60 Followers

196 Following

PHREAKS 2600 (@phreaks2600) 's Twitter Profile Photo

The wait is over! πŸ”₯ PwnMe CTF 2025 qualifications start this Friday! πŸ“… February 28 – March 2 πŸ’» No team size limit 🧩 Pwn, Web, Crypto, Reverse & Misc Top 16 teams qualify (8 Academic, 8 Professional) Finals on April 12 at ecole2600 πŸ‡«πŸ‡· Sign up now πŸ‘‰ pwnme.phreaks.fr

The wait is over! πŸ”₯
<a href="/pwnmectf/">PwnMe CTF 2025</a> qualifications start this Friday!

πŸ“… February 28 – March 2
πŸ’» No team size limit
🧩 Pwn, Web, Crypto, Reverse &amp; Misc
Top 16 teams qualify (8 Academic, 8 Professional) 
Finals on April 12 at <a href="/ecole2600/">ecole2600</a> πŸ‡«πŸ‡·

Sign up now πŸ‘‰ pwnme.phreaks.fr
PwnMe CTF 2025 (@pwnmectf) 's Twitter Profile Photo

PwnMe CTF qualifications are now over! Congratulations to the winning teams: πŸ₯‡ RedRocket.Club πŸ₯ˆ Flat Network Society πŸ₯‰ Friendly Maltese Citizens The journey isn’t over yet, see you in France for the finals! πŸ‡«πŸ‡· Thanks to everyone who participated!πŸ’˜

PwnMe CTF qualifications are now over!

Congratulations to the winning teams:
πŸ₯‡ <a href="/redrocket_ctf/">RedRocket.Club</a> 
πŸ₯ˆ <a href="/FlatNetworkOrg/">Flat Network Society</a> 
πŸ₯‰ <a href="/malta_ctf/">Friendly Maltese Citizens</a> 

The journey isn’t over yet, see you in France for the finals! πŸ‡«πŸ‡·

Thanks to everyone who participated!πŸ’˜
FuzzingLabs (@fuzzinglabs) 's Twitter Profile Photo

πŸš€ New Writeup Alert! πŸš€ We tackled the Stargazer challenge from HTB University CTF 2024, diving deep into smart contract hacking & proxy vulnerabilities. πŸ› οΈ Here’s a breakdown of how we solved it! πŸ§΅πŸ‘‡

πŸš€ New Writeup Alert! πŸš€

We tackled the Stargazer challenge from HTB University CTF 2024, diving deep into smart contract hacking &amp; proxy vulnerabilities. πŸ› οΈ

Here’s a breakdown of how we solved it! πŸ§΅πŸ‘‡
Insomni'hack (@1ns0mn1h4ck) 's Twitter Profile Photo

πŸš¨πŸ“’ Insomni'hack 2025 πŸ›‘οΈπŸ’» Approximately 600 participants engaged in the hacking competition, tackling 33 challenges. Congratulations also to the academic winners: πŸ₯‡Polyflag πŸ₯ˆLosFuzzys πŸ₯‰PHREAKS 2600 πŸš€ See you next year for new adventures! #INSO25 #CTF

πŸš¨πŸ“’ Insomni'hack 2025  

πŸ›‘οΈπŸ’» Approximately 600 participants engaged in the hacking competition, tackling 33 challenges.

Congratulations also to the academic winners: 
πŸ₯‡Polyflag 
πŸ₯ˆ<a href="/LosFuzzys/">LosFuzzys</a> 
πŸ₯‰<a href="/phreaks2600/">PHREAKS 2600</a>  

πŸš€ See you next year for new adventures!  

#INSO25 #CTF
PHREAKS 2600 (@phreaks2600) 's Twitter Profile Photo

This weekend, we competed in Insomni'hack CTF and finished πŸ₯‰top 3 academic and top 10 overall! It's our third year in a row in the top 3 academic, and the competition keeps getting better every time. Big thanks to the organizers for a well-run event!πŸ”₯

This weekend, we competed in <a href="/1ns0mn1h4ck/">Insomni'hack</a> CTF and finished πŸ₯‰top 3 academic and top 10 overall!

It's our third year in a row in the top 3 academic, and the competition keeps getting better every time. 

Big thanks to the organizers for a well-run event!πŸ”₯
Ectario (@ectari0) 's Twitter Profile Photo

For those curious about how some of the PwnMe 2025 finals challenges worked, I just published two writeups on my GitHub: github.com/Ectario/articl… 1 Crypto Medium (super-increasing sequences + LWE) & 1 Blockchain Insane (fullchain exploit over a Diamond Proxy to drain a pool)

FuzzingLabs (@fuzzinglabs) 's Twitter Profile Photo

πŸ” We were proud to sponsor #PwnMeCTF 2025, organized by PHREAKS 2600 & ecole2600 ! πŸŽ‰ The finals took place last weekend at 2600 Campus with international teams battling it out onsite πŸ‡«πŸ‡· Huge congrats to everyone who played, and shoutout to the organizers (rayanlecat & co)

πŸ” We were proud to sponsor #PwnMeCTF 2025, organized by <a href="/phreaks2600/">PHREAKS 2600</a> &amp; <a href="/ecole2600/">ecole2600</a> !

πŸŽ‰ The finals took place last weekend at 2600 Campus with international teams battling it out onsite πŸ‡«πŸ‡·

Huge congrats to everyone who played, and shoutout to the organizers (<a href="/rayanlecat/">rayanlecat</a> &amp; co)
FuzzingLabs (@fuzzinglabs) 's Twitter Profile Photo

Uncovering Hidden Threats in Ethereum Virtual Machines 🚨 At #Zer0Con2025, we exposed critical vulnerabilities in Ethereum Virtual Machines (EVMs) using fuzzing. Here’s what you need to know πŸ§΅πŸ‘‡ #Ethereum #EVM #Fuzzing #BlockchainSecurity

Uncovering Hidden Threats in Ethereum Virtual Machines 🚨

At #Zer0Con2025, we exposed critical vulnerabilities in Ethereum Virtual Machines (EVMs) using fuzzing. Here’s what you need to know πŸ§΅πŸ‘‡

#Ethereum #EVM #Fuzzing #BlockchainSecurity
Node Guardians (@nodeguardians) 's Twitter Profile Photo

πŸ“šA Study on STARKs is live. This campaign explores the theory behind how STARKs verify computation β€” through two foundational steps: -AIR: express computation as polynomials -FRI: prove a function is a polynomial πŸ‘‡ nodeguardians.io/campaigns/a-st…

ANSSI (@anssi_fr) 's Twitter Profile Photo

#ECSC2025 | πŸ“ DΓ©couvrez la #TeamFrance 2025 ! πŸ‡«πŸ‡· SΓ©lectionnΓ©s Γ  l'issue du FCSC, les joueurs de la ECSC Team France reprΓ©senteront la drapeau tricolore Γ  Varsovie, en Pologne, dans le cadre de l'European Cybersecurity Challenge. πŸ”” RDV en octobre ! PS: #YouAreAllWinners

FuzzingLabs (@fuzzinglabs) 's Twitter Profile Photo

🚨 Security Disclosure β€” ICON Validators at Risk 🚨 We (FuzzingLabs) privately disclosed a serious vulnerability in the ICON node client via Immunefi. The issue directly affects all validator nodes on the ICON network. Shortly after our report, ICON Foundation πŸŒπŸ”€ cancelled their

🚨 Security Disclosure β€” ICON Validators at Risk 🚨

We (<a href="/FuzzingLabs/">FuzzingLabs</a>) privately disclosed a serious vulnerability in the ICON node client via <a href="/immunefi/">Immunefi</a>.

The issue directly affects all validator nodes on the ICON network.

Shortly after our report, <a href="/poweredbyicx/">ICON Foundation πŸŒπŸ”€</a> cancelled their
Weilin (William) Li (@hklst4r) 's Twitter Profile Photo

A detailed analysis of the GMX 🫐 attack. (1) The "refund" logic makes a malicious -> The attacker jail-break the restrictions to perform multiple actions in 1 transaction. As my previous tweet analyzed, the attacker fooled the frontend (the keeper bot) to hijack the control

A detailed analysis of the <a href="/GMX_IO/">GMX 🫐</a> attack.

(1) The "refund" logic makes a malicious -&gt; The attacker jail-break the restrictions to perform multiple actions in 1 transaction.

As my previous tweet analyzed, the attacker fooled the frontend (the keeper bot) to hijack the control
FuzzingLabs (@fuzzinglabs) 's Twitter Profile Photo

πŸš€ We just released sol-azy on GitHub! A modular CLI for static analysis & reverse engineering of #Solana sBPF programs β€” with disassembly, CFGs, and Starlark rule support. 🧡 github.com/FuzzingLabs/so… πŸ‘€ Docs: fuzzinglabs.github.io/sol-azy/introd… #Solana #RE #Security #Rust

FuzzingLabs (@fuzzinglabs) 's Twitter Profile Photo

Ever wanted a single tool to build, analyze (static analyzer), fetch, and reverse engineer Solana SBPF programs? πŸ’» We built Sol-azy, a modular CLI toolkit for security researchers: fuzzinglabs.com/introducing-so… Let’s break it down 🧡

Ever wanted a single tool to build, analyze (static analyzer), fetch, and reverse engineer Solana SBPF programs? πŸ’»

We built Sol-azy, a modular CLI toolkit for security researchers: fuzzinglabs.com/introducing-so…

Let’s break it down 🧡
Jeff Security (@jeffsecurity) 's Twitter Profile Photo

Sol-azy is a static analysis tool for the sol eco, allowing you to: - reverse βͺ - analyze 🧐 - poke at Solana programs πŸ‘ˆ github.com/FuzzingLabs/so…

FuzzingLabs (@fuzzinglabs) 's Twitter Profile Photo

πŸš€ We're excited to announce the release of FuzzForge Open Source (OSS)! FuzzForge is our open-source platform designed to automate offensive security workflows & AI Agents, from static analysis to fuzzing, debugging, and root cause analysis, all with AI assistance. πŸ”·

FuzzingLabs (@fuzzinglabs) 's Twitter Profile Photo

πŸ’£ We caught Y Combinator–backed Gecko Security stealing two of our CVEs, one on ollama , one on Gradio. They copied our PoCs, claimed CVE IDs, and even back-dated their blog posts. Here’s the full story πŸ‘‡

πŸ’£ We caught <a href="/ycombinator/">Y Combinator</a>–backed <a href="/gecko_sec/">Gecko Security</a>  stealing two of our CVEs, one on <a href="/ollama/">ollama</a> , one on <a href="/Gradio/">Gradio</a>.
They copied our PoCs, claimed CVE IDs, and even back-dated their blog posts.
Here’s the full story πŸ‘‡
SlowMist (@slowmist_team) 's Twitter Profile Photo

🚨On Oct 16, the DeFi project Typus Finance on the #Sui was exploited. The team released a post-mortem report and thanked SlowMist for assisting in the investigation & fund tracing.🀝 We’ve published a deep dive into the root cause β€” a permission validation flaw that allowed