splitline πŸ‘οΈπŸˆβ€β¬› (@_splitline_) 's Twitter Profile
splitline πŸ‘οΈπŸˆβ€β¬›

@_splitline_

@D3VC0R3 / CTF with ${cYsTiCk} / ε‹ζ°‘ε…š / Taigi, zh-TW, en-US, es-PY / πŸˆβ€β¬›

ID: 1146464093609455624

linkhttp://github.com/splitline calendar_today03-07-2019 17:01:54

334 Tweet

1,1K Followers

557 Following

Asian Cyber Security Challenge (ACSC) (@acsc_asia) 's Twitter Profile Photo

πŸš€ ACSC 2024 (Asian Cyber Security Challenge) is Happening!πŸš€ πŸ“… March 30-31, 2024 🌟 Mark your calendars! πŸ”œ Registration opening soon. Don't miss out! More details here ▢️ acsc.asia #ACSC2024 #CyberSecurity #SaveTheDate

Asian Cyber Security Challenge (ACSC) (@acsc_asia) 's Twitter Profile Photo

πŸŽ‰ ACSC CTF 2024 has been started! πŸš€ Have fun and happy hacking! πŸ–₯οΈπŸ’»πŸ”’ #ACSCCTF2024 #CTF #icc #ic3game

Orange Tsai  🍊 (@orange_8361) 's Twitter Profile Photo

PHP just fixed one of my RCE vulnerabilities, which affects XAMPP by default. Check to see if you are affected and update now! πŸ”₯ blog.orange.tw/2024/06/cve-20…

Pumpkin πŸŽƒ (@u1f383) 's Twitter Profile Photo

I created a Linux Kernel challenge β€œHalloween” for the HITCON CTF Qual 2024 :). Below are the official writeup for β€œHalloween” and the unofficial writeups for "v8sbx" and "reEscape". Enjoy it! Halloween & v8sbx: u1f383.github.io/ctf/2024/07/16… reEscape: u1f383.github.io/ctf/2024/07/18…

Angelboy (@scwuaptx) 's Twitter Profile Photo

Excited to share our research on Kernel Streaming! We discovered several vulnerabilities in it that we used at Pwn2Own this year. Check it out: devco.re/blog/2024/08/2…

DEVCORE (@d3vc0r3) 's Twitter Profile Photo

🀘Congrats Orange(Orange Tsai 🍊) and Splitline(splitline πŸ‘οΈπŸˆβ€β¬›) on making it to 2024 Top 10 Web Hacking Techniques! Check out their groundbreaking research: portswigger.net/research/top-1…

NiNi (@terrynini38514) 's Twitter Profile Photo

The blog post is the full version of my talk at 38c3. It's about some vulnerabilities we found in libarchive and some interesting behaviors of libarchive that you don't want to miss. My favorite part is it only took us 56 seconds to trigger a crash by AFL++.