pr0cf5 (@pr0cf51) 's Twitter Profile
pr0cf5

@pr0cf51

Active member of @SuperGuesser, ex. KAIST GoN 18, CTF newbie. Baby auditor working for @osec_io

ID: 1115249395421798400

calendar_today08-04-2019 13:45:50

1,1K Tweet

1,1K Followers

584 Following

SangHo Lee ๐Ÿ‡ฐ๐Ÿ‡ท๐Ÿ‡บ๐Ÿ‡ฒ๐Ÿ‡ฏ๐Ÿ‡ต๐Ÿ‡ฎ๐Ÿ‡ฑ (@tony_lee_kr) 's Twitter Profile Photo

๋งŽ์€ ๊ธฐ์—…๋“ค์ด ํฌ๋งํ‡ด์ง์„ ์‹ค์‹œํ•˜๊ธฐ ์‹œ์ž‘ํ–ˆ์Šต๋‹ˆ๋‹ค. 4050 ๋‚ ์•„๊ฐ€๊ธฐ ์‹œ์ž‘ํ•˜๋„ค์š”. [ํ—ค๋Ÿด๋“œ๊ฒฝ์ œ] 40๋Œ€~50๋Œ€ โ€˜๋‚ ๋ฒผ๋ฝโ€™โ€ฆโ€œ9000๋ช… ํ•ด๊ณ ํ•ฉ๋‹ˆ๋‹คโ€ ์ตœ์•… โ€˜ํฌ๋งํ‡ด์งโ€™ ๊ฒฐ๊ตญ ํ„ฐ์กŒ๋‹ค n.news.naver.com/mnews/article/โ€ฆ

๋งŽ์€ ๊ธฐ์—…๋“ค์ด ํฌ๋งํ‡ด์ง์„ ์‹ค์‹œํ•˜๊ธฐ ์‹œ์ž‘ํ–ˆ์Šต๋‹ˆ๋‹ค.

4050 ๋‚ ์•„๊ฐ€๊ธฐ ์‹œ์ž‘ํ•˜๋„ค์š”.

[ํ—ค๋Ÿด๋“œ๊ฒฝ์ œ] 40๋Œ€~50๋Œ€ โ€˜๋‚ ๋ฒผ๋ฝโ€™โ€ฆโ€œ9000๋ช… ํ•ด๊ณ ํ•ฉ๋‹ˆ๋‹คโ€ ์ตœ์•… โ€˜ํฌ๋งํ‡ด์งโ€™ ๊ฒฐ๊ตญ ํ„ฐ์กŒ๋‹ค
n.news.naver.com/mnews/article/โ€ฆ
Soyeon Park (@_runiel) 's Twitter Profile Photo

๐Ÿš€ Proud to be part of DARPA #AIxCC Winner - Team Atlanta ! Our sub-team built one of the key components: Multilang LLM Agents for vulnerability detection.

Google VRP (Google Bug Hunters) (@googlevrp) 's Twitter Profile Photo

Got a knack for security? We've launched a rewards program for OSV-SCALIBR and want your help! Earn cash ๐Ÿ’ฐ for creating new plugins that detect vulnerabilities, secrets, or extract software inventory. bughunters.google.com/blog/655159064โ€ฆ

Tim Becker (@tjbecker_) 's Twitter Profile Photo

First, we use an LLM classifier. We provide the vuln report and relevant source code, requesting a single output token: whether the vulnerability is "likely" or "unlikely" to be real. By inspecting the logprobs of the completion, we can score candidate vulns by likelihood!

DeFiHackLabs (@defihacklabs) 's Twitter Profile Photo

HITCON CTF 2025 Date: UTC 08/22 14:00 ~ 08/24 14:00 ctf2025.hitcon.org Thanks to minaminao from DeFiHackLabs for creating the web3 challenges for HITCON.

Team Atlanta (@teamatlanta24) 's Twitter Profile Photo

โšก Going beyond the baseline, we forked Jazzer with LibAFL to push Java fuzzing further under AIxCC pressure โ€” lessons learned. ๐Ÿ‘‰ team-atlanta.github.io/blog/post-crs-โ€ฆ #AIxCC #Cybersecurity #CTF #AI #LLM #GenAI #AICyberChallenge #DARPA #DEFCON #Security #Vulnerability

DawnSecurityLab (@dawnseclab) 's Twitter Profile Photo

Checkout this open-sourced handy MCP server for JEB decompiler by us: github.com/flankerhqd/jebโ€ฆ . Contributions and use cases are always welcomed.

โ„ฮตsam (@hesamation) 's Twitter Profile Photo

a senior engineer at google just dropped a 400-page free book on docs for review: agentic design patterns. the table of contents looks like everything you need to know about agents + code: > advanced prompt techniques > multi-agent patterns > tool use and MCP > you name it

a senior engineer at google just dropped a 400-page free book on docs for review: agentic design patterns.

the table of contents looks like everything you need to know about agents + code:
> advanced prompt techniques
> multi-agent patterns
> tool use and MCP
> you name it
pashov (@pashovkrum) 's Twitter Profile Photo

All web3 security researchers should read this 10/10 report on all web3 security incidents in 2024 and stats around them. Great job by ChainLight. Read below๐Ÿ‘‡ drive.google.com/file/d/1G3obulโ€ฆ

All web3 security researchers should read this

10/10 report on all web3 security incidents in 2024 and stats around them. Great job by <a href="/ChainLight_io/">ChainLight</a>. Read below๐Ÿ‘‡
drive.google.com/file/d/1G3obulโ€ฆ
hackyboiz (@hackyboiz) 's Twitter Profile Photo

[Research] smart contracts auditing 101 for pwners - PART 1 (EN) hackyboiz.github.io/2025/09/07/d4tโ€ฆ Hello, this is d4tura. In this research post, I summarize the core concepts required to solve the smart contract wargame "Damn Vulnerable DeFi." From the perspective of a 'pwner' more

[Research] smart contracts auditing 101 for pwners - PART 1 (EN)

hackyboiz.github.io/2025/09/07/d4tโ€ฆ

Hello, this is d4tura. In this research post, I summarize the core concepts required to solve the smart contract wargame "Damn Vulnerable DeFi."  
From the perspective of a 'pwner' more
Zhuo Zhang | Purdue CS (@i2huer) 's Twitter Profile Photo

1/10 William Cheung ฮฃ: says wait, but I can't. Can't wait. We are builting an Ethereum debugger with 1) true source-level stepping, 2) near-100% local/state variable inspection, and 3) on-the-fly Solidity expression eval at any step. Screenshots below; details in the thread.

asymmetric research (@asymmetric_re) 's Twitter Profile Photo

New post: Relayโ€™s contracts trusted Ed25519 verification without validating offsets, opening the door to forged allocator signatures and potential double-spends. Felix Wilhelm details the bug, the risks it posed to cross-chain liquidity, and how the issue was addressed.

New post: <a href="/RelayProtocol/">Relay</a>โ€™s contracts trusted Ed25519 verification without validating offsets, opening the door to forged allocator signatures and potential double-spends.

<a href="/_fel1x/">Felix Wilhelm</a> details the bug, the risks it posed to cross-chain liquidity, and how the issue was addressed.
Arsen (@arsen_bt) 's Twitter Profile Photo

Every Auditor must know Solana in 2025 Top 3 Resources to learn Solana. ๐ŸดBlueshift Solana ๐Ÿ”—blueshift.gg ๐Ÿด Solana Tutorial by RareSkills ๐Ÿ”— rareskills.io/solana-tutorial ๐Ÿด Awesome Solana Security ๐Ÿ”— github.com/0xMacro/awesomโ€ฆ

Mitchell Amador (@mitchellamador) 's Twitter Profile Photo

Every security researcher knows the drill: a new program launches, and before the real work begins, youโ€™re deep in setup: pulling contracts, fixing imports, chasing proxies. Now, that entire process is automated with Instascope. It fetches verified code, resolves proxy and ENS