Ivan Novikov (@johnnovikov) 's Twitter Profile
Ivan Novikov

@johnnovikov

Google SWE, playing CTFs with C4T BuT S4D

ID: 1678177782

calendar_today17-08-2013 13:14:13

110 Tweet

38 Followers

67 Following

RuCTFE (@ructfe) 's Twitter Profile Photo

Thank you again for the good game! Congratulations to: 1. 🇷🇺 Bushwhackers — 2707604 FP 2. 🇩🇪 saarsec — 2280156 FP 3. 🇷🇺 C4T BuT S4D — 1361028 FP 4. 🇷🇺 Corrupted Pwnis — 1333575 FP 5. 🇷🇺 [SPbCTF] FaKappa — 1119954 FP

Oly Markes (@olymarkes) 's Twitter Profile Photo

Построить такое и не сдавать на Airbnb.... ну не знаю. Мог бы стать суперхозяином! Коммуналку отбивать!

Авиасейлс (@aviasales) 's Twitter Profile Photo

Мы приняли решение убрать из приложения функцию поиска обратного билета

Gynvael Coldwind (@gynvael.bsky.social) (@gynvael) 's Twitter Profile Photo

Start your week with a simple #Python sandbox escape challenge from Google CTF: capturetheflag.withgoogle.com/challenges/san… Task is to get the content of file `flag`. The sandbox disallows calling functions on AST level. Attachment is a ZIP file with source. Use nc to connect to that host/port there

FAUST CTF (@faustctf) 's Twitter Profile Photo

Marty, we are back from the future! #faustctf is over and it was great fun again! The winners are: 1. C4T_BuT_S4D 2. Bushwhackers 3. ENOFLAG Thank you for playing and see you next year :) #capturetheflag #Faust #cybersecurity #ctf #FAU

Ivan Novikov (@johnnovikov) 's Twitter Profile Photo

Yay! I got my first ever CVE! Fun fact: initially I found it as a bug for the "Stay ~ CTF 2022" we run with C4T BuT S4D. And turned out it was real CVE. security.snyk.io/vuln/SNYK-PYTH…

saarsec (@saarsec) 's Twitter Profile Photo

We forgot to tweet in the heat of the moment! Congrats again to the winners of #saarctf 23 🥇C4T BuT S4D 🥈Superflat 🥉WreckTheLine We hope it was fun. See you again for #saarctf 2024!

slonser (@slonser_) 's Twitter Profile Photo

Recently found a bypass in DOMPurify in certain cases. Today, versions 3.0.10 and 2.4.8 were released, fixing the issue. Documented the problem here: blog.slonser.info/posts/dompurif… Thanks to mario of Cure53 for excellent communication! #DOMPurify #security

C4T BuT S4D (@c4tbuts4d) 's Twitter Profile Photo

Secured the first place on Midnight Sun quals over this weekend, looking forward to the finals in June! We solved one task using source code and filename disclosure in ASP.NET, and a URI parsing bug found by slonser: http://domain\r\nfile://C:/inetpub 🔥

TheSAS2025 (@thesascon) 's Twitter Profile Photo

Announcing the #TheSAS2025 #CTF winners! Congratulations to C4T BuT S4D for taking the absolute win in the A/D and first-blooding 2 of the 4 services, including the trickiest one. Kudos to SKSD and dtl for their well-deserved 2nd and 3rd places. Every team received a check with a

Announcing the #TheSAS2025 #CTF winners!
Congratulations to <a href="/C4TBuTS4D/">C4T BuT S4D</a> for taking the absolute win in the A/D and first-blooding 2 of the 4 services, including the trickiest one.
Kudos to SKSD and dtl for their well-deserved 2nd and 3rd places.
Every team received a check with a