r3billions (@r3billions) 's Twitter Profile
r3billions

@r3billions

A CTF team

ID: 1091343588603113474

linkhttps://r3billions.com/ calendar_today01-02-2019 14:32:42

22 Tweet

994 Takipçi

6 Takip Edilen

CyberTalents (@cyber_talents) 's Twitter Profile Photo

Congrats 🎉 to the 1st winning team 🥇"rᗱbillions" at Arab Regional Cyber Security CTF Competition 2019. buff.ly/2LLLF8b #ctf #redteam #technology #infosec #hacking #informationsecurity #cybersecurity #conferences #computersecurity #arabctf19 #hitbcyberweek

Congrats 🎉 to the 1st winning team 🥇"rᗱbillions" at Arab Regional Cyber Security CTF Competition 2019.
buff.ly/2LLLF8b

#ctf #redteam #technology #infosec #hacking #informationsecurity #cybersecurity #conferences #computersecurity #arabctf19 #hitbcyberweek
Saif (@wr3nchsr) 's Twitter Profile Photo

My writeup for a pwn challenge from justCTF 2019. The challenge's binary runs a demo shellcode and the objective is to find a way to execute your own shellcode and bypass validation to get the flag. r3billions.com/writeup-shellc…

r3billions (@r3billions) 's Twitter Profile Photo

Yesterday we were lucky enough to meet up with a l33t hacker, Raindrops. He invited us to his lab and gave us an even more l33t hardware hacking crash course! Can’t wait to put this knowledge to action.

Yesterday we were lucky enough to meet up with a l33t hacker, <a href="/0xRaindrop/">Raindrops</a>. He invited us to his lab and gave us an even more l33t hardware hacking crash course! Can’t wait to put this knowledge to action.
worst tweep eune (@mmn3mm) 's Twitter Profile Photo

Writeup for a reverse challenge from HackTM CTF 2020. The challenge gives you a pcap, analyzing the pcap it looked like an executable was sending data and we had to extract the data and parse the packets to get the flag. r3billions.com/writeup-ananas/

Saif (@wr3nchsr) 's Twitter Profile Photo

Writeup for a pwn challenge from HackTM Quals which only takes an input of 11 bytes. Solution included fuzzing allowed syscalls to bypass seccomp rules,doing an arbitrary read to execute more shellcode and leaking the flag using a sidechannel attack. r3billions.com/writeup-obey-t…

Saif (@wr3nchsr) 's Twitter Profile Photo

Writeup for a pwn challenge from Dragon CTF by Dragon Sector. The challenge mmaps a 4096 bytes with RWX permissions, takes input into the allocated memory then does some operations on it. 2 bytes of our input gets executed before the program terminates. r3billions.com/writeup-no-eee…

Saif (@wr3nchsr) 's Twitter Profile Photo

The objective is to make use of those 2 bytes to redirect the execution to the rest of our input which will have our shellcode.

the_storm (@the_st0rm) 's Twitter Profile Photo

I honestly think r3billions is one of the best CTF teams in the middle east. This is great! but this is also an opportunity to be one of the best in the world :) Don't miss that opportunity ;)

Ghobashy (@rootk1d_) 's Twitter Profile Photo

I solved this challenge with worst tweep eune from ADDA CTF. Check our writeup for this one it was an interesting challenge \o/ r3billions.com/writeup-intrus…

Saif (@wr3nchsr) 's Twitter Profile Photo

Writeup for a pwn challenge from BackdoorCTF by InfoSecIITR. The challenge performs CRUD operations on chucks managed by a custom allocator. r3billions.com/writeup-susall…