Moriarty (@rudrakshsaini2) 's Twitter Profile
Moriarty

@rudrakshsaini2

I like cats , computers and ctf’s | Captain @thehackerscrew1 | Slutt datafag

ID: 1172556085384736768

linkhttps://www.thehackerscrew.team calendar_today13-09-2019 17:02:22

1,1K Tweet

1,1K Takipçi

1,1K Takip Edilen

thehackerscrew (@thehackerscrew1) 's Twitter Profile Photo

This weekend we participated in TFCCTF by The Few Chosen & NSSCTF by Norske Nøkkelsnikere and placed 🥇in both! Winning TFCCTF we also qualified for DefCamp finals in Bucharest, Romania. Huge thanks to both teams for organizing wonderful event and congratulations to other winners🥳

This weekend we participated in TFCCTF by <a href="/TheFewChosenTFC/">The Few Chosen</a> &amp; NSSCTF by <a href="/nnsctf/">Norske Nøkkelsnikere</a> and placed 🥇in both!

Winning TFCCTF we also qualified for <a href="/DefCampRO/">DefCamp</a> finals in Bucharest, Romania.

Huge thanks to both teams for organizing wonderful event and congratulations to other winners🥳
thehackerscrew (@thehackerscrew1) 's Twitter Profile Photo

Registrations for crewCTF 2025 are now open 2025.crewc.tf/register Thank you to our generous sponsors who made our event possible : OtterSec Google Cloud #crewCTF2025 #CTF

Registrations for crewCTF 2025 are now open 2025.crewc.tf/register

Thank you to our generous sponsors who made our event possible :
 
<a href="/osec_io/">OtterSec</a> 
<a href="/googlecloud/">Google Cloud</a> 

#crewCTF2025 #CTF
huli (@aszx87410) 's Twitter Profile Photo

I received an email from a reader asking if I could explain the payload of the "XSS without () and ;" here is it I am not the one who invent it, just someone trying to explain every details of it. Based on it, we can also make it worked in both browsers blog.huli.tw/2025/09/15/en/…

Dirk-jan (@_dirkjan) 's Twitter Profile Photo

I've been researching the Microsoft cloud for almost 7 years now. A few months ago that research resulted in the most impactful vulnerability I will probably ever find: a token validation flaw allowing me to get Global Admin in any Entra ID tenant. Blog: dirkjanm.io/obtaining-glob…

thehackerscrew (@thehackerscrew1) 's Twitter Profile Photo

And that's a wrap, CrewCTF 2025 is over ! Winners of this edition are - 🥇 TRX 🥈 valgrind 🥉 r3kapig Thank you everyone for participating and hope you had fun. CrewCTF will be back with its 5th edition next year, till then Happy hacking 🪛 #crewCTF2025

And that's a wrap, CrewCTF 2025 is over ! 

Winners of this edition are - 

🥇 <a href="/TheRomanXpl0it/">TRX</a> 
🥈 <a href="/valgrindctf/">valgrind</a> 
🥉 <a href="/r3kapig/">r3kapig</a> 

Thank you everyone for participating and hope you had fun. 
CrewCTF will be back with its 5th edition next year, till then Happy hacking 🪛

#crewCTF2025
thehackerscrew (@thehackerscrew1) 's Twitter Profile Photo

We are excited to announce that we played sardinia Cybercamp CTF 2025 organized by Sardinia Len (Srdnlen) last weekend and placed 🥈 Congratulations to other winners and thank you Sardinia Len (Srdnlen) for organizing such an awesome event. We are looking forward to playing the next edition.

We are excited to announce that we played sardinia Cybercamp CTF 2025 organized by <a href="/srdnlen/">Sardinia Len (Srdnlen)</a> last weekend and placed 🥈 

Congratulations to other winners and thank you <a href="/srdnlen/">Sardinia Len (Srdnlen)</a>  for organizing such an awesome event. 

We are looking forward to playing the next edition.
Amjad Masad (@amasad) 's Twitter Profile Photo

When I first spoke out about the genocide, I was one of the few voices in tech, and it came at a cost. I faced sabotage especially from the VC class: lies, leaks, threats, and blocked investments. It was painful, but I never once regretted standing up for the children in Gaza.

castilho (@castilho101) 's Twitter Profile Photo

I found out that you can use "ftp::" to convert a limited Dom Clobering situation into a full CSPT. Then, while talking about it with m0z, he found that we can also use "https::" This can be used to prevent URL parsing of href, allowing us to hit other endpoints

I found out that you can use "ftp::" to convert a limited Dom Clobering situation into a full CSPT. Then, while talking about it with <a href="/LooseSecurity/">m0z</a>, he found that we can also use "https::"

This can be used to prevent URL parsing of href, allowing us to hit other endpoints