Zophike1 (@zophikel) 's Twitter Profile
Zophike1

@zophikel

Theoretician, @OpenToAllCTF

ID: 936406050177212420

linkhttps://www.reddit.com/user/Zophike1 calendar_today01-12-2017 01:26:14

873 Tweet

87 Followers

258 Following

Andreas Kling (@awesomekling) 's Twitter Profile Photo

A programmer should be able to parse a language, review a patch, optimize a database query, make a website, secure a server, debug without sources, write an exploit, grep a log file, build a kernel, write a manual, run efficiently, crash gallantly. Specialization is for insects.

Rocco Calvi (@tecr0c) 's Twitter Profile Photo

Microsoft patched two of my MS Office vulnerabilities, Microsoft Excel Information Disclosure Vulnerability (CVE-2022-41105) and Microsoft Word Information Disclosure Vulnerability (CVE-2022-41061), during this month’s Patch Tuesday :-)

Hex-Rays SA (@hexrayssa) 's Twitter Profile Photo

Friday news! The IDA 8.2 release is coming with many new features and improvements. Curious to know more? We’ll update you very soon 🌐 hex-rays.com/?utm_source=So… #IDAPro #IDATeams #NewRelease #Decompiler

Friday news! The IDA 8.2 release is coming with many new features and improvements. Curious to know more? We’ll update you very soon 🌐 hex-rays.com/?utm_source=So…

#IDAPro #IDATeams #NewRelease #Decompiler
sailay(valen) (@404death) 's Twitter Profile Photo

I just created the tool which can help to get NT AUTHORITY\SYSTEM from arbitrary directory creation bugs. github.com/binderlabs/Dir…

I just created the tool which can help to get NT AUTHORITY\SYSTEM from arbitrary directory creation bugs.
github.com/binderlabs/Dir…
Yuki Chen (@guhe120) 's Twitter Profile Photo

Finsihed the pre-recording of my incoming BH session next month, check the session if you are interested in bugs in Windows remote protocols | bug bounty

Finsihed the pre-recording of my incoming BH session next month, check the session if you are interested in  bugs in Windows remote protocols | bug bounty
Brendan Dolan-Gavitt (@moyix) 's Twitter Profile Photo

You might naively think that writing a binary exploitation CTF challenge in C is a piece of cake, but in fact it is extraordinarily difficult to write a C program of any size that contains ONLY THE NUMBER OF VULNERABILITIES YOU INTEND.

IDontCode (@_xeroxz) 's Twitter Profile Photo

Saw something interesting in vmp mutation. They don't coalesce basic blocks and they don't detect basic blocks that are epilogs...😅

Saw something interesting in vmp mutation. They don't coalesce basic blocks and they don't detect basic blocks that are epilogs...😅
Ascension (@ascensionfeed) 's Twitter Profile Photo

COA GIVEAWAY! Like, Retweet, and Comment what class you're going to play first and we'll pick several people to get CoA Alpha access for them and a friend. Make sure you're following so we can DM you when you win! youtube.com/watch?v=QCCShm…

Zach Molzer (@kcmolzer) 's Twitter Profile Photo

Case study on why smaller units are not only working, but thriving right now: Let’s say you are a college graduate making $65,000 a year pre-tax. Your take home is ~$4,000/ month. My generation does not want roommates, but it is hard to afford a spot without them. You should

Case study on why smaller units are not only working, but thriving right now: 

Let’s say you are a college graduate making $65,000 a year pre-tax. Your take home is ~$4,000/ month. 

My generation does not want roommates, but it is hard to afford a spot without them. You should
Patrick Wardle (@patrickwardle) 's Twitter Profile Photo

No surprises here, but CrowdStrike confirms Tavis Ormandy's analysis, that the bug was indeed not due to a NULL-pointer deference 🧠 ...but rather "an out-of-bounds memory read"

No surprises here, but <a href="/CrowdStrike/">CrowdStrike</a> confirms <a href="/taviso/">Tavis Ormandy</a>'s analysis, that the bug was indeed not due to a NULL-pointer deference 🧠 ...but rather "an out-of-bounds memory read"
Back Engineering Labs (@backengineerlab) 's Twitter Profile Photo

The next generation of binary obfuscation for the Windows platform is now public. No source code annotations required, full SEH support, CET support, ACG compliant. Join the Discord: discord.gg/VMUpEP2rNg Website: codedefender.io

机器之心 JIQIZHIXIN (@synced_global) 's Twitter Profile Photo

This is huge! NVIDIA just built a framework named SATLUTION, which can scale LLM-based code evolution from small kernels to full repositories (hundreds of files, tens of thousands of lines of C/C++). It is the first one that can do this. Targeting SAT (the canonical

This is huge!

NVIDIA just built a framework named SATLUTION, which can scale LLM-based code evolution from small kernels to full repositories (hundreds of files, tens of thousands of lines of C/C++).

It is the first one that can do this.

Targeting SAT (the canonical
Vertox (@vertox_df) 's Twitter Profile Photo

People keep telling you to take what works in equities and apply it to crypto. Those same people then claim that factors don’t exist in crypto at all. Let’s answer once and for all if equity factors exist in crypto and if you can profit from them. Link in Profile. Giving

People keep telling you to take what works in equities and apply it to crypto. 
Those same people then claim that factors don’t exist in crypto at all.  

Let’s answer once and for all if equity factors exist in crypto and if you can profit from them.

Link in Profile. 
Giving