Aviel Warschawski Profile
Aviel Warschawski

@PastaFork

Followers
276
Following
86
Media
1
Statuses
30

Security researcher during the day. @pastenctf team member at night.

Joined August 2017
Don't wanna be here? Send us removal request.
@nooffense_il
NoOFFENSE
1 year
Registration is now open! https://t.co/UYnL1xjpnR *Limited seats are available and participation approvals will be sent as we approach the event.*
0
8
19
@nooffense_il
NoOFFENSE
1 year
👋👋
0
12
29
@liadav
Liad Avraham
2 years
I'm heading to DEFCON & BlackHat in Vegas this week. If you're into iOS or Android vulnerability research, let's connect and meet-up.
4
3
31
@GoogleVRP
Google VRP (Google Bug Hunters)
3 years
Pasten wins #Hackceler8 2022! The finals of Google CTF 2022. Congratulations!!
1
17
129
@HackerJeopardy
Hacker Jeopardy
3 years
WHO SHOULD PLAY @HACKERJEOPARDY? THE TOP TWO TEAMS PLAY. THE BOTTOM TWO DO NOT. #DFIU @defcon #D3FC0N
2
10
18
@hxpctf
hxp
4 years
hxp CTF 2021 is over! Congratulations to @pastenctf, @0rganizers, @SuperGuesser, and everyone else! 🎉 thx 4 many gr8 hacks 🪓
2
12
76
@hxpctf
hxp
5 years
After some crazy last-minute flag submissions, hxp CTF 2020 is over! Congratulations to @pastenctf, Spatenbräu, and perfect guesser! 🎉
3
12
74
@gf_256
cts🌸
5 years
unspoken rules of the CTF community
7
23
207
@Oranav
Oran
6 years
I published a write-up for md15 from @hxpctf 36C3 CTF: https://t.co/oX0Hl8x3VR
2
32
111
@PastaFork
Aviel Warschawski
6 years
Great heap challenges at #36c3 (including a few zero days in the Qt JavaScript engine). Thank you @hxpctf!
5
1
16
@hxpctf
hxp
6 years
#36c3 CTF is over after 48h of hardcore hacking, great performance from all teams, we are seriously impressed!
0
6
25
@GoogleVRP
Google VRP (Google Bug Hunters)
6 years
CTF players, bug hunters and students descended onto London to play, hack and learn. Congrats to @pastenctf for winning - again! :) #googlectf #initg
9
36
188
@StackSmashing
Thomas Roth
6 years
Super excited to finally release SVD-Loader for Ghidra: A tool to make bare-metal ARM firmware reverse-engineering much easier by automatically annotating all peripherals - for over 650 different microcontrollers! https://t.co/Y9IHKQ0kva
11
271
698
@Oranav
Oran
7 years
This is exactly how we solved the challenge. It's crazy that two teams independently solved the challenge with a CPU bug. I wanted to write a write-up earlier but I've been lazy :( Nevertheless this posts pretty much sums it up. Worth reading! https://t.co/2vRn4erEzK
blog.ret2.io
Over the past several years, we have watched the Capture The Flag circuit mature in both complexity and creativity. The best CTF’s strive to push the envelop...
0
18
55
@gynvael
Gynvael Coldwind
7 years
#GoogleCTF is over - congratz to @pastenctf, @DragonSectorCTF and @p4_team, and all the other teams that qualified for the finals! :) GG WP
1
18
117
@jifa
Shahar Tal
7 years
Great competition as always 😎 Proud of my team members who participated, playing for pasten and cellebr0s 💪💪
@EatSleepPwnRpt
Eat Sleep Pwn Repeat
7 years
#35c3ctf is over! Flag submission is closed - Good game everyone! Top 3 #35c3ctf: 1. KJC+MHackeroni 2. @pastenctf 3. @DragonSectorCTF Top 3 #junior35c3ctf: 1. Made in MIM 2. sno 3. ZenHack
0
1
8
@_niklasb
Niklas B
7 years
"ROP write to stack: worked 2000 years ago, and still works today". Also works for the "pwndb" challenge which was finally solved by pasten (probably due to @AmarSaar's doing?) after it withstood 126 hours of CTF (WCTF 2017, 34C3CTF, and 42 hours into 35C3CTF)
@c3voc_releases
c3voc_releases
7 years
Modern Windows Userspace Exploitation has been released on https://t.co/NWTIGxyqR7 and YouTube https://t.co/CwtDueMNKv
3
22
98
@AmarSaar
Saar Amar
7 years
Everybody knows researching Hyper-V is the most fun thing you can do, so I wrote a blog post about how to start doing just that! Let me know what you think && if you find any 0days of course :)
7
328
704
@BlueHatIL
BlueHat IL
8 years
Loved @BsidesTLV and want more Israeli cyber talks? Join our VBS meetup with the one and only @AmarSaar https://t.co/ftdGJqexF9
Tweet card summary image
bing.com
Few creatures evoke the magic of the holidays quit
0
7
24
@BlueHatIL
BlueHat IL
8 years
@AmarSaar is coming to our meetup to talk about Virtualization-based security (VBS) - Internals and potential attack surface. You should be there. https://t.co/ftdGJpWWgz
0
6
20