Aviel Warschawski
@PastaFork
Followers
276
Following
86
Media
1
Statuses
30
Security researcher during the day. @pastenctf team member at night.
Joined August 2017
Registration is now open! https://t.co/UYnL1xjpnR *Limited seats are available and participation approvals will be sent as we approach the event.*
0
8
19
I'm heading to DEFCON & BlackHat in Vegas this week. If you're into iOS or Android vulnerability research, let's connect and meet-up.
4
3
31
WHO SHOULD PLAY @HACKERJEOPARDY? THE TOP TWO TEAMS PLAY. THE BOTTOM TWO DO NOT. #DFIU @defcon #D3FC0N
2
10
18
hxp CTF 2021 is over! Congratulations to @pastenctf, @0rganizers, @SuperGuesser, and everyone else! 🎉 thx 4 many gr8 hacks 🪓
2
12
76
After some crazy last-minute flag submissions, hxp CTF 2020 is over! Congratulations to @pastenctf, Spatenbräu, and perfect guesser! 🎉
3
12
74
I published a write-up for md15 from @hxpctf 36C3 CTF: https://t.co/oX0Hl8x3VR
2
32
111
CTF players, bug hunters and students descended onto London to play, hack and learn. Congrats to @pastenctf for winning - again! :) #googlectf #initg
9
36
188
Super excited to finally release SVD-Loader for Ghidra: A tool to make bare-metal ARM firmware reverse-engineering much easier by automatically annotating all peripherals - for over 650 different microcontrollers! https://t.co/Y9IHKQ0kva
11
271
698
This is exactly how we solved the challenge. It's crazy that two teams independently solved the challenge with a CPU bug. I wanted to write a write-up earlier but I've been lazy :( Nevertheless this posts pretty much sums it up. Worth reading! https://t.co/2vRn4erEzK
blog.ret2.io
Over the past several years, we have watched the Capture The Flag circuit mature in both complexity and creativity. The best CTF’s strive to push the envelop...
0
18
55
#GoogleCTF is over - congratz to @pastenctf, @DragonSectorCTF and @p4_team, and all the other teams that qualified for the finals! :) GG WP
1
18
117
Great competition as always 😎 Proud of my team members who participated, playing for pasten and cellebr0s 💪💪
#35c3ctf is over! Flag submission is closed - Good game everyone! Top 3 #35c3ctf: 1. KJC+MHackeroni 2. @pastenctf 3. @DragonSectorCTF Top 3 #junior35c3ctf: 1. Made in MIM 2. sno 3. ZenHack
0
1
8
"ROP write to stack: worked 2000 years ago, and still works today". Also works for the "pwndb" challenge which was finally solved by pasten (probably due to @AmarSaar's doing?) after it withstood 126 hours of CTF (WCTF 2017, 34C3CTF, and 42 hours into 35C3CTF)
Modern Windows Userspace Exploitation has been released on https://t.co/NWTIGxyqR7 and YouTube https://t.co/CwtDueMNKv
3
22
98
Everybody knows researching Hyper-V is the most fun thing you can do, so I wrote a blog post about how to start doing just that! Let me know what you think && if you find any 0days of course :)
7
328
704
Loved @BsidesTLV and want more Israeli cyber talks? Join our VBS meetup with the one and only @AmarSaar
https://t.co/ftdGJqexF9
bing.com
Few creatures evoke the magic of the holidays quit
0
7
24
@AmarSaar is coming to our meetup to talk about Virtualization-based security (VBS) - Internals and potential attack surface. You should be there. https://t.co/ftdGJpWWgz
0
6
20