
SIGFLAG
@SIGFLAG_CTF
Followers
184
Following
77
Media
22
Statuses
55
CTF Team of @jkulinz
Linz, Österreich
Joined March 2017
RT @We_0wn_Y0u: We played @MidnightSunCTF this weekend and took 1st place as a merged team with @LosFuzzys and @SIGFLAG_CTF! .Excited to me….
0
6
0
RT @blu3r4y_at: Peak from #glacierctf was a challenge with three ingredients: (1) An XSS vulnerability, but with (2) a strict CSP that made….
0
1
0
RT @LosFuzzys: 9th place at SaarCTF together as KuK Hofhackerei with @SIGFLAG_CTF.@We_0wn_Y0u @TeamAustriaECSC. and more!.Thanks @saarsec f….
0
8
0
Learn a few things about ext4 and Java decompilation in a new blog post by our teammate Robert on the recently released @sadservers_com SRE/DevOps challenges Kihei and Belo Horizonte
0
0
3
Big shout-out to @daho_at for being the first one in our team to get into the CVE index! ;).
CTFs can result in real-world improvements like this year's pbctf. The result: CVE-2023-25825 ( found by @SIGFLAG_CTF on @zoneminder.
0
0
2
New audio data decoding write-up by our team mate Daniel on decompressme-2 from pbctf 2023 @pb_ctf
0
0
3
New blog post by our teammate Robert on the recently released @sadservers_com SRE/DevOps challenges Pokhara and Roseau
0
0
2
Let's kick-off 2023 with a comprehensive write-up by Robert Führicht on the @sadservers_com SRE/DevOps challenges
0
0
4
RT @InfoSecIITR: And Backdoor CTF 2022 comes to an end! Congrats to the winning teams 🎉.#Drovosec, @BlackB6a, @SIGFLAG_CTF .Thanks everyone….
0
3
0
Want to play some CTFs in the upcoming weeks? Join SIGFLAG on-site in Linz when we participate in #HITCONCTF2022 (26.11, today), do a TryHackMe beginner session (07.12) or attend the bi0sctf (17.12) - details at
0
2
0
THANKS to 100+ hackers that visited our BECOME A HACKER workshop today! This was AMAZING! Shoutout to Jürgen Weiss from ARES CI & @Dynatrace & @epunkt_com for sponsoring us. See you at the next competition!
1
9
20
RT @FemaleCodersLnz: We are looking forward to our very first hackathon! It will take place on September 17th in the GRAND GARAGE at the Ta….
0
2
0
RT @blu3r4y_at: Even an up-to-date #log4j 2.17.2 didn't stop us from extracting secrets from the environment. Read how we used a ReDoS side….
0
82
0
RT @blu3r4y_at: Had a lot of fun escaping the maze on the final day of @OverTheWireCTF - check out my write-up if you are curious https://t….
0
2
0
Merry Christmas everyone! As a special we play the Musical Stegano challenge from @OverTheWireCTF on real synthesizers. Enjoy! :)
0
2
3
#ructfe2019 was a great pleasure! Thanks to @RuCTFE ! And here is the write-up for the single flag in engine that we stole from NARF! ;)
1
1
9
RT @jkulinz: Informatik-Studierende der JKU @SIGFLAG_CTF und der FH Hagenberg qualifizierten sich für das Finale des internationalem „Hack….
0
7
0