
Nobody Isnobody
@_Nobodyisnobody
Followers
312
Following
30
Media
10
Statuses
68
hacker, researcher, ctf player with Water Paddler & Blue Water, traveller...
Somewhere over the rainbow
Joined April 2022
This week-end we played a bit corCTF with Water Paddler. The quality of the challenges was great. Here is a write-up for one of them named: tua-cugina-systems. (it had only 3 solves during the ctf and was tricky-tricky. ).
github.com
Write-ups for various CTF. Contribute to nobodyisnobody/write-ups development by creating an account on GitHub.
0
5
41
RT @Water_Paddler: 🥈 Thrilled to nab 2nd as Blue Water, teamed up with @perfect_blue at DEFCON CTF Final 33!. 🙌 Congrats to @mmm_ctf_team….
0
9
0
RT @cor_ctf: We are back😎 Say hello to our kernelCTF submission for CVE-2025-37752🩸. Who would have thought you could pwn a kernel with jus….
syst3mfailure.io
CVE-2025-37752 is an Array-Out-Of-Bounds vulnerability in the Linux network packet scheduler, specifically in the SFQ queuing discipline. An invalid SFQ limit and a series of interactions between SFQ...
0
55
0
RT @_MatteoRizzo: Our newest research project is finally public! We can load malicious microcode on Zen1-Zen4 CPUs!.
github.com
### Summary Google Security Team has identified a security vulnerability in some AMD Zen-based CPUs. This vulnerability allows an adversary with local administrator privileges (ring 0 from outside...
0
285
0
results of halfnarp are here! schedule for 38C3 --> so much interesting talks this year ☠️ .will need to clone myself to assist half of them. .
0
0
5
RT @FREE_WiLi_: @defcon 32 badge powered by @Raspberry_Pi Pico 2 #RP2350 has similar features to the @FREE_WiLi_ hardware. To promote FREE-….
0
13
0
RT @Water_Paddler: The first ever💦CTF! Crafted with❤️by CTF players for CTF players. Spoiler🚨! Here is list of the brilliant🧠behind the cha….
0
11
0
RT @rootme_org: Get ready to take control! 🛡️. 4 new challenges are now available in the App-System (pwn) category, and they're sure to put….
0
5
0
RT @PierreKimSec: 40 vulnerabilities in Toshiba Multi-Function Printers #RCE.
0
5
0
RT @BrunoModificato: New job research :. 1) Check how Lavamoat can protect someone from supply chain attacks.2) A bypass on lavapack. And s….
0
8
0
RT @_simo36: I've audited the Android kernel in late 2023, and reported 10+ kernel bugs to Google, along with 2 exploits. Today, I'm releas….
github.com
Android 14 kernel exploit for Pixel7/8 Pro. Contribute to 0x36/Pixel_GPU_Exploit development by creating an account on GitHub.
0
264
0
bi0sCTF.2024 is finished , it has some really good challenges in pwn. Here is a write-up for Virtio-note, a nice qemu escape challenge written by k1r4.
2
7
49
RT @AzakaSekai_: #threatintel.someone just leaked a bunch of internal Chinese government documents on GitHub.
github.com
Contribute to I-S00N/I-S00N development by creating an account on GitHub.
0
3K
0
RT @dicegangctf: DiceCTF 2024 Quals has ended! See you in NYC 🗽! Congratulations to:.🥇 Blue Water (@pb_ctf @Water_Paddler).🥈 @0rganizers .🥉….
0
16
0
RT @_riatre: Qualys sent this to oss-sec: It's interesting that competitive programming community just treats this….
0
3
0
RT @qualys: The Qualys Threat Research Unit (TRU) has recently unearthed four significant vulnerabilities in the #GNU C Library, a cornerst….
blog.qualys.com
The Qualys Threat Research Unit (TRU) has recently unearthed four significant vulnerabilities in the GNU C Library, a cornerstone for countless applications in the Linux environment.
0
35
0
RT @_bcoles: Nice #KASLR break by @p1k4l4 for x86_64 kernels with Xen support (Debian and Ubuntu by default). Xen symbols are included in….
github.com
0
7
0
RT @pb_ctf: 2023 was another great year for the team! 🎉. Blue Water, a collab between perfect blue and @Water_Paddler, placed 1st in CTFtim….
0
15
0
How to create a qemu SYS_BUS device driver for arm virt machine in 5 minutes (or maybe less ??). here is the answer of this question:.
0
3
18