Worty
@_Worty
Followers
3K
Following
4K
Media
24
Statuses
1K
Organizer of @HeroCTF || ctf w/ @FlatNetworkOrg || TeamFR 2021, 2022 & 2025 🇫🇷 || 🥷 @Synacktiv
Joined March 2020
github.com
Challenge pour leHack 2025. Contribute to tr4l/leHack-2025 development by creating an account on GitHub.
We disclosed two new RSC vulnerabilities: - Denial of Service (High): CVE-2025-55184 - Source Code Exposure (Medium): CVE-2025-55183 Patches are available now, please update immediately. https://t.co/0VDQ5HYg2q
2
16
157
🎉The #GreHack25 CTF has come to a close! We hope everyone enjoyed the challenges and had a great time testing their skills. Huge congratulations to all participants for diving in, and a special shout-out to the top 4 teams for their performance! We hope you enjoy the prizes 🏆
2
3
12
This weekend for @HeroCTF i made two web challenges, one related to Tomcat examples and the other one deals with chrome RCE through a file write primitive. If you're interested you can read my writeups here: https://t.co/BNfooKdluj
https://t.co/BNfooKdluj Ggs to all players !
0
9
30
@dfsec_com @Synacktiv @DGA @epieos @AKAILABS_FR Challenge creators: @L0g__s
@xanhacks
@Thxb35
@0xItarow
@alol_re
@25kgoldn
@0xThaz
@_Worty
0
2
11
🎉 HeroCTF v7 is over — GG! 4,200 players • 0 ms downtime 🚀 Thanks to our sponsors (@dfsec_com , @Synacktiv , @DGA, @epieos , @AKAILABS_FR) and to all challenge creators 🙌 Write-ups are available here : https://t.co/REtRMhsUDV See you next time!
github.com
Challenges of the HeroCTF v7 edition. . Contribute to HeroCTF/HeroCTF_v7 development by creating an account on GitHub.
2
8
22
🚀 Tonight. We go live. HeroCTF v7 is ready: infra up, challenges shipped, scoreboard clean. Join the hunt → https://t.co/hSjy0HMdrO GL & HF! 🏴☠️ #HeroCTF #CTF #cybersecurity #infosec
0
5
10
just dropped part 2 of the android bug bounty series (っ'ヮ'c) cool recon methodology from apk dl & extraction to finding hidden endpoints, misconfigs, and hardcoded secrets - basically things you do before even firing up dynamic analysis & burp https://t.co/9kW4gwmnGO
yeswehack.com
An in-depth Bug Bounty guide to performing reconnaissance on Android apps – from extracting APKs to mapping endpoints, secrets and vulnerable components.
1
23
114
You’ll know how to build an Android #BugBounty lab if you read the first article in our Android hacking series 📱 Part two has now landed: an in-depth guide to performing recon on your mobile targets! 👇 https://t.co/g8rqa9bkHz
yeswehack.com
An in-depth Bug Bounty guide to performing reconnaissance on Android apps – from extracting APKs to mapping endpoints, secrets and vulnerable components.
3
26
115
Check out our new advisory, where @_worty shows how he managed to take control of an #EticTelecom router, gaining root access💪 🗞️⬇️ https://t.co/CpVfZQoua7
synacktiv.com
Etic Telecom IPL-DAC-400-LE - Multiple vulnerabilities
0
7
35
In the latest episode of #TalkiePwnii, @pwnwithlove kicks off a brand-new Android hacking series! 📱 Learn how to set up Genymotion, Android Studio and the essential tools to start hunting on mobile. Ready? 👇 #BugBountyTips #YesWeRHackers
https://t.co/2iQTDnyY0p
0
6
57
All the the talks recordings are available on YouTube: - NTLM reflection: https://t.co/TOhsICqfFy - LOLBlue: https://t.co/kxORCKCGfK - Livewire unmarshalling: https://t.co/fGN6Bf2f1k - Post-quantum cryptography:
0
8
24
💣 We caught @ycombinator–backed @gecko_sec stealing two of our CVEs, one on @ollama , one on @Gradio. They copied our PoCs, claimed CVE IDs, and even back-dated their blog posts. Here’s the full story 👇
26
128
851
#ECSC2025 | 🐓 La compétition s'intensifie en ce deuxième et dernier jour ! 🥊 La @ECSC_TeamFrance et ses adversaires s'affrontent aujourd'hui sur des épreuves d'attaque et défense. 🧠 L'atout de l'équipe : sa résilience.
3
9
39
#ECSC2025 | 🐓 Premier jour de compétition ! ⌨ Aujourd'hui, les équipes s'affrontent sur des épreuves en mode jeopardy : crypto, reverse, pwn, web, forensics, hardware… 🧠 L'atout de la #TeamFrance : la complémentarité des compétences de ses joueurs.
0
13
57
#ECSC2025 | 🐓 Nous y sommes ! 🇵🇱 La #TeamFrance, accompagnée des coachs de l'ANSSI, est arrivée à Varsovie, prête à relever les épreuves de l'European Cybersecurity Challenge. 📅 Au programme aujourd'hui : découverte des postes de travail des équipes et cérémonie d'ouverture.
3
28
94
[MERCH] - Récupération du merch : De maintenant au vendredi 10 oct. 12:00, et du lundi 13 oct. au vendredi 17 oct. 12:00 - S'adresser à MH ou pwnii - Vozec pour la semaine (du 13 au 17) Pour les externes à l'ESNA, envoyez nous un DM twitter. Plus d'info sur discord.
0
1
4
We just released a new article on how we hacked with @adnanthekhan the npm Supply Chain of 36 Million Weekly Installs 🔥 🔗Link: https://t.co/CEvO7NSHQw
6
42
188
In our new blogpost, @noraj_rawsec shows how one can abuse Unicode characters to bypass filters and abuse shell globbing, regexp, HTTP query parameters or WAFs when #MySQL strict SQL mode is off 👇 https://t.co/2Omr4hcX6Q
synacktiv.com
What could go wrong when MySQL strict SQL mode is off?
0
14
47
[INFO] L'association ESN'HACK a changé de bureau pour l'année 2025-2026. Prochainement, beaucoup de choses vont changer. Toutes les informations seront sur https://t.co/zKMpgfraXn.
0
3
5