_Worty Profile Banner
Worty Profile
Worty

@_Worty

Followers
3K
Following
4K
Media
24
Statuses
1K

Organizer of @HeroCTF || ctf w/ @FlatNetworkOrg || TeamFR 2021, 2022 & 2025 🇫🇷 || 🥷 @Synacktiv

Joined March 2020
Don't wanna be here? Send us removal request.
@kevin_mizu
Kévin GERVOT (Mizu)
3 days
Tweet card summary image
github.com
Challenge pour leHack 2025. Contribute to tr4l/leHack-2025 development by creating an account on GitHub.
@reactjs
React
3 days
We disclosed two new RSC vulnerabilities: - Denial of Service (High): CVE-2025-55184 - Source Code Exposure (Medium): CVE-2025-55183 Patches are available now, please update immediately. https://t.co/0VDQ5HYg2q
2
16
157
@GrehackConf
GreHack
13 days
🎉The #GreHack25 CTF has come to a close! We hope everyone enjoyed the challenges and had a great time testing their skills. Huge congratulations to all participants for diving in, and a special shout-out to the top 4 teams for their performance! We hope you enjoy the prizes 🏆
2
3
12
@_Worty
Worty
14 days
This weekend for @HeroCTF i made two web challenges, one related to Tomcat examples and the other one deals with chrome RCE through a file write primitive. If you're interested you can read my writeups here: https://t.co/BNfooKdluj https://t.co/BNfooKdluj Ggs to all players !
0
9
30
@HeroCTF
HeroCTF
14 days
🎉 HeroCTF v7 is over — GG! 4,200 players • 0 ms downtime 🚀 Thanks to our sponsors (@dfsec_com , @Synacktiv , @DGA, @epieos , @AKAILABS_FR) and to all challenge creators 🙌 Write-ups are available here : https://t.co/REtRMhsUDV See you next time!
github.com
Challenges of the HeroCTF v7 edition. . Contribute to HeroCTF/HeroCTF_v7 development by creating an account on GitHub.
2
8
22
@HeroCTF
HeroCTF
17 days
🚀 Tonight. We go live. HeroCTF v7 is ready: infra up, challenges shipped, scoreboard clean. Join the hunt → https://t.co/hSjy0HMdrO GL & HF! 🏴‍☠️ #HeroCTF #CTF #cybersecurity #infosec
0
5
10
@pwnwithlove
pwnii
17 days
just dropped part 2 of the android bug bounty series (っ'ヮ'c) cool recon methodology from apk dl & extraction to finding hidden endpoints, misconfigs, and hardcoded secrets - basically things you do before even firing up dynamic analysis & burp https://t.co/9kW4gwmnGO
Tweet card summary image
yeswehack.com
An in-depth Bug Bounty guide to performing reconnaissance on Android apps – from extracting APKs to mapping endpoints, secrets and vulnerable components.
1
23
114
@yeswehack
YesWeHack ⠵
18 days
You’ll know how to build an Android #BugBounty lab if you read the first article in our Android hacking series 📱 Part two has now landed: an in-depth guide to performing recon on your mobile targets! 👇 https://t.co/g8rqa9bkHz
Tweet card summary image
yeswehack.com
An in-depth Bug Bounty guide to performing reconnaissance on Android apps – from extracting APKs to mapping endpoints, secrets and vulnerable components.
3
26
115
@Synacktiv
Synacktiv
1 month
Check out our new advisory, where @_worty shows how he managed to take control of an #EticTelecom router, gaining root access💪 🗞️⬇️ https://t.co/CpVfZQoua7
Tweet card summary image
synacktiv.com
Etic Telecom IPL-DAC-400-LE - Multiple vulnerabilities
0
7
35
@yeswehack
YesWeHack ⠵
1 month
In the latest episode of #TalkiePwnii, @pwnwithlove kicks off a brand-new Android hacking series! 📱 Learn how to set up Genymotion, Android Studio and the essential tools to start hunting on mobile. Ready? 👇 #BugBountyTips #YesWeRHackers https://t.co/2iQTDnyY0p
0
6
57
@Synacktiv
Synacktiv
2 months
All the the talks recordings are available on YouTube: - NTLM reflection: https://t.co/TOhsICqfFy - LOLBlue: https://t.co/kxORCKCGfK - Livewire unmarshalling: https://t.co/fGN6Bf2f1k - Post-quantum cryptography:
0
8
24
@Synacktiv
Synacktiv
2 months
Still at @hack_lu, @_remsio_ and @_Worty shared their research on Livewire's unmarshalling mechanism. They demonstrated how to achieve RCE with the APP_KEY and extended their laravel-crypto-killer tool to automate the process. 💪
0
2
8
@FuzzingLabs
FuzzingLabs
2 months
💣 We caught @ycombinator–backed @gecko_sec stealing two of our CVEs, one on @ollama , one on @Gradio. They copied our PoCs, claimed CVE IDs, and even back-dated their blog posts. Here’s the full story 👇
26
128
851
@ANSSI_FR
ANSSI
2 months
#ECSC2025 | 🐓 La compétition s'intensifie en ce deuxième et dernier jour ! 🥊 La @ECSC_TeamFrance et ses adversaires s'affrontent aujourd'hui sur des épreuves d'attaque et défense. 🧠 L'atout de l'équipe : sa résilience.
3
9
39
@ANSSI_FR
ANSSI
2 months
#ECSC2025 | 🐓 Premier jour de compétition ! ⌨ Aujourd'hui, les équipes s'affrontent sur des épreuves en mode jeopardy : crypto, reverse, pwn, web, forensics, hardware… 🧠 L'atout de la #TeamFrance : la complémentarité des compétences de ses joueurs.
0
13
57
@ANSSI_FR
ANSSI
2 months
#ECSC2025 | 🐓 Nous y sommes ! 🇵🇱 La #TeamFrance, accompagnée des coachs de l'ANSSI, est arrivée à Varsovie, prête à relever les épreuves de l'European Cybersecurity Challenge. 📅 Au programme aujourd'hui : découverte des postes de travail des équipes et cérémonie d'ouverture.
3
28
94
@esnhack
ESN'HACK
2 months
[MERCH] - Récupération du merch : De maintenant au vendredi 10 oct. 12:00, et du lundi 13 oct. au vendredi 17 oct. 12:00 - S'adresser à MH ou pwnii - Vozec pour la semaine (du 13 au 17) Pour les externes à l'ESNA, envoyez nous un DM twitter. Plus d'info sur discord.
0
1
4
@0xLupin
Lupin
2 months
We just released a new article on how we hacked with @adnanthekhan the npm Supply Chain of 36 Million Weekly Installs 🔥 🔗Link: https://t.co/CEvO7NSHQw
6
42
188
@Synacktiv
Synacktiv
2 months
In our new blogpost, @noraj_rawsec shows how one can abuse Unicode characters to bypass filters and abuse shell globbing, regexp, HTTP query parameters or WAFs when #MySQL strict SQL mode is off 👇 https://t.co/2Omr4hcX6Q
Tweet card summary image
synacktiv.com
What could go wrong when MySQL strict SQL mode is off?
0
14
47
@esnhack
ESN'HACK
2 months
[INFO] L'association ESN'HACK a changé de bureau pour l'année 2025-2026. Prochainement, beaucoup de choses vont changer. Toutes les informations seront sur https://t.co/zKMpgfraXn.
0
3
5