intrigus Profile
intrigus

@intrigus_

Followers
243
Following
386
Media
34
Statuses
473

I create and break stuff. GitHub ⭐. @KITCTF. #Java, #CodeQL and #V8. Github: https://t.co/2eJKNdhQaV Security stuff: https://t.co/eg564HmccR

Deutschland
Joined November 2015
Don't wanna be here? Send us removal request.
@intrigus_
intrigus
3 years
I‘m now on Mastodon as well, you can add me at @intrigus@infosec.exchange.
0
0
1
@intrigus_
intrigus
19 days
Really enjoyed this year's Google CTF together with @fluxfingers. Especially the pwn "Unicornel TrustZone" challenge was nice. Writeup soonish 😀.
@KITCTF
KITCTF
19 days
We had a lot off fun playing this year's Google CTF in a spontaneous merger with @fluxfingers.Somehow we qualified for the finals 🎉. Thank you for such a great CTF @GoogleVRP .GG to all teams and see you in Mexico!
Tweet media one
1
0
16
@intrigus_
intrigus
2 months
RT @KITCTF: Hey, GPN CTF is back!. Can you break the CTF monopoly? The only property worth owning is the top spot on our CTF leaderboard. '….
0
3
0
@intrigus_
intrigus
2 months
Last year I played Realworld CTF and solved "Protected by JavaSE" together with I-Al-Istannen. We exploited XXE in @github's CodeQL using the unintended CVE-2024-25129. I wrote about the (un)intended solution and how to use CodeQL to find bugs in CodeQL 😂.
0
11
41
@intrigus_
intrigus
3 months
When you look at a CVE's patch for more than a few seconds and get a new CVE for free :sigh:.
0
0
1
@intrigus_
intrigus
3 months
(3/3).In the end, all you have to do is to change a single stack pointer move and `nop` a loop and go from the right image to the far better left image 🎉. I've also written about this in a bit more detail:.
Tweet media one
Tweet media two
0
0
1
@intrigus_
intrigus
3 months
(2/3).I was playing DEFCON CTF Quals last week and the `loader` binary of the `callmerust` challenge had some not so pretty decompilation so I chose to investigate and fix it.
1
0
0
@intrigus_
intrigus
3 months
(1/3).Stack probing (to protect against stack clash attacks) in binaries leads to not so pretty decompilation in @NSAGov's Ghidra and @vector35's Binary Ninja, but there is an easy fix 🥳.
1
0
0
@intrigus_
intrigus
4 months
GitHub's award that recognizes my contributions to open source security through my various workshops and my tireless help with people learning CodeQL or just answering their questions (plus some very nice swag) has arrived 🥳
Tweet media one
@intrigus_
intrigus
9 months
Woah, I totally didn't expect this 😯.I wouldn't be where I'm now without the help of @HauwaOtori, @XCorail and @nicowaisman to name just three. Thank you for bringing me to GitHub+SF, encouraging me to do my first conference talk and letting a random run queries on ALL of lgtm.
1
0
8
@intrigus_
intrigus
5 months
RT @KITCTF: This Thursday, @intrigus_ will present the results of his master's thesis on bounded verification of the range analysis in v8's….
0
1
0
@intrigus_
intrigus
5 months
Really excited for this one!.
@KITCTF
KITCTF
5 months
This Thursday, we're excited to have @momo5502 give us a deep dive into Windows user-space emulation. As always, 7pm -120, 50.34
Tweet media one
0
0
0
@intrigus_
intrigus
9 months
Woah, I totally didn't expect this 😯.I wouldn't be where I'm now without the help of @HauwaOtori, @XCorail and @nicowaisman to name just three. Thank you for bringing me to GitHub+SF, encouraging me to do my first conference talk and letting a random run queries on ALL of lgtm.
@GHSecurityLab
GitHub Security Lab
9 months
Congratulations to Simon Gerst (@intrigus_) for winning the 2024 Supply Chain Sentinel award! 🎉 Your dedication to securing the open-source ecosystem is truly inspiring. Thank you for all your hard work and contributions! #GitHubAwards2024 #OSSecurity.
2
1
11
@intrigus_
intrigus
1 year
RT @KITCTF: Join us this Thursday, when @ju256_ will talk about how to escape V8's new heap sandbox. As always: 7pm -120, 50.34.
0
1
0
@intrigus_
intrigus
1 year
RT @KITCTF: GPN CTF starts in less than two days 😲 but don't worry, we made sure you will have a banger CTF experience ᯓ★🎧. Start Fri, 10am….
0
5
0
@intrigus_
intrigus
1 year
RT @BlazingWindSec: Learn to audit applications for vulnerabilities with CodeQL and find them in thousands of GitHub repositories at once.….
0
11
0
@intrigus_
intrigus
1 year
RT @KITCTF: After learning how to reverse engineer binaries, @intrigus_ and Lennard will continue on this Thursday with an introduction on….
0
2
0
@intrigus_
intrigus
1 year
RT @KITCTF: We played at @redrocket_ctf's @CyberSecRumble and got 8th place internationally and 2nd in Germany! Looking forward to meet you….
0
2
0
@intrigus_
intrigus
1 year
RT @KITCTF: Listen up! Can you hear the sound of flags? We are composing another edition of GPN CTF. There will be some banger challenges.….
0
1
0
@intrigus_
intrigus
1 year
RT @GHSecurityLab: FROM code SELECT vulnerability! Grab a spot for @intrigus_'s CodeQL workshop at @nullcon Berlin this Friday. Without pri….
0
9
0
@intrigus_
intrigus
1 year
Want to know how to reverse engineer a Mach-O binary that breaks all tools?.Checkout my writeup for the "Injecting commands" challenge from Braeker CTF 2024!.
0
2
4
@intrigus_
intrigus
1 year
RT @nullcon: An interesting workshop by @intrigus_ at #NullconBerlin2024. 🔹 Use #CodeQL libraries for C/C++.🔹 Learn to build, structure que….
0
4
0