Numb3rs
@numbrs
Followers
269
Following
2K
Media
3
Statuses
39
doing cool things such as opening files with nano
Joined April 2021
🎄 New Root-Xmas Challenge 🎄 ✨Today, heap your skills and parse your way through Santa’s picture-perfect surprises! 📌Submitted by : Numb3rs 🔗Details & participation here: https://t.co/a9mhshchcy Good luck to you all !🎅
0
1
3
Dug into a custom router protocol for fun. Turned out to be: type confusion + command injection = RCE 🎉 Full write-up here: 📎 https://t.co/mYvOqLtGah
numb3rs.re
Introduction In parallel with my main activity, I recently started a side project to look for vulnerabilities in a range of consumer routers. It turns out that while mapping the attack surface, I...
0
0
2
You just got a black box target and zero context. Where do you even begin? Here’s my take after two years in vuln research - what actually matters, and what’s just noise 👇 https://t.co/qtX4QJyc8c
numb3rs.re
I’ve been consulting in vuln research for ~2 years. When I started - I was 16 at the time, I landed on a platform I knew only from CTFs, with little professional VR experience. I worked 10 am.–3 am.,...
0
16
98
Squirrel Sandbox Escape: I'm publishing my VR journal for a 1day I was curious about for years now. I have around six days of raw footage: from initial analysis all the way to PC takeover, so there should be more episodes coming soon :^) Link: https://t.co/9JKlBPTfhI
3
20
85
hi, just wrote my first post on the exploitation of a random github VM, let me know what you think :) https://t.co/C6HHAx4zXM
numb3rs.re
Recently I’ve become a bit fed up with CTF’s and wanted to test my skills on real targets. I tried finding bugs in popular softwares such as Filezilla but I hit the wall every single time. Instead of...
3
17
73
Ravi de partager ma qualification pour l'équipe de France !
📢Découvrez la sélection de la #TeamFrance2024 ! 🇫🇷 Les joueurs défendront nos couleurs lors de la prochaine édition de l'#ECSC2024 à Turin, en Italie. 🔔Rendez-vous du 7 au 11 octobre 2024.
0
0
17
To conclude the tale of CVE-2023-2163 here is the exploit https://t.co/0WQyLKK0Uj Thanks again @chompie1337 for her amazing RCA and her other ebpf research @meadori For his amazing engineering feedback and also amazing help with RCA @scannell_simon For his original research!
6
47
135
New article: Exploring Grey-Box Fuzzing of Closed-Source Windows Binaries ! =>
bushido-sec.com
This article delves into the concept of grey-box fuzzing, focusing on testing closed-source Windows binaries. Grey-box fuzzing allows vulnerability researchers to discover undiscovered vulnerabilit...
3
111
286
Congratulations to all participating teams for the PwnMe finals. @redrocket_ctf congrats you were great! The fight was incredible, until the last minute between Polyflag and @WreckTheLine. It was great spending time IRL with the best 🇪🇺 teams. Let's do it again next year!
1
13
35
Le #FCSC2023 a pris fin hier soir et j'ai fini 2 ème dans la catégorie Pwn Junior et 10 ème dans le classement général junior. Merci beaucoup aux organisateurs du CTF, qui comme tous les ans ont fait un CTF de qualité supérieur. Mes writeups: https://t.co/g01GPSWehQ
3
3
19
Let's read my first post and give me your opinion !! https://t.co/S6f2ZAfZNF
trikkss.github.io
Windows API Hashing is a technique often used by malware developers to hide their calls to the windows API.
9
60
196
Merci beaucoup à l’orga je suis grave content d’avoir gagné le premier prix
🥉🥈🥇 CSAW'22 Europe : Bravo aux gagnants de l'épreuve Lycéens Red Team Competition !!! 👏👏👏 1er prix : Tourist 2ème prix : LAMHack 3ème prix : St Barth's goin2 Valence Merci aux organisateurs de l'épreuve : Quentin GIORGI, avec @krhacken et @rootme_org
#CSAW
3
6
15