pr0cf51 Profile Banner
pr0cf5 Profile
pr0cf5

@pr0cf51

Followers
2K
Following
2K
Media
40
Statuses
2K

CS @ @GeorgiaTech, AIxCC w/ @TeamAtlanta24 ex. KAIST GoN 18, @SuperGuesser @osec_io

/proc
Joined April 2019
Don't wanna be here? Send us removal request.
@hackyboiz
hackyboiz
1 day
[Research] smart contracts auditing 101 for pwners - PART 1 (EN) https://t.co/NKVMl4qYLq Hello, this is d4tura. In this research post, I summarize the core concepts required to solve the smart contract wargame "Damn Vulnerable DeFi." From the perspective of a 'pwner' more
Tweet media one
0
19
132
@pashovkrum
pashov
2 days
All web3 security researchers should read this 10/10 report on all web3 security incidents in 2024 and stats around them. Great job by @ChainLight_io. Read below๐Ÿ‘‡ https://t.co/rxtn8n4dQO
Tweet media one
18
65
370
@Hesamation
โ„ฮตsam
6 days
a senior engineer at google just dropped a 400-page free book on docs for review: agentic design patterns. the table of contents looks like everything you need to know about agents + code: > advanced prompt techniques > multi-agent patterns > tool use and MCP > you name it
Tweet media one
65
1K
10K
@dawnseclab
DawnSecurityLab
13 days
Checkout this open-sourced handy MCP server for JEB decompiler by us: https://t.co/LXSEFtSbFx . Contributions and use cases are always welcomed.
Tweet card summary image
github.com
Contribute to flankerhqd/jebmcp development by creating an account on GitHub.
1
7
41
@TeamAtlanta24
Team Atlanta
19 days
โšก Going beyond the baseline, we forked Jazzer with LibAFL to push Java fuzzing further under AIxCC pressure โ€” lessons learned. ๐Ÿ‘‰ https://t.co/PF1XQow9rs #AIxCC #Cybersecurity #CTF #AI #LLM #GenAI #AICyberChallenge #DARPA #DEFCON #Security #Vulnerability
Tweet card summary image
team-atlanta.github.io
How we incorporated LibAFL as a new fuzzing backend for Jazzer
1
14
47
@DeFiHackLabs
DeFiHackLabs
20 days
HITCON CTF 2025 Date: UTC 08/22 14:00 ~ 08/24 14:00 https://t.co/QDdiyGlv3y Thanks to @vinami from DeFiHackLabs for creating the web3 challenges for HITCON.
Tweet card summary image
ctf2025.hitcon.org
Online Jeopardy, Jul 12-14 2024
0
3
11
@pr0cf51
pr0cf5
25 days
This is just the beginning, more technical stuff coming up!
@TeamAtlanta24
Team Atlanta
25 days
New blog out now! Weโ€™re answering the top questions from the DEFCON audience and sharing the behind-the-scenes story of our victory. https://t.co/2U6Ou9S3JS #AIxCC
0
1
10
@tjbecker_
Tim Becker
26 days
First, we use an LLM classifier. We provide the vuln report and relevant source code, requesting a single output token: whether the vulnerability is "likely" or "unlikely" to be real. By inspecting the logprobs of the completion, we can score candidate vulns by likelihood!
2
1
6
@GoogleVRP
Google VRP (Google Bug Hunters)
28 days
Got a knack for security? We've launched a rewards program for OSV-SCALIBR and want your help! Earn cash ๐Ÿ’ฐ for creating new plugins that detect vulnerabilities, secrets, or extract software inventory. https://t.co/jvtVTSpCXs
Tweet card summary image
bughunters.google.com
Check out our new Patch Rewards Program for OSV-SCALIBR, offering financial incentives for providing novel OSV-SCALIBR plugins for inventory, vulnerability, or secret detection.
2
16
68
@_runiel
Soyeon Park
29 days
๐Ÿš€ Proud to be part of DARPA #AIxCC Winner - @TeamAtlanta24 ! Our sub-team built one of the key components: Multilang LLM Agents for vulnerability detection.
2
3
32
@pr0cf51
pr0cf5
1 month
We did it!!!!!!!!!!!!!!!!!!!!
@TeamAtlanta24
Team Atlanta
1 month
Team Atlanta wins the AIxCC Grand Final! ๐Ÿ†
Tweet media one
Tweet media two
Tweet media three
5
4
93
@TeamAtlanta24
Team Atlanta
1 month
Team Atlanta wins the AIxCC Grand Final! ๐Ÿ†
Tweet media one
Tweet media two
Tweet media three
5
28
114
@RealTonySLee
TonySanghoLee ๐Ÿ‡ฐ๐Ÿ‡ท๐Ÿ‡บ๐Ÿ‡ฒ๐Ÿ‡ฏ๐Ÿ‡ต๐Ÿ‡ฎ๐Ÿ‡ฑ๐Ÿ‡ง๐Ÿ‡ท๐Ÿ‡ฌ๐Ÿ‡ง
1 month
๋งŽ์€ ๊ธฐ์—…๋“ค์ด ํฌ๋งํ‡ด์ง์„ ์‹ค์‹œํ•˜๊ธฐ ์‹œ์ž‘ํ–ˆ์Šต๋‹ˆ๋‹ค. 4050 ๋‚ ์•„๊ฐ€๊ธฐ ์‹œ์ž‘ํ•˜๋„ค์š”. [ํ—ค๋Ÿด๋“œ๊ฒฝ์ œ] 40๋Œ€~50๋Œ€ โ€˜๋‚ ๋ฒผ๋ฝโ€™โ€ฆโ€œ9000๋ช… ํ•ด๊ณ ํ•ฉ๋‹ˆ๋‹คโ€ ์ตœ์•… โ€˜ํฌ๋งํ‡ด์งโ€™ ๊ฒฐ๊ตญ ํ„ฐ์กŒ๋‹ค https://t.co/jBilQ248IZ
Tweet media one
96
460
1K
@lauriewired
LaurieWired
1 month
When you make a Bank ACH transaction, itโ€™s literally just an SFTP upload. Sent as a NACHA file, it's 940 bytes of ASCII text. Bank-to-Bank transactions cost ~0.2 cents. As long as it travels via encrypted tunnel; itโ€™s compliant! Hereโ€™s how the quirky system works:
Tweet media one
Tweet media two
218
1K
13K
@andreyknvl
Andrey Konovalov
1 month
Documented instructions for setting up KGDB on Pixel 8. Including getting kernel log over UART via USB-Cereal, building/flashing custom kernel, breaking into KGDB via /proc/sysrq-trigger or by sending SysRq-G over serial, dealing with watchdogs, etc. https://t.co/vb4mgLDJrl
Tweet card summary image
xairy.io
Instructions for getting kernel log, building custom kernel, and enabling KGDB on Pixel 8
5
143
474
@sui414
danning
2 months
How much profits does MEV bots ๐Ÿค– really make from CEX-DEX Arbitrage? No one can answer this question before, but we are excited to share a new paper measuring it with formal methods finally! (We got accepted by AFT25' !๐Ÿฅณ) I summarized all the alpha in one pic for you ๐Ÿ˜ƒ
Tweet media one
28
85
580
@nirohfeld
Nir Ohfeld
2 months
We found a new container escape affecting all container runtimes using @NVIDIA GPUs. The crazy part? The exploit is just three lines long ๐Ÿคฏ This is the story of #NVIDIAScape ๐Ÿงต๐Ÿ‘‡
Tweet media one
9
135
639
@xvonfers
xvonfers
2 months
Again an interesting bug, an excellent and very detailed report with PoC & exploit from 303f06e3๐Ÿ”ฅ๐Ÿ”ฅ๐Ÿ”ฅ [$50000][403211343][turboshaft]Improper Error Handling in LateLoadElimination for String Map -> RCE https://t.co/UWeDbeVNYh
Tweet media one
Tweet media two
Tweet media three
@xvonfers
xvonfers
6 months
[403211343][turboshaft] Remove LoopPeelingPhase https://t.co/bzvt5WPSWP
3
16
68
@cor_ctf
Crusaders of Rust
2 months
Here is our 0day for kernelCTF๐Ÿฉธ - 82k bounty - quickest submission ever - all instances pwned๐Ÿ˜Ž https://t.co/0sb11m8ITD Disclaimer: We apologize for abusing the red black tree family. Turning grandparents against grandchildren is only acceptable in the context of pwn๐Ÿ˜ค
Tweet card summary image
syst3mfailure.io
CVE-2025-38001 is a Use-After-Free vulnerability in the Linux network packet scheduler, specifically in the HFSC queuing discipline. When the HFSC qdisc is utilized with NETEM and NETEM packet...
@cor_ctf
Crusaders of Rust
3 months
Exploit write-ups for our ๐Ÿšจlatest 0-day๐Ÿšจand the tragedy that swept the red black tree family dropping soon ๐Ÿ‘€ Here is a tiktok style video for those of you with no attention span thanks to slop and social media. Turn on the audio!!!
0
76
308