pwnthem0le
@pwnthem0le
Followers
1K
Following
320
Media
170
Statuses
335
Academic CTF Team - Politecnico di Torino | m0leCon Security Conference & CTF organizers | @aboutblankets
Joined July 2019
๐ฅm0leCon CTF is happening once again!๐ฅ Join us for our jeopardy-style Teaser CTF on October 24th, 7pm CEST, lasting 24 hours. ๐ The Top 10 teams will be invited to Italy ๐ฎ๐น for the on-site finals in Torino, in Spring 2026! ๐ https://t.co/lX1CFohmJs ๐
0
4
12
We are proud to announce, ARESx placed 3rd on m0leCon CTF!!! ๐๐ฎ๐น Thank you for hosting! @pwnthem0le Looking forward to see everyone in Turin!! #pwnthem0le
0
9
38
Last but not least, "Stealth Exposures: Advanced Side-Channel Attacks Targeting Mozilla Firefox's Protocol Handlers" by Satoki Tsuji concludes this edition of m0leCon. Thanks to everyone that made this possible once again! โฅ๏ธ
0
0
5
Even if from home, Andrej Danis managed to give a great insight on Smart TVs security with "Exploiting Smart TVs using the HbbTV Protocol" ๐บ
0
0
3
Exploiting Synology devices with "Now I See You: Pwning the Synology BC500 Camera" by Emanuele Barbeno and Yves Bieri ๐ธ
0
1
21
... and the podium for m0leCon Finals CTF! Congratulations! ๐ฉ
0
5
40
Time for the awards: the PoliTO's podium for the Beginner CTF...
0
0
3
Now it's the turn of "Unawakened Wakeup: A New PHP Object Injection Technique for __wakeup() Bypass" by Hiroki Matsukuma, giving new life to PHP vulnerabilities!
0
0
7
Robin Jadoul is teaching us how to trick a zkVM with his talk "How to prove that 42 is prime" ๐คฏ
0
0
3
Excited for the opening talk at #m0leCon2025! Federico Cerutti dives into "Voltage Glitching Intel Microcode" ๐พ A deep dive into hardware vulnerabilities and cutting-edge security research!
0
0
4
Big thanks to all our sponsors for making m0leCon 2025 possible! We couldn't have done it without you! More info at https://t.co/NNzUapEUOV
0
0
4
Less than two weeks until m0leCon 2025 Conference ๐ฅ Here the final talk schedule, see you all in Turin next week! More info at https://t.co/NNzUapEUOV
0
2
18
And with "Voltage Glitching Intel Microcode", by Federico Cerutti, we've completed our conference program lineup ๐ฅStay tuned for the detailed schedule! More info at https://t.co/NNzUapEUOV
0
1
6
Join Emanuele Barbeno and @yves_bieri as they dive into the vulnerability analysis, RCE exploitation, and the unique challenges of Pwn2Own with their talk "Now I See You: Pwning the Synology BC500 Camera". More info at https://t.co/NNzUapFsEt
0
2
9
๐ท๏ธ Join @hhc0null as he gives new life to old PHP vulnerabilities with fresh techniques in his talk "Unawakened Wakeup: A New PHP Object Injection Technique for __wakeup() Bypass"! More info at https://t.co/NNzUapFsEt
0
2
14
Let's move to the physical world with the talk "Exploiting Smart TVs using the HbbTV Protocol" by Andrej Danis! ๐ฅ More info at https://t.co/NNzUapEUOV
0
1
3
Robin Jadoul is ready to question your math beliefs with his talk "How to prove that 42 is prime"! ๐ฅ More info at https://t.co/NNzUapEUOV
0
1
14
๐ The registration for m0leCon 2025 just opened. Reserve a spot on https://t.co/ElZp6MjIKg or on https://t.co/yFurTncgUg !
eventbrite.it
m0leCon is the computer security conference organized by the CTF and student team pwnthem0le in collaboration with Politecnico di Torino.
0
2
7
We are pleased to announce the firstย for the sixth edition of the m0leCon conference! @satoki00 will bring his work, "Stealth Exposures: Advanced Side-Channel Attacks Targeting Mozilla Firefox's Protocol Handlers"! More info at https://t.co/NNzUapEUOV
0
4
18
m0leCon 2025 Conference is almost here! ๐ฅ Registrations will officially open on Monday 17th at 12:00 ๐๏ธ You can get a ticket at https://t.co/ElZp6MkgzO Donโt miss your chance to reserve a seat! See you soon! ๐พ
0
2
6