brymko

@brymko

CTF with , , Exploit Dev, Hobby Option Quant, Pwn2Own Miami 2020, 1st place at

Joined January 2019

Tweets

You blocked @brymko

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @brymko

  1. Apr 9

    Played some ctf at the booth at nullcon 😳

    Undo
  2. Retweeted
    15 Dec 2021

    Counter-Strike: Global Offsets - A journey into exploiting the Source Engine by and

    Undo
  3. 2 Dec 2021

    Why does my look like it's being exploited

    Undo
  4. Retweeted
    29 Oct 2021

    Hacklu CTF 2021 is now live at ! Markets are open, stonks must go up!

    Undo
  5. 16 May 2021
    Undo
  6. 8 May 2021
    Undo
  7. 7 May 2021

    wenn man sich in deutschland ins internet einwaehlt

    Undo
  8. Retweeted
    10 Apr 2021

    On the topic of our previous thread, we have showcasing their remote code execution 0-day for CS:GO. This has been reported to Valve months ago, but they have neither paid them nor acknowledged the exploit.

    Show this thread
    Undo
  9. 19 Dec 2020
    Undo
  10. Retweeted
    24 Oct 2020

    i was re-reading some of my past github comments to recall the context and discovered this horror, which i seem to have wiped from my memory as an act of self-preservation (text at )

    Show this thread
    Undo
  11. 22 Oct 2020

    can't express in words how in awe i am with decision to not display known extensions. The countless amount of thinking about my filetypes it has saved me is just immeasurable. Keep up the great great work 👍

    Undo
  12. Retweeted
    21 Oct 2020

    Still unsure what to do at the upcoming weekend? How about CTF? Come and join the fun as we expect some hot hacking over at Pwnhub this year: !

    Undo
  13. Retweeted
    21 Sep 2020
    Undo
  14. Retweeted
    22 Dec 2019

    CTF Reversing challenge bingo

    Show this thread
    Undo
  15. Retweeted
    17 Feb 2020

    So I learned of an amusing bug today: Docker for Windows won't run if you have the Razer Synapse driver management tool running. But the reason is the funny part...

    Show this thread
    Undo
  16. Retweeted

    The final count is in, and with 92.5 points total, and are crowned Master of Pwn! Congratulations to everyone who participated. We'll have a full wrap video with all the results available tomorrow morning. We'll see you in Vancouver.

    Undo
  17. Retweeted

    Success! The team of , , and needed little time to demo their RCE against the Triangle Microworks SCADA Data Gateway in the DNP3 category. They're off to the disclosure room with all the details.

    Undo
  18. Retweeted
    21 Jan 2020

    Nobody Move, Nobody Get Hurt

    Undo
  19. Retweeted

    Confirmed! of used a OOB Access bug to get RCE (w/ continutation) against Iconics Genesis64 in the Control Server category. There's spectacular research earns them $25,000 and 25 more Master of Pwn points.

    Undo
  20. Retweeted

    Confirmed! , , and from the Horst Goertz Institute for IT-Security () used an OOB access to gain code execution on the Rockwell Automation HMI. They earned themselves $25,000 and 25 points toward Master of Pwn.

    Undo

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·