@_Nobodyisnobody Profile picture

Nobody Isnobody

@_Nobodyisnobody

hacker, researcher, ctf player with Water Paddler & Blue Water, traveller...

Similar User
ipwning photo

@ipwning

jade han photo

@windowhan

SuperFashi photo

@SuperFashi1

fibonhack photo

@fibonhack

st4rlight photo

@st4rlight_exp

LukeGix photo

@LukeGix

Kien Tuong Truong photo

@kientuong114

Free Food (Jules) photo

@FreeFooooooood

Leonardo Querzoni photo

@lquerzoni

Infektion photo

@InfektionCTF

Patrick Biernat photo

@PatrickBiernat

DiegoAltF4 photo

@Diego_AltF4

CanardMandarin photo

@mandarin_canard

Nobody Isnobody Reposted

@defcon 32 badge powered by @Raspberry_Pi Pico 2 #RP2350 has similar features to the @FREE_WiLi_ hardware. To promote FREE-WILi and make the almost 30,000 badges more useful we have released a version of the FREE-WILi code for it for Free (Use at your own risk). The badge does…

Tweet Image 1
Tweet Image 2

Nobody Isnobody Reposted

The first ever💦CTF! Crafted with❤️by CTF players for CTF players. Spoiler🚨! Here is list of the brilliant🧠behind the challenges🔓@udp_ctf @TheGrandPew @_Nobodyisnobody @RBTree_ @josep68_ @Strellic_ @vie_pls @kidOfArcrania @j0nathanj @ah_p_uh @ret2jazzy Please enjoy!🤯💪🕵️‍♂️🏆🚩

Attention CTFers! Blue Water CTF is this weekend, hosted by perfect blue and Water Paddler. It will run for 36 hours, starting from 2:00 PM UTC on Saturday, October 12. We'll have plenty of challenges for pwn, web, reversing, and crypto! Registration: bw.ctf.ing



Nobody Isnobody Reposted

Get ready to take control! 🛡️ 4 new challenges are now available in the App-System (pwn) category, and they're sure to put you to the test! 👉️root-me.org/en/breve/New-c… Thanks to the authors: @_spikeroot, @Njord_____ and #nobodyisnobody👏 !


Nobody Isnobody Reposted

40 vulnerabilities in Toshiba Multi-Function Printers pierrekim.github.io/blog/2024-06-2… #RCE


Nobody Isnobody Reposted

New job research : 1) Check how Lavamoat can protect someone from supply chain attacks 2) A bypass on lavapack And some other fun stuff :)

NEW: Supply chain attacks are increasing in popularity in Web3. Lavamoat has emerged as a robust defense mechanism - but it’s not perfect. This blog spills the beans on some sneaky bypasses, and show how tricky it is to lock down JavaScript ecosystems. osec.io/blog/2024-06-1…



Nobody Isnobody Reposted

I've audited the Android kernel in late 2023, and reported 10+ kernel bugs to Google, along with 2 exploits. Today, I'm releasing the first exploit, targeting the Mali GPU on Pixel devices, accessible from an untrusted_app context. github.com/0x36/Pixel_GPU…


bi0sCTF.2024 is finished , it has some really good challenges in pwn. Here is a write-up for Virtio-note, a nice qemu escape challenge written by k1r4. github.com/nobodyisnobody…


Nobody Isnobody Reposted

#threatintel someone just leaked a bunch of internal Chinese government documents on GitHub github.com/I-S00N/I-S00N/


Nobody Isnobody Reposted

DiceCTF 2024 Quals has ended! See you in NYC 🗽! Congratulations to: 🥇 Blue Water (@pb_ctf @Water_Paddler) 🥈 @0rganizers 🥉 P1G SEKAI (@r3kapig @ProjectSEKAIctf) And @idekCTF, *0xA, @thehackerscrew1, @maplebaconctf, BunkyoWesterns, and @vsctf

Tweet Image 1

Nobody Isnobody Reposted

Qualys sent this to oss-sec: seclists.org/oss-sec/2024/q… It's interesting that competitive programming community just treats this as a nature 🤣 ...and @hugeh0ge's qsort challenge immediately comes to mind: github.com/codeblue-ctf/c…


Nobody Isnobody Reposted

The Qualys Threat Research Unit (TRU) has recently unearthed four significant vulnerabilities in the #GNU C Library, a cornerstone for countless applications in the #Linux environment. Read more here. blog.qualys.com/vulnerabilitie…


Nobody Isnobody Reposted

Nice #KASLR break by @p1k4l4 for x86_64 kernels with Xen support (Debian and Ubuntu by default). Xen symbols are included in the kernel ELF .notes section and exposed world readable via SysFS (/sys/kernel/notes) since 2007 (pre-KASLR). Added to KASLD: github.com/bcoles/kasld/c…

I'm excited to announce that the technical analysis and the exploit of my CVE-2023-6546 (ZDI-24-020) Linux Kernel GSM Multiplexing Race Condition LPE is now available on : github.com/Nassim-Asrir/Z… Happy Reading #Cybersecurity #Vulnerability #CVE #InfoSec #exploit #Security



Nobody Isnobody Reposted

2023 was another great year for the team! 🎉 Blue Water, a collab between perfect blue and @Water_Paddler, placed 1st in CTFtime globally!🏆 🥇1st place in 6 CTFs 💻Hosted a successful pbctf 2023 In the past, we also placed first in 2020 and 2021.✌ Looking forward to 2024!🎆

Tweet Image 1

How to create a qemu SYS_BUS device driver for arm virt machine in 5 minutes (or maybe less ??) here is the answer of this question: github.com/nobodyisnobody…


Nobody Isnobody Reposted

Made a fun little heap challenge for #37C3 @PotluckCTF called Tamagoyaki. It features a fun way to bypass protect_ptr without a leak I discovered while exploiting a bug. It only got one solve during the CTF, so made a writeup: github.com/UDPctf/CTF-cha…


Nobody Isnobody Reposted

0CTF/TCTF 2023 has concluded. Congratulations to the winners! 🥇Blue Water @pb_ctf @Water_Paddler 🥈Kalmarunionen @kalmarunionenDM 🥉Maple Mallard Magistrates @mmm_ctf_team And thanks to every player participated, see you in 2024! #0CTF #TCTF

Tweet Image 1

Nobody Isnobody Reposted

Our very own principal reverse engineer, @marcnewlin, discusses a critical bluetooth flaw exposing android, apple & linux devices in @DarkReading Read more about the vulnerability & its implications here: darkreading.com/vulnerabilitie…


So 0CTF/TCTF 2023 is finished. It was a great ctf. We finished 1st with Blue Water. 🥳 so we are qualified for Defcon 32 😉 Congrats to all my teammates who made miracles..once again. A small write-up for "Nothing is True", a tricky one: github.com/nobodyisnobody…


Nobody Isnobody Reposted

My writeup for kEASY in m0leCon CTF 2023 Finals🍣 Big applause to the authors for this nice challenge!👏 ptr-yudai.hatenablog.com/entry/2023/12/…


Nobody Isnobody Reposted

I wrote about all my favourite cool tracing methods, including eBPF, QEMU’s JIT, Tracy, magic-trace and how to easily visualize your own trace data in Perfetto! Also includes some tools I wrote and an example eBPF use at Anthropic. thume.ca/2023/12/02/tra…


Loading...

Something went wrong.


Something went wrong.