Pleasant surprise to see our mascot being used in @c3awareness's communication as header picture :)
(https://events.ccc.de/en/2025/12/18/awa-auti-acc/)
Pleasant surprise to see our mascot being used in @c3awareness's communication as header picture :)
(https://events.ccc.de/en/2025/12/18/awa-auti-acc/)
Check out the writeup for "Pls respond" from last weekend's @lakectf by @prionbreaker, Benedikt and n0rdan if you ever wanted to learn about formats used in SMS messages and what the hell Wireless Vector Graphic (WVG) are :P
https://kitctf.de/writeups/lakectf-pls-respond
Our “getting started talk series” is coming to a close!
This Thursday Timon will conclude it with his talk about cryptography.
7pm **-101**, 50.34
Next stop for our intro series this Thursday:
An introduction to binary exploitation/pwning by @Ordoviz.
7pm -101, 50.34
We got third place at @LosFuzzys Glacier CTF 🎉
Thank you for organizing and the IDA Pro license :D
After a week of web exploitation, it is time to descend to the binary level and add reverse engineering into the mix.
@MisterPine will get you started with his talk on Thursday, 7 pm in the KIT CS building (50.34), room -101.
We had a lot of fun playing Platypwn 2025 last weekend and achieved 6th place 🎉
Thank you for hosting a CTF with such a nice variety of different categories and until next time!
Talks will be held in german. We can likely answer questions and provide support in english afterwards, if required.
Want to get into CTFs? Our series of talks and challenges is a great opportunity to do that. Come by every Thursday at 7 pm in the KIT CS building (50.34), room -101. We will start with an intro into CTFs and web hacking on the 13th of November.
More info: https://kitctf.de/intro/
This Thursday, Benedikt will talk about funny DSP architectures, Binja plugins 🥷 and what to look out for when using the Binary Ninja API.
As always: 7pm -120, 50.34
We arrived in Mexico City for @googlevrp's #hackceler8 finals together with @fluxfingers 🥳
Another Thursday, another Hackceler8 topic: tooling and a map demo this time.
As always, 7pm -120, 50.34
This Thursday, we'll be talking about Hackceler8 and how to corrupt memory with rust 🥳
As always, 7pm -120, 50.34
This Thursday, we'll be talking about Hackceler8:
What are the details, what do we need for success, and how you can help us 🙂
As always, 7pm -120, 50.34
Help, our mascot is attacking @organizers infrastructure at DEF CON CTF 🧐
Our mascot says hi to @defcon 33 🥳
This Thursday, we're excited to have @oiio talk about Android system services and how to use @fridadotre for efficient and scalable IPC request interception.
As always, 7pm -120, 50.34
We've just published our report on flag sharing during GPN CTF 2025!
Sadly, we had to investigate 53 incidents of flag sharing which was possible because we used dynamic, team-specific flags.
Read the full breakdown of our findings and methodology: https://kitctf.de/gpnctf-23/gpn-ctf-flagshare