Finally finished
#flareon11 π₯² Lost a lot of time AND SANITY on question 9. Learned a lot and had fun as always.
I built myself a couple of
#Meshtastic nodes π I got up to 22km of range with a 443 MHz Heltec V3. Hit me up if you're near. Node names: FAP1, FAP2 (MQTT enabled).
Added to the collection π₯°
#flareon10Some TAs are using Github issues to target repo owners with crypto scams. Github notification mails are guaranteed to reach your inbox, bypassing any spam filters and security products. The content of the scam is very basic, but I can give points for creativity for sure :)
QSocket v0.0.6-beta released π₯ππ
- New websocket based knock protocol
- QSRN moved behind Cloudflare CDN
- Multi session support
- Better traffic forwarding capabilities
- Terminal QR code generation on deploy
https://github.com/qsocket/qs-netcat

GitHub - qsocket/qs-netcat
Contribute to qsocket/qs-netcat development by creating an account on GitHub.
GitHubFinished
#flareon10 in 69th place this year. ππ It was definitely the hardest year. I had so much fun and agony at the same time. Next year's goal is to top 30.
Iβve realized that Iβm having much more fun writing N-day exploits than doing vuln research. It takes MUCH LESS time and equally sharpens your skills, maybe even more. Writing N-days with just a brief CVE description is very much like solving a CTF challenge. If you canβt reproduce the bug, you simply need to do more reversing. At the end, the prize is guaranteed; you're not wasting your time. This could be a very good starting point for beginners. There are a lot of critical vulnerabilities being disclosed without a proper exploit.I was able to write 10+ RCE exploits last month just by following ZDI and CVE feeds. Ended up at No. 1 on the Metasploit contributions last month π