FluxFingers
fluxfingers.net
FluxFingers
@fluxfingers.net
66 followers 36 following 10 posts
Participating in Capture the Flag security competitions representing @ruhr-uni-bochum.de since 2007. Also, organizers of annual Hack.lu CTF. Web: https://FluxFingers.net
Posts Media Videos Starter Packs
Thanks to our sponsors Zellic, Burp Suite, Vector 35, Binary Gecko, HackTheBox, and Hetzner for the awesome infra.
Shop is closed! We hope you had a lot of fun playing this year’s Hack.​lu CTF!

Congratulations to everybody who solved challenges and especially the winners:

🥳 Congrats to the winners! 🎉 💪
🥇 @kalmarunionendm.bsky.social
🥈 justCatTheFish
🥉 0rganizers
flu.xxx
Info - Hack.lu CTF 2025
Hack.lu CTF 2025 - Organized by FluxFingers, the CTF team of Ruhr University Bochum
flu.xxx
Hacklu CTF has started, our furniture store has opened for business!
In the next 48 hours, you can buy as many products as you can and try to win nice prizes from our sponsors!
Also shoutout to Hetzner.com for sponsoring this year's infrastructure 🚀
Hack.​lu CTF registration is open! Win great prizes from our sponsors:

🎯 3x @offensivecon.bsky.social tickets by Binary Gecko
🕵️ 6x @burpsuite.bsky.social
🥷 6x @binary.ninja
📦 80 months HackTheBox VIP+
💸 $1000 by Zellic
🇩🇪 DHM quals

flu.xxx
Info - Hack.lu CTF 2025
Hack.lu CTF 2025 - Organized by FluxFingers, the CTF team of Ruhr University Bochum
flu.xxx
Hej!

We are thrilled to announce Hack.lu CTF 2025 starts on Friday, October 17.

Top teams can win prizes from our sponsors: OffensiveCon, Zellic, PortSwigger, Binary Ninja, and HackTheBox.

All information on flu.xxx
Last weekend, we took 1st place at #idekCTF and qualified for the #MaltaCTF finals!
Congrats to all the other teams, and thanks to the organizers — the CTF was a lot of fun!
We secured 3rd place at ENOWARS CTF - top team in the DACH region and now qualified for DHM (German Hacking Championship)!
Huge congrats to all participants and thanks to the organizers for an awesome CTF! 🎉
We really enjoyed playing #GoogleCTF this weekend together with KITCTF. We scored place 6 amidst strong competition. Congratz to the other contestants, and see you in the finals!
Reposted by FluxFingers
Well that's a first. @ScepticCtf, @diff_fusion), & @SeTcbPrivilege of fuzzware.io used a power drill to gain access to a port and exploit the Autel MaxiCharger. They head off to explain their work - except for the drill - we understand that part. #P2OAuto
Fuzzware | Fuzzware
Fuzzware elevates embedded systems security with a hardware-free, full-system firmware fuzzing tool, focusing on thorough, binary-only analysis. It proactively identifies vulnerabilities, securing ent...
fuzzware.io