CryptoCat
@cryptocat.me
📤 491
📥 85
📝 136
Security Researcher
@rapid7.com
😈 Hacking Content @
https://yt.cryptocat.me
💜
pinned post!
CTF resources 😺
loading . . .
GitHub - Crypto-Cat/CTF: CTF chall write-ups, files, scripts etc (trying to be more organised LOL)
CTF chall write-ups, files, scripts etc (trying to be more organised LOL) - GitHub - Crypto-Cat/CTF: CTF chall write-ups, files, scripts etc (trying to be more organised LOL)
https://github.com/Crypto-Cat/CTF
almost 3 years ago
0
9
1
Did you catch
@jorianwoltjer.com
's cool XSS chain on RoundCube mail? 👀 If not, you can hear (and see) all about it in the latest episode of the
@rapid7.com
podcast!
youtu.be/A05dD51mLyo
loading . . .
Hacktics and Telemetry, E5: A Masterclass in XSS, The Copyfail Exploit and Metasploit MCP
YouTube video by Rapid7
https://youtu.be/A05dD51mLyo
3 days ago
0
1
2
An XSS I found in Elementor was disclosed yesterday, here's the writeup!
cryptocat.me/blog/researc...
loading . . .
Elementor REST API Form-Encoded Stored XSS via _elementor_data | CVE-2026-6127 | CryptoCat's Blog
Root cause analysis of CVE-2026-6127 in Elementor Website Builder, where form-encoded REST API requests bypass _elementor_data sanitisation and lead to Contributor+ stored XSS.
https://cryptocat.me/blog/research/analysis/cve_2026_6127/
10 days ago
0
1
0
My writeup for the "Bucket Vault" challenge by
@pwnii.bsky.social
(
@yeswehack.bsky.social
) 💜
cryptocat.me/blog/ctf/mon...
loading . . .
Signed Directory Traversal via Filename Sanitisation | YesWeHack Dojo: Bucket Vault | CryptoCat's Blog
YesWeHack Dojo #50 writeup: the app checks the original filename, then signs a cleaned-up version of it, letting us turn a public path into directory traversal
https://cryptocat.me/blog/ctf/monthly/yeswehack/bucket_vault/
13 days ago
0
1
1
reposted by
CryptoCat
James Kettle
14 days ago
We've launched a new free Web Security Academy topic on exploiting AI-powered security scanners! Learn how to use indirect prompt injection to steal data, cause damage & trigger exploit chains! Dive in here:
portswigger.net/web-security...
loading . . .
AI-powered scanner vulnerabilities | Web Security Academy
Application security teams often deploy AI-powered scanners that use Large Language Models (LLMs) to scan web applications for vulnerabilities. While ...
https://portswigger.net/web-security/llm-attacks/ai-powered-scanner-vulnerabilities
1
15
9
reposted by
CryptoCat
xarkes
18 days ago
Mozilla says Mythos helped identify 271 vulnerabilities in Firefox 150. I went through the commits, CVEs, and bug links to see what that number really means. My takeaway: relax folks.
xark.es/b/mythos-fir...
loading . . .
A quick look at Mythos run on Firefox: too much hype?
A closer look at Mozilla's Firefox 150
https://xark.es/b/mythos-firefox-150
1
7
9
My first YT video of 2026! 😳 We'll review
@rapid7.com
's analysis of CVE-2026-20127 - written by me! 😊
youtu.be/6vgpwr37nR0
loading . . .
This Bug Lets You Skip Cisco SD-WAN Authentication
YouTube video by CryptoCat
https://youtu.be/6vgpwr37nR0
21 days ago
0
0
0
reposted by
CryptoCat
Rapid7
about 2 months ago
▶️ Now Playing: Telecom Sleeper Cells, SD-WAN Bypasses, & LLM Bug Bounties. In Episode 2 of Hacktics and Telemetry, Douglas McKee &
@cryptocat.me
continue to bring you the latest in cybersecurity news, vuln research, and actionable defensive strategies:
https://r-7.co/4sTbDu5
loading . . .
0
2
1
My writeup for the "Secret Manager" challenge by zerodaygym (
@yeswehack.bsky.social
) 🤫
cryptocat.me/blog/ctf/mon...
loading . . .
Argument Injection via Wildcard Expansion | YesWeHack Dojo 49: Secret Manager | CryptoCat's Blog
YesWeHack Dojo #49 writeup: exploiting wildcard argument injection in shell cp and grep commands to access internal secrets
https://cryptocat.me/blog/ctf/monthly/yeswehack/secret_manager/
about 2 months ago
0
0
1
Happy St Patrick's day ☘
about 2 months ago
0
3
1
reposted by
CryptoCat
Rapid7
about 2 months ago
🎤👾 Introducing Hacktics and Telemetry, a bi-weekly video and audio podcast out of Rapid7 Labs, starring Rapid7's Doug McKee (fulmetalpackets) & Jonah Burgess (
@cryptocat.me
)! 🧵 Find episode 1's companion blog here:
r-7.co/4di8tuH
▶️ Or dive right into the full vid on YouTube:
r-7.co/3NiQfP2
0
3
2
🚨 CVE-2026-20127: Cisco SD-WAN authentication bypass. An unauthenticated attacker can inject SSH keys without crypto verification via a flawed state machine. Active exploitation by UAT-8616 since 2023 💀 Check out the full
@rapid7.com
analysis 👇
attackerkb.com/topics/bP3FM...
loading . . .
CVE-2026-20127 | AttackerKB
## Overview On 25th February 2026, Cisco published an advisory for CVE-2026-20127, a critical authentication bypass vulnerability in the vdaemon service of Cis…
https://attackerkb.com/topics/bP3FMvHe7z/cve-2026-20127/rapid7-analysis
2 months ago
1
2
1
reposted by
CryptoCat
John Scott-Railton
2 months ago
BREAKING: powerful iPhone hacking tools used by Chinese criminals originated from US defense giant L3 Harris. Their zero-click exploits went to Russian spies too. Unbelievable harm to our collective security. Scoop:
@lorenzofb.bsky.social
, here's why it matters 1/
techcrunch.com/2026/03/09/a...
5
496
270
reposted by
CryptoCat
evacide
2 months ago
"For the first time since we began tracking zero-day exploitation, we attributed more zero-days to commercial surveillance vendors than to traditional state-sponsored cyber espionage groups." Love to see the stats backing up my hunch.
cloud.google.com/blog/topics/...
loading . . .
Look What You Made Us Patch: 2025 Zero-Days in Review | Google Cloud Blog
Our analysis of 90 zero-day vulnerabilities tracked in 2025, focusing on techniques and how AI will accelerate the vulnerability landscape.
https://cloud.google.com/blog/topics/threat-intelligence/2025-zero-day-review
3
77
35
My first
@metasploit-r7.bsky.social
module is live! You can now exploit CVE-2026-1731 (BeyondTrust command injection) with the latest version 😎
2 months ago
1
3
2
My writeup for
@intigriti.com
's "InkDrop" challenge 🖋
cryptocat.me/blog/ctf/mon...
loading . . .
Stored XSS + JSONP Callback Injection to Cookie Exfiltration | Intigriti 02-26: InkDrop | CryptoCat's Blog
Intigriti 02-26 writeup: unsafe markdown rendering leads to stored XSS, which is executed via a client-side script reinjection gadget loading /api JSONP, allowing CSP bypass and bot flag cookie exfilt...
https://cryptocat.me/blog/ctf/monthly/intigriti/inkdrop/
3 months ago
0
1
1
reposted by
CryptoCat
Rapid7
3 months ago
🚨 In conducting 0 day research against
#Grandstream
GXP1600 VoIP phones, Rapid7 Labs discovered CVE-2026-2329. The unauthenticated stack-based buffer overflow vulnerability ultimately allows an attacker to intercept phone calls and eavesdrop on audio. Read on:
r-7.co/4tIzope
0
1
2
My writeup for the "RubitMQ" challenge by
@yeswehack.bsky.social
🐇
cryptocat.me/blog/ctf/mon...
#ctf
#capturetheflag
#bugbounty
#ethicalhacking
#cybersecurity
#infosec
#yeswehack
loading . . .
Ruby Object Injection to RCE via Oj Deserialization | YesWeHack Dojo: RubitMQ | CryptoCat's Blog
YesWeHack Dojo #48 writeup: exploiting unsafe Oj.load deserialization to inject a Node gadget and achieve command execution via find -exec.
https://cryptocat.me/blog/ctf/monthly/yeswehack/rubitmq/
3 months ago
0
0
1
reposted by
CryptoCat
James Kettle
3 months ago
The voting has concluded, and we're thrilled to announce the top ten web hacking techniques of 2025! Massive thanks to everyone in the community for sharing their hard-earned discoveries, plus the panel and everyone who nominated or voted!
portswigger.net/research/top...
loading . . .
Top 10 web hacking techniques of 2025
Welcome to the Top 10 Web Hacking Techniques of 2025, the 19th edition of our annual community-powered effort to identify the most innovative must-read web security research published in the last year
https://portswigger.net/research/top-10-web-hacking-techniques-of-2025
1
10
7
Couldn't be more excited to announce I'm joining the vulnerability research team at
@rapid7.com
next week! 🥳 Really looking forward to teaming up with some seriously talented researchers and digging into real-world threats and vulnerabilities. Stay tuned 😎
3 months ago
0
2
0
My writeup for the "APICrash" challenge from
@yeswehack.bsky.social
💥
cryptocat.me/blog/ctf/mon...
loading . . .
Race Condition via GraphQL Aliases | YesWeHack 11-25: APICrash | CryptoCat's Blog
YesWeHack Dojo 11-25 writeup: exploiting unsynchronised threaded TinyDB writes via GraphQL aliases to corrupt storage and trigger error-based flag disclosure.
https://cryptocat.me/blog/ctf/monthly/yeswehack/api_crash/
4 months ago
0
0
0
reposted by
CryptoCat
404 Media
4 months ago
At least four videos show what really happened when ICE shot a woman in Minneapolis on Wednesday. DHS has established itself as an agency that cannot be trusted to live in or present reality.
@evystadium.bsky.social
has more. Full story by
@josephcox.bsky.social
:
www.404media.co/dhs-is-lying...
loading . . .
20
1306
438
Happy new year!! 🥳🎉
4 months ago
0
2
0
I've been working hard to move my written content from gitbook over to my own website 👷♂️ It's still a work in progress, but I'm pretty happy with the results so far 🙂 🔗
cryptocat.me/blog/
4 months ago
1
2
0
Wishing a very hacky christmas to all the hacker fam! 🎅
5 months ago
0
1
0
Video walkthrough for the Hacky Christmas challenge I made for
#NahamCon2025
😇
youtu.be/fs9WeNkUB4M
loading . . .
Manipulating Memory with Cheat Engine - Hacky Christmas [NahamCon 2025 CTF]
YouTube video by CryptoCat
https://youtu.be/fs9WeNkUB4M
5 months ago
0
0
0
The
#NahamCon2025
CTF is over ✅ Writeups for my challs 👇 🎮 Hacky Christmas ➡
book.cryptocat.me/blog/ctf/202...
💥 VulnBank ➡
book.cryptocat.me/blog/ctf/202...
💥 Snorex 2K CCTV ➡
book.cryptocat.me/blog/ctf/202...
Stay tuned for a video walkthrough of Hacky Christmas 🎅🎄
5 months ago
0
0
0
I made a couple of [easy-med] challenges for
#NahamCon2025
- you've got 24 hours! 💜 🎮
ctf.nahamcon.com/hubs/hacky-c...
💥
ctf.nahamcon.com/hubs/vuln-bank
💥
ctf.nahamcon.com/hubs/snorex-...
Here's a sneak peek at Hacky Christmas 🎅 Can you escape the ice box and take out 1 MILLION gingerbread men? 🎄
loading . . .
5 months ago
0
1
0
I also made some challenges for
#NahamCon2025
, hope you will check them out! 🎅
add a skeleton here at some point
5 months ago
0
1
0
New stickers 😼
loading . . .
5 months ago
1
3
0
New video covering the solution to the Mother Printers challenge I created for
@hackinghub.bsky.social
💜 Tried to make it as beginner friendly as possible as I know many players aren't familiar with rev/pwn 😇
youtu.be/ebNYtX_8lOY
loading . . .
Mother Printers (Print2Own) - Full Exploit Chain Walkthrough [HackingHub]
YouTube video by CryptoCat
https://youtu.be/ebNYtX_8lOY
5 months ago
0
1
0
Didn't get chance to solve my "Mothers Printers" challenge on
@hackinghub.bsky.social
? 🖨 Here's the official writeup ➡
book.cryptocat.me/blog/ctf/mon...
Prefer video? Stay tuned for a beginner-friendly walkthrough on YT next week ▶
6 months ago
1
1
0
Time to drop a couple of hints for my
@hackinghub.bsky.social
challenge! 1️⃣ First flag is on the website (you need to find it before flag 3/4/5) 2️⃣ The chall is inspired by some cool research I read (go find it) Writeups will be published once we hit 10 solves ➡
app.hackinghub.io/hubs/mother-...
loading . . .
https://app.hackinghub.io/hubs/mother-printers
6 months ago
0
0
1
Congratulations to Bhavya for being the first to capture all 5 flags on my
@hackinghub.bsky.social
challenge! 🥳🎉 We've released a small patch. If you were stuck on flag 3, please re-download files! Good time to practice your patch-diffing 👀
app.hackinghub.io/hubs/mother-...
6 months ago
0
1
0
So, who's gonna blood my new
@hackinghub.bsky.social
challenge? 😼 Challenge 🔗
app.hackinghub.io/hubs/mother-...
First 3 solves will earn the "Hacker Cat" role in my discord server ➡️
discord.cryptocat.me
#ctf
#capturetheflag
#ethicalhacking
#cybersecurity
#infosec
#offsec
6 months ago
1
1
1
The "Ultimate Calculator 3000" challenge is over! ⏳ You can watch the video walkthrough here ➡
youtu.be/lRJno96za5A
I'll leave everything online for another week or so 🙂
loading . . .
Hidden Product Activation and Serial Keygen - "Ultimate Calculator 3000" [Rev/Web Challenge]
YouTube video by CryptoCat
https://youtu.be/lRJno96za5A
6 months ago
1
0
0
My writeup for the September Dojo challenge on
@yeswehack.bsky.social
- Chainfection ⛓ The challenge combined multiple CVEs, creating a chain of vulnerabilities: SQL injection -> file write + path traversal -> SSTI (RCE) Read the full writeup ➡️
book.cryptocat.me/blog/ctf/mon...
6 months ago
0
0
0
I made a new CTF challenge! It will run until the 30th of October 🎃 There's no prizes, but the first 3 solves will earn themselves the "Hacker Cat" rank in my discord server 😸 Download "Ultimate Calculator 3000" to get started ➡
discord.cryptocat.me
7 months ago
1
1
0
reposted by
CryptoCat
TrendAI Zero Day Initiative
7 months ago
Recapping Day One of
#Pwn2Own
Ireland 2025. Join
@dustinchilds.bsky.social
(and Maude) as he covers the highlights of the first day of the competition. We awarded $522,500 for 34 unique 0-day bugs, and more is to come.
youtu.be/tiM_StSFvow
loading . . .
Recapping Day One of Pwn2Own Ireland 2025
YouTube video by Trend Zero Day Initiative
https://youtu.be/tiM_StSFvow
0
1
1
reposted by
CryptoCat
Stephen Fewer
7 months ago
We just posted our AttackerKB
@rapid7.com
Analysis for the recent Cisco 0day chain; CVE-2025-20362 and CVE-2025-20333. Full technical root cause analysis of both the auth bypass and buffer overflow are here:
attackerkb.com/topics/Szq5u...
loading . . .
CVE-2025-20362 | AttackerKB
On September 25, 2025, Cisco published advisories for two new vulnerabilities, CVE-2025-20362, and CVE-2025-20333, which are known to be exploited in-the-wild …
https://attackerkb.com/topics/Szq5u0xgUX/cve-2025-20362/rapid7-analysis
1
2
1
New video looking at some interesting printer vulnerabilities, found by
@stephenfewer.bsky.social
(
@rapid7.com
) 🖨 ▶
youtu.be/--SaQKmcyiU
loading . . .
Print Scan Hacks: Understanding the 8 CVEs Impacting Brother Printers
YouTube video by CryptoCat
https://youtu.be/--SaQKmcyiU
8 months ago
1
1
0
One week until
@bsidesbelfast.bsky.social
, Who's going? 👀 As always, I've got stickers - come say hi! 👋
8 months ago
0
3
1
Video walkthrough for the "Fancy Login Form" web challenge from the
@why2025.bsky.social
CTF 🚩 Learn how to exfiltrate data via CSS injection ➡️
youtu.be/jUjlj2z5jJk
loading . . .
9 months ago
0
0
0
Played the
@why2025.bsky.social
CTF over the weekend 💜 Here's some web challenge writeups 👇
book.cryptocat.me/ctf-writeups...
loading . . .
Web | CTF Writeups
https://book.cryptocat.me/ctf-writeups/2025/why/web
9 months ago
0
1
1
Famous beef noodle soup (broth simmering continously for over 50 years!) in one of my all time favourite cities - Bangkok! 🇹🇭 Any hackers here wanna hang out, hmu 🤙
10 months ago
0
1
1
I've done a lot of awesome hacker meetups but this one was next level! So nice to meet brutecat, dreyand and IDlSSEVERYTHING🔥 These guys have some crazy skills (and stories), hope to meet again in the future 💜
11 months ago
1
1
0
I'll be in Singapore this weekend! I know there's lots of cool hackers there so hmu if you wanna get some coffee/food/drinks 🥰
11 months ago
0
2
1
Finally back in
#KualaLumpur
🙏 Meeting some of my favourite Malaysian hackers for food/drinks tomorrow night. If you wanna join, let me know! 🥰
11 months ago
1
0
0
🍉
11 months ago
0
1
0
My OSWE review, tips/tricks.. general ramblings 👀😅
youtu.be/IK4t-i5lDEs
loading . . .
Offensive Security Web Expert (OSWE) Review + Tips/Tricks [OffSec]
YouTube video by CryptoCat
https://youtu.be/IK4t-i5lDEs
11 months ago
0
0
0
Just finished my OSWE exam 👀 Today I write up the report.. while watching
#NahamCon
😌
12 months ago
0
2
0
Load more
feeds!
log in