CryptoCat
@cryptocat.me
๐ค 489
๐ฅ 84
๐ 131
Security Researcher
@rapid7.com
๐ Hacking Content @
https://yt.cryptocat.me
๐
pinned post!
CTF resources ๐บ
loading . . .
GitHub - Crypto-Cat/CTF: CTF chall write-ups, files, scripts etc (trying to be more organised LOL)
CTF chall write-ups, files, scripts etc (trying to be more organised LOL) - GitHub - Crypto-Cat/CTF: CTF chall write-ups, files, scripts etc (trying to be more organised LOL)
https://github.com/Crypto-Cat/CTF
almost 3 years ago
0
9
1
Happy St Patrick's day โ
1 day ago
0
3
1
reposted by
CryptoCat
Rapid7
6 days ago
๐ค๐พ Introducing Hacktics and Telemetry, a bi-weekly video and audio podcast out of Rapid7 Labs, starring Rapid7's Doug McKee (fulmetalpackets) & Jonah Burgess (
@cryptocat.me
)! ๐งต Find episode 1's companion blog here:
r-7.co/4di8tuH
โถ๏ธ Or dive right into the full vid on YouTube:
r-7.co/3NiQfP2
0
2
2
๐จ CVE-2026-20127: Cisco SD-WAN authentication bypass. An unauthenticated attacker can inject SSH keys without crypto verification via a flawed state machine. Active exploitation by UAT-8616 since 2023 ๐ Check out the full
@rapid7.com
analysis ๐
attackerkb.com/topics/bP3FM...
loading . . .
CVE-2026-20127 | AttackerKB
## Overview On 25th February 2026, Cisco published an advisory for CVE-2026-20127, a critical authentication bypass vulnerability in the vdaemon service of Cisโฆ
https://attackerkb.com/topics/bP3FMvHe7z/cve-2026-20127/rapid7-analysis
7 days ago
1
2
1
reposted by
CryptoCat
John Scott-Railton
9 days ago
BREAKING: powerful iPhone hacking tools used by Chinese criminals originated from US defense giant L3 Harris. Their zero-click exploits went to Russian spies too. Unbelievable harm to our collective security. Scoop:
@lorenzofb.bsky.social
, here's why it matters 1/
techcrunch.com/2026/03/09/a...
5
493
268
reposted by
CryptoCat
evacide
13 days ago
"For the first time since we began tracking zero-day exploitation, we attributed more zero-days to commercial surveillance vendors than to traditional state-sponsored cyber espionage groups." Love to see the stats backing up my hunch.
cloud.google.com/blog/topics/...
loading . . .
Look What You Made Us Patch: 2025 Zero-Days in Review | Google Cloud Blog
Our analysis of 90 zero-day vulnerabilities tracked in 2025, focusing on techniques and how AI will accelerate the vulnerability landscape.
https://cloud.google.com/blog/topics/threat-intelligence/2025-zero-day-review
4
80
35
My first
@metasploit-r7.bsky.social
module is live! You can now exploit CVE-2026-1731 (BeyondTrust command injection) with the latest version ๐
15 days ago
1
3
2
My writeup for
@intigriti.com
's "InkDrop" challenge ๐
cryptocat.me/blog/ctf/mon...
loading . . .
Stored XSS + JSONP Callback Injection to Cookie Exfiltration | Intigriti 02-26: InkDrop | CryptoCat's Blog
Intigriti 02-26 writeup: unsafe markdown rendering leads to stored XSS, which is executed via a client-side script reinjection gadget loading /api JSONP, allowing CSP bypass and bot flag cookie exfilt...
https://cryptocat.me/blog/ctf/monthly/intigriti/inkdrop/
21 days ago
0
1
1
reposted by
CryptoCat
Rapid7
28 days ago
๐จ In conducting 0 day research against
#Grandstream
GXP1600 VoIP phones, Rapid7 Labs discovered CVE-2026-2329. The unauthenticated stack-based buffer overflow vulnerability ultimately allows an attacker to intercept phone calls and eavesdrop on audio. Read on:
r-7.co/4tIzope
0
1
2
My writeup for the "RubitMQ" challenge by
@yeswehack.bsky.social
๐
cryptocat.me/blog/ctf/mon...
#ctf
#capturetheflag
#bugbounty
#ethicalhacking
#cybersecurity
#infosec
#yeswehack
loading . . .
Ruby Object Injection to RCE via Oj Deserialization | YesWeHack Dojo: RubitMQ | CryptoCat's Blog
YesWeHack Dojo #48 writeup: exploiting unsafe Oj.load deserialization to inject a Node gadget and achieve command execution via find -exec.
https://cryptocat.me/blog/ctf/monthly/yeswehack/rubitmq/
29 days ago
0
0
1
reposted by
CryptoCat
James Kettle
about 1 month ago
The voting has concluded, and we're thrilled to announce the top ten web hacking techniques of 2025! Massive thanks to everyone in the community for sharing their hard-earned discoveries, plus the panel and everyone who nominated or voted!
portswigger.net/research/top...
loading . . .
Top 10 web hacking techniques of 2025
Welcome to the Top 10 Web Hacking Techniques of 2025, the 19th edition of our annual community-powered effort to identify the most innovative must-read web security research published in the last year
https://portswigger.net/research/top-10-web-hacking-techniques-of-2025
1
10
7
Couldn't be more excited to announce I'm joining the vulnerability research team at
@rapid7.com
next week! ๐ฅณ Really looking forward to teaming up with some seriously talented researchers and digging into real-world threats and vulnerabilities. Stay tuned ๐
about 1 month ago
0
2
0
My writeup for the "APICrash" challenge from
@yeswehack.bsky.social
๐ฅ
cryptocat.me/blog/ctf/mon...
loading . . .
Race Condition via GraphQL Aliases | YesWeHack 11-25: APICrash | CryptoCat's Blog
YesWeHack Dojo 11-25 writeup: exploiting unsynchronised threaded TinyDB writes via GraphQL aliases to corrupt storage and trigger error-based flag disclosure.
https://cryptocat.me/blog/ctf/monthly/yeswehack/api_crash/
2 months ago
0
0
0
reposted by
CryptoCat
404 Media
2 months ago
At least four videos show what really happened when ICE shot a woman in Minneapolis on Wednesday. DHS has established itself as an agency that cannot be trusted to live in or present reality.
@evystadium.bsky.social
has more. Full story by
@josephcox.bsky.social
:
www.404media.co/dhs-is-lying...
loading . . .
20
1308
440
Happy new year!! ๐ฅณ๐
3 months ago
0
2
0
I've been working hard to move my written content from gitbook over to my own website ๐ทโโ๏ธ It's still a work in progress, but I'm pretty happy with the results so far ๐ ๐
cryptocat.me/blog/
3 months ago
1
2
0
Wishing a very hacky christmas to all the hacker fam! ๐
3 months ago
0
1
0
Video walkthrough for the Hacky Christmas challenge I made for
#NahamCon2025
๐
youtu.be/fs9WeNkUB4M
loading . . .
Manipulating Memory with Cheat Engine - Hacky Christmas [NahamCon 2025 CTF]
YouTube video by CryptoCat
https://youtu.be/fs9WeNkUB4M
3 months ago
0
0
0
The
#NahamCon2025
CTF is over โ Writeups for my challs ๐ ๐ฎ Hacky Christmas โก
book.cryptocat.me/blog/ctf/202...
๐ฅ VulnBank โก
book.cryptocat.me/blog/ctf/202...
๐ฅ Snorex 2K CCTV โก
book.cryptocat.me/blog/ctf/202...
Stay tuned for a video walkthrough of Hacky Christmas ๐ ๐
3 months ago
0
0
0
I made a couple of [easy-med] challenges for
#NahamCon2025
- you've got 24 hours! ๐ ๐ฎ
ctf.nahamcon.com/hubs/hacky-c...
๐ฅ
ctf.nahamcon.com/hubs/vuln-bank
๐ฅ
ctf.nahamcon.com/hubs/snorex-...
Here's a sneak peek at Hacky Christmas ๐ Can you escape the ice box and take out 1 MILLION gingerbread men? ๐
loading . . .
3 months ago
0
1
0
I also made some challenges for
#NahamCon2025
, hope you will check them out! ๐
add a skeleton here at some point
3 months ago
0
1
0
New stickers ๐ผ
loading . . .
3 months ago
1
3
0
New video covering the solution to the Mother Printers challenge I created for
@hackinghub.bsky.social
๐ Tried to make it as beginner friendly as possible as I know many players aren't familiar with rev/pwn ๐
youtu.be/ebNYtX_8lOY
loading . . .
Mother Printers (Print2Own) - Full Exploit Chain Walkthrough [HackingHub]
YouTube video by CryptoCat
https://youtu.be/ebNYtX_8lOY
4 months ago
0
1
0
Didn't get chance to solve my "Mothers Printers" challenge on
@hackinghub.bsky.social
? ๐จ Here's the official writeup โก
book.cryptocat.me/blog/ctf/mon...
Prefer video? Stay tuned for a beginner-friendly walkthrough on YT next week โถ
4 months ago
1
1
0
Time to drop a couple of hints for my
@hackinghub.bsky.social
challenge! 1๏ธโฃ First flag is on the website (you need to find it before flag 3/4/5) 2๏ธโฃ The chall is inspired by some cool research I read (go find it) Writeups will be published once we hit 10 solves โก
app.hackinghub.io/hubs/mother-...
loading . . .
https://app.hackinghub.io/hubs/mother-printers
4 months ago
0
0
1
Congratulations to Bhavya for being the first to capture all 5 flags on my
@hackinghub.bsky.social
challenge! ๐ฅณ๐ We've released a small patch. If you were stuck on flag 3, please re-download files! Good time to practice your patch-diffing ๐
app.hackinghub.io/hubs/mother-...
4 months ago
0
1
0
So, who's gonna blood my new
@hackinghub.bsky.social
challenge? ๐ผ Challenge ๐
app.hackinghub.io/hubs/mother-...
First 3 solves will earn the "Hacker Cat" role in my discord server โก๏ธ
discord.cryptocat.me
#ctf
#capturetheflag
#ethicalhacking
#cybersecurity
#infosec
#offsec
4 months ago
1
1
1
The "Ultimate Calculator 3000" challenge is over! โณ You can watch the video walkthrough here โก
youtu.be/lRJno96za5A
I'll leave everything online for another week or so ๐
loading . . .
Hidden Product Activation and Serial Keygen - "Ultimate Calculator 3000" [Rev/Web Challenge]
YouTube video by CryptoCat
https://youtu.be/lRJno96za5A
5 months ago
1
0
0
My writeup for the September Dojo challenge on
@yeswehack.bsky.social
- Chainfection โ The challenge combined multiple CVEs, creating a chain of vulnerabilities: SQL injection -> file write + path traversal -> SSTI (RCE) Read the full writeup โก๏ธ
book.cryptocat.me/blog/ctf/mon...
5 months ago
0
0
0
I made a new CTF challenge! It will run until the 30th of October ๐ There's no prizes, but the first 3 solves will earn themselves the "Hacker Cat" rank in my discord server ๐ธ Download "Ultimate Calculator 3000" to get started โก
discord.cryptocat.me
5 months ago
1
1
0
reposted by
CryptoCat
TrendAI Zero Day Initiative
5 months ago
Recapping Day One of
#Pwn2Own
Ireland 2025. Join
@dustinchilds.bsky.social
(and Maude) as he covers the highlights of the first day of the competition. We awarded $522,500 for 34 unique 0-day bugs, and more is to come.
youtu.be/tiM_StSFvow
loading . . .
Recapping Day One of Pwn2Own Ireland 2025
YouTube video by Trend Zero Day Initiative
https://youtu.be/tiM_StSFvow
0
1
1
reposted by
CryptoCat
Stephen Fewer
5 months ago
We just posted our AttackerKB
@rapid7.com
Analysis for the recent Cisco 0day chain; CVE-2025-20362 and CVE-2025-20333. Full technical root cause analysis of both the auth bypass and buffer overflow are here:
attackerkb.com/topics/Szq5u...
loading . . .
CVE-2025-20362 | AttackerKB
On September 25, 2025, Cisco published advisories for two new vulnerabilities, CVE-2025-20362, and CVE-2025-20333, which are known to be exploited in-the-wild โฆ
https://attackerkb.com/topics/Szq5u0xgUX/cve-2025-20362/rapid7-analysis
1
2
1
New video looking at some interesting printer vulnerabilities, found by
@stephenfewer.bsky.social
(
@rapid7.com
) ๐จ โถ
youtu.be/--SaQKmcyiU
loading . . .
Print Scan Hacks: Understanding the 8 CVEs Impacting Brother Printers
YouTube video by CryptoCat
https://youtu.be/--SaQKmcyiU
6 months ago
1
1
0
One week until
@bsidesbelfast.bsky.social
, Who's going? ๐ As always, I've got stickers - come say hi! ๐
7 months ago
0
3
1
Video walkthrough for the "Fancy Login Form" web challenge from the
@why2025.bsky.social
CTF ๐ฉ Learn how to exfiltrate data via CSS injection โก๏ธ
youtu.be/jUjlj2z5jJk
loading . . .
7 months ago
0
0
0
Played the
@why2025.bsky.social
CTF over the weekend ๐ Here's some web challenge writeups ๐
book.cryptocat.me/ctf-writeups...
loading . . .
Web | CTF Writeups
https://book.cryptocat.me/ctf-writeups/2025/why/web
7 months ago
0
1
1
Famous beef noodle soup (broth simmering continously for over 50 years!) in one of my all time favourite cities - Bangkok! ๐น๐ญ Any hackers here wanna hang out, hmu ๐ค
9 months ago
0
1
1
I've done a lot of awesome hacker meetups but this one was next level! So nice to meet brutecat, dreyand and IDlSSEVERYTHING๐ฅ These guys have some crazy skills (and stories), hope to meet again in the future ๐
9 months ago
1
1
0
I'll be in Singapore this weekend! I know there's lots of cool hackers there so hmu if you wanna get some coffee/food/drinks ๐ฅฐ
9 months ago
0
2
1
Finally back in
#KualaLumpur
๐ Meeting some of my favourite Malaysian hackers for food/drinks tomorrow night. If you wanna join, let me know! ๐ฅฐ
9 months ago
1
0
0
๐
9 months ago
0
1
0
My OSWE review, tips/tricks.. general ramblings ๐๐
youtu.be/IK4t-i5lDEs
loading . . .
Offensive Security Web Expert (OSWE) Review + Tips/Tricks [OffSec]
YouTube video by CryptoCat
https://youtu.be/IK4t-i5lDEs
10 months ago
0
0
0
Just finished my OSWE exam ๐ Today I write up the report.. while watching
#NahamCon
๐
10 months ago
0
2
0
reposted by
CryptoCat
Johan Carlsson
10 months ago
Here is the official writeup of my XSS challenge on Intigriti. I think it contains some fun browser trivia even for those who did not look at the chall
joaxcar.com/blog/2025/05...
loading . . .
Confetti: Solution to my Intigriti May 2025 XSS Challenge - Johan Carlsson
https://joaxcar.com/blog/2025/05/20/confetti-solution-to-my-intigriti-may-xss-challenge/
1
19
6
reposted by
CryptoCat
Jorian
10 months ago
The legendary
@joaxcar.bsky.social
made a really interesting XSS challenge this month for Intigriti. My solution involved winning a race condition with 100 <iframe>s to utilize a DOM Clobbering gadget after bypassing a RegEx. Check out the writeup below:
jorianwoltjer.com/blog/p/hacki...
loading . . .
Intigriti May XSS Challenge (0525) | Jorian Woltjer
A challenge by @joaxcar with a small but complex XSS chain, hitting DOM Clobbering with a race condition and abusing a cool URL parsing quirk in JavaScript.
https://jorianwoltjer.com/blog/p/hacking/intigriti-xss-challenge/0525
2
12
7
Heading back to SE-Asia next month.. Any hackers wanna hang out? ๐ Join my discord to keep up with the travel plans / arrange meetups:
cryptocat.me/discord
๐
#cybersecurity
#ethicalhacking
#infosec
#bugbounty
#ctf
#asia
10 months ago
0
1
0
reposted by
CryptoCat
James Kettle
10 months ago
I'm thrilled to announce "HTTP/1 Must Die! The Desync Endgame", at
#BHUSA
! This is going to be epic, check out the abstract for a teaser โ
2
38
19
Video walkthrough for the web challenges from Tsuku CTF ๐
youtu.be/qGd4d0zmhy8
loading . . .
Tsuku CTF Web Challenge Walkthroughs (2025)
YouTube video by CryptoCat
https://youtu.be/qGd4d0zmhy8
11 months ago
1
1
0
reposted by
CryptoCat
Nicolas Grรฉgoire
11 months ago
We already know that any Web server listening on the loopback interface is a security risk, because it may be accessed by a browser or its extensions. But the impact may be way bigger if this Web server is a MCP server ๐ฑ
blog.extensiontotal.com/trust-me-im-...
loading . . .
Trust Me, Iโm Local: Chrome Extensions, MCP, and the Sandbox Escape
Letโs talk about MCPs. Youโve probably heard of them, and maybe youโve read the security risks associated with them. Sure, they soundโฆ
https://blog.extensiontotal.com/trust-me-im-local-chrome-extensions-mcp-and-the-sandbox-escape-1875a0ee4823
0
26
2
Have YOU joined my discord server yet? Click the link below and let's talk about hacking stuff ๐
discord.cryptocat.me
11 months ago
0
0
0
Added a video walkthrough for the web challenges from the recent CTF@CIT ๐
youtu.be/ZBdApaw0r0M
#capturetheflag
#ctf
#websecurity
#bugbounty
#cybersecurity
#ethicalhacking
#infosec
loading . . .
CTF@CIT Web Challenge Walkthroughs
YouTube video by CryptoCat
https://youtu.be/ZBdApaw0r0M
11 months ago
0
0
0
Load more
feeds!
log in