CryptoCat
@_CryptoCat
Followers
8K
Following
74K
Media
990
Statuses
8K
Security Researcher π Hacking Content @ https://t.co/U7jVhNr9sC π
Not Here
Joined May 2016
Want to become an ethical hacker? π₯· Here's a list of my favourite [mostly practical] resources π They are all free (or have a free option) and there's more high quality material here than anybody realistically has the time to complete β³
27
331
1K
My writeup for the "Ghost Whisper" challenge by @Brumens2 (@yeswehack) π This was a cute Halloween challenge featuring a basic command injection vulnerability and unicode overflow π» https://t.co/YlC2x2UBts
0
0
0
Low-Level Software Security for Compiler Developers If you ever wanted a textbook-style guide to memory safety bugs, undefined behavior, exploit mitigations, side channels, etc. All in one spot, this free book is it: https://t.co/XfY21Uzen1
0
57
233
Part 3 of our Hacking AI Apps series. This time we hacked OpenAI Atlas Browser: A vulnerability that let us control tabs, leak browsing activity, and hijack your Reddit/Facebook accounts by stealing OAuth tokens. https://t.co/rhGzrfj5TW Stay tuned for Part 4: Antigravity!
hacktron.ai
A critical ChatGPT Atlas Browser vulnerability: XSS on an OpenAI subdomain let attackers hijack tabs, leak browsing URLs, and steal OAuth tokens.
3
32
147
Stay ready for outages with Powerwall and Storm Watch during extreme weather.
0
79
647
New on our Frontier Red Team blog: We tested whether AIs can exploit blockchain smart contracts. In simulated testing, AI agents found $4.6M in exploits. The research (with @MATSprogram and the Anthropic Fellows program) also developed a new benchmark:
332
681
5K
New video covering the solution to the Mother Printers challenge I created for @hackinghub_io π Tried to make it as beginner friendly as possible as I know many players aren't familiar with rev/pwn π https://t.co/r8PjGTkgFP
0
1
6
My very first blog post is live: https://t.co/Ud0Iffh4Gg During research, I've run into and documented a simple universal SQLite Injection RCE trick. Enjoy! N-day Analysis about Synology Beestation RCE (CVE-2024-50629~50631) by legendary DEVCORE π π Thanks to @u1f383
11
100
361
You can write '2' (0x32) anywhere in the filesystem of a Linux-based network switch. How do you get root? That's basically what my talk at @GrehackConf was about - enjoy! https://t.co/KRJSndycqm
2
22
112
ICYMI: videos from @WEareTROOPERS 2025 dropped recently! I'm starting with this talk about hacking security cameras at Pwn2Own: https://t.co/1z5D1fVkti
0
0
0
Happy black friday! π
EXCITING NEWS!! I have decided to make all of my content FREE for black friday, cyber monday and.. well, every other day of the year π Check out my latest video, walking through a printf format vuln challenge I made for @intigriti's #1337UPLIVE CTF π https://t.co/JMDGPCc0yX
0
0
3
At #Pwn2Own2025, our experts @Tek_7987 & @_Anyfun remotely compromised a Synology Beestation Plus via a pre-auth exploit, leading to full system takeover. The vuln is now tracked as CVE-2025-12686 π π Full write-up:
synacktiv.com
Breaking the BeeStation: Inside Our Pwn2Own 2025 Exploit Journey
1
46
119
I've also covered this set of tasks in a writeup:
allthingsreversed.io
Articles for the allthingsreversed.io blog
Didn't get chance to solve my "Mothers Printers" challenge on @hackinghub_io? π¨ Here's the official writeup β‘ https://t.co/eGRqJgGG8L Prefer video? Stay tuned for a beginner-friendly walkthrough on YT next week βΆ
1
1
2
You can still play the challenge for free!
app.hackinghub.io
HackingHub offers training and challenges for ethical web application hacking.
0
0
2
Shout-out to @stephenfewer and @starlabs_sg - their awesome research was the inspiration behind the theme of this challenge π https://t.co/CYN1VyG8ys
https://t.co/gM1QqYYUCV
starlabs.sg
The Target: Brother MFC-J1010DW Affected Models: Brother Printer MFC-J1010DW Vulnerable Firmware: Version <= 1.18 TL;DR: The Vulnerability Chain We discovered three vulnerabilities that when chained...
1
0
2
Didn't get chance to solve my "Mothers Printers" challenge on @hackinghub_io? π¨ Here's the official writeup β‘ https://t.co/eGRqJgGG8L Prefer video? Stay tuned for a beginner-friendly walkthrough on YT next week βΆ
1
2
5
Reversing web CVEs isn't guesswork. It's process. New blog: how we go from "vague advisory" β local lab β patch diff β safe Nuclei PoC, with concrete examples (Zimbra, Ivanti, Versa, Lucee). Read the full methodology:
projectdiscovery.io
Introduction This blog serves as a detailed methodology guide for analyzing, reversing, and researching web vulnerabilities, particularly those with CVEs assigned. The content outlines repeatable...
5
44
199
We've found a high-severity zero-day vulnerability in Firefox using @WeAreAisle's autonomous AI security system. It's now going by the name of CVE-2025-13016. If you're interested, here's my detailed technical blog post: https://t.co/o13azuTBw0
7
27
141
Breakin 'Em All β Overcoming Pokemon Go's Anti Cheat Mechanism (@defcon) https://t.co/D0a65IYlfF
0
0
5
Over the last 12 months, watchTowr Labs uncovered thousands of leaked credentials: cloud keys, AD creds, API tokens, even KYC data - already being abused. Join us on our journey into βinnocentβ developer tools. https://t.co/0ozS0DWfuI
labs.watchtowr.com
Welcome to watchTowr vs the Internet, part 68. That feeling youβre experiencing? Dread. You should be used to it by now. As is fast becoming an unofficial and, apparently, frowned upon tradition - we...
1
54
143
Advent of Pwn = daily @pwncollege challenges running from December 1-12 π https://t.co/TmzREOwovB
0
0
10