CryptoCat's Avatar

CryptoCat

@cryptocat.me

Security Researcher @rapid7.com ๐Ÿ˜ˆ Hacking Content @ https://yt.cryptocat.me ๐Ÿ’œ

487
Followers
84
Following
128
Posts
13.06.2023
Joined
Posts Following

Latest posts by CryptoCat @cryptocat.me

Preview
Look What You Made Us Patch: 2025 Zero-Days in Review | Google Cloud Blog Our analysis of 90 zero-day vulnerabilities tracked in 2025, focusing on techniques and how AI will accelerate the vulnerability landscape.

"For the first time since we began tracking zero-day exploitation, we attributed more zero-days to commercial surveillance vendors than to traditional state-sponsored cyber espionage groups."

Love to see the stats backing up my hunch.

cloud.google.com/blog/topics/...

05.03.2026 19:43 ๐Ÿ‘ 79 ๐Ÿ” 34 ๐Ÿ’ฌ 4 ๐Ÿ“Œ 0
Preview
CVE-2026-1731 | AttackerKB On February 6, 2026, BeyondTrust published an advisory for a new critical command injection vulnerability, CVE-2026-1731, affecting their products Remote Suppoโ€ฆ

Check out the full @rapid7.com technical analysis! attackerkb.com/topics/jNMBc...

04.03.2026 09:37 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
CVE-2026-1731 Metasploit module demo

CVE-2026-1731 Metasploit module demo

My first @metasploit-r7.bsky.social module is live! You can now exploit CVE-2026-1731 (BeyondTrust command injection) with the latest version ๐Ÿ˜Ž

04.03.2026 09:36 ๐Ÿ‘ 3 ๐Ÿ” 2 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Preview
Stored XSS + JSONP Callback Injection to Cookie Exfiltration | Intigriti 02-26: InkDrop | CryptoCat's Blog Intigriti 02-26 writeup: unsafe markdown rendering leads to stored XSS, which is executed via a client-side script reinjection gadget loading /api JSONP, allowing CSP bypass and bot flag cookie exfilt...

My writeup for @intigriti.com's "InkDrop" challenge ๐Ÿ–‹

cryptocat.me/blog/ctf/mon...

25.02.2026 11:04 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Post image

๐Ÿšจ In conducting 0 day research against #Grandstream GXP1600 VoIP phones, Rapid7 Labs discovered CVE-2026-2329.

The unauthenticated stack-based buffer overflow vulnerability ultimately allows an attacker to intercept phone calls and eavesdrop on audio. Read on: r-7.co/4tIzope

18.02.2026 14:15 ๐Ÿ‘ 1 ๐Ÿ” 2 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
Ruby Object Injection to RCE via Oj Deserialization | YesWeHack Dojo: RubitMQ | CryptoCat's Blog YesWeHack Dojo #48 writeup: exploiting unsafe Oj.load deserialization to inject a Node gadget and achieve command execution via find -exec.

My writeup for the "RubitMQ" challenge by @yeswehack.bsky.social ๐Ÿ‡

cryptocat.me/blog/ctf/mon...

#ctf #capturetheflag #bugbounty #ethicalhacking #cybersecurity #infosec #yeswehack

17.02.2026 18:16 ๐Ÿ‘ 0 ๐Ÿ” 1 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
Top 10 web hacking techniques of 2025 Welcome to the Top 10 Web Hacking Techniques of 2025, the 19th edition of our annual community-powered effort to identify the most innovative must-read web security research published in the last year

The voting has concluded, and we're thrilled to announce the top ten web hacking techniques of 2025! Massive thanks to everyone in the community for sharing their hard-earned discoveries, plus the panel and everyone who nominated or voted! portswigger.net/research/top...

05.02.2026 15:40 ๐Ÿ‘ 10 ๐Ÿ” 7 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
CryptoCat x Rapid7 ๐Ÿงก

CryptoCat x Rapid7 ๐Ÿงก

Couldn't be more excited to announce I'm joining the vulnerability research team at @rapid7.com next week! ๐Ÿฅณ

Really looking forward to teaming up with some seriously talented researchers and digging into real-world threats and vulnerabilities. Stay tuned ๐Ÿ˜Ž

05.02.2026 10:37 ๐Ÿ‘ 2 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
Race Condition via GraphQL Aliases | YesWeHack 11-25: APICrash | CryptoCat's Blog YesWeHack Dojo 11-25 writeup: exploiting unsynchronised threaded TinyDB writes via GraphQL aliases to corrupt storage and trigger error-based flag disclosure.

My writeup for the "APICrash" challenge from @yeswehack.bsky.social ๐Ÿ’ฅ

cryptocat.me/blog/ctf/mon...

13.01.2026 11:24 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Video thumbnail

At least four videos show what really happened when ICE shot a woman in Minneapolis on Wednesday. DHS has established itself as an agency that cannot be trusted to live in or present reality. @evystadium.bsky.social has more.

Full story by @josephcox.bsky.social: www.404media.co/dhs-is-lying...

07.01.2026 23:49 ๐Ÿ‘ 1309 ๐Ÿ” 428 ๐Ÿ’ฌ 20 ๐Ÿ“Œ 12
Post image Post image

Happy new year!! ๐Ÿฅณ๐ŸŽ‰

31.12.2025 23:59 ๐Ÿ‘ 2 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

I'm already glad I did this, but honestly I would have been happy to leave my content on Gitbook.

The problem was that Google refused to index a single page in the 1+ year since I connected my own [sub]domain to Gitbook.

Up until then, indexing worked without any issues ๐Ÿ˜ซ

31.12.2025 12:43 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
New blog live @ https://cryptocat.me/blog/ ๐Ÿ’œ

New blog live @ https://cryptocat.me/blog/ ๐Ÿ’œ

I've been working hard to move my written content from gitbook over to my own website ๐Ÿ‘ทโ€โ™‚๏ธ

It's still a work in progress, but I'm pretty happy with the results so far ๐Ÿ™‚

๐Ÿ”— cryptocat.me/blog/

31.12.2025 12:43 ๐Ÿ‘ 2 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Hacky Christmas ๐ŸŽ„

Hacky Christmas ๐ŸŽ„

Wishing a very hacky christmas to all the hacker fam! ๐ŸŽ…

25.12.2025 10:02 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Manipulating Memory with Cheat Engine - Hacky Christmas [NahamCon 2025 CTF]
Manipulating Memory with Cheat Engine - Hacky Christmas [NahamCon 2025 CTF] YouTube video by CryptoCat

Video walkthrough for the Hacky Christmas challenge I made for #NahamCon2025 ๐Ÿ˜‡

youtu.be/fs9WeNkUB4M

19.12.2025 16:21 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Hacky Christmas Challenge [gamepwn]

Hacky Christmas Challenge [gamepwn]

The #NahamCon2025 CTF is over โœ… Writeups for my challs ๐Ÿ‘‡

๐ŸŽฎ Hacky Christmas โžก book.cryptocat.me/blog/ctf/202...

๐Ÿ’ฅ VulnBank โžก book.cryptocat.me/blog/ctf/202...

๐Ÿ’ฅ Snorex 2K CCTV โžก book.cryptocat.me/blog/ctf/202...

Stay tuned for a video walkthrough of Hacky Christmas ๐ŸŽ…๐ŸŽ„

18.12.2025 21:19 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Video thumbnail

I made a couple of [easy-med] challenges for #NahamCon2025 - you've got 24 hours! ๐Ÿ’œ

๐ŸŽฎ ctf.nahamcon.com/hubs/hacky-c...
๐Ÿ’ฅ ctf.nahamcon.com/hubs/vuln-bank
๐Ÿ’ฅ ctf.nahamcon.com/hubs/snorex-...

Here's a sneak peek at Hacky Christmas ๐ŸŽ… Can you escape the ice box and take out 1 MILLION gingerbread men? ๐ŸŽ„

17.12.2025 20:40 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

I also made some challenges for #NahamCon2025, hope you will check them out! ๐ŸŽ…

16.12.2025 15:45 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

Awww thank you! For now you'll have to find me at a hacking con ๐Ÿ˜‰ Next time I run a CTF challenge, I'll send some out as prizes too ๐Ÿ‘€

12.12.2025 07:30 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Video thumbnail

๐ŸŒˆโœจ๏ธ

11.12.2025 16:13 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Video thumbnail

New stickers ๐Ÿ˜ผ

11.12.2025 16:08 ๐Ÿ‘ 3 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Mother Printers (Print2Own) - Full Exploit Chain Walkthrough [HackingHub]
Mother Printers (Print2Own) - Full Exploit Chain Walkthrough [HackingHub] YouTube video by CryptoCat

New video covering the solution to the Mother Printers challenge I created for @hackinghub.bsky.social ๐Ÿ’œ

Tried to make it as beginner friendly as possible as I know many players aren't familiar with rev/pwn ๐Ÿ˜‡

youtu.be/ebNYtX_8lOY

01.12.2025 14:08 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

You can still play the challenge for free! app.hackinghub.io/hubs/mother-...

27.11.2025 10:39 ๐Ÿ‘ 2 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
Preview
GitHub - sfewer-r7/BrotherVulnerabilities: Multiple Brother Devices: Multiple Vulnerabilities (CVE-2024-51977, CVE-2024-51978, CVE-2024-51979, CVE-2024-51980, CVE-2024-51981, CVE-2024-51982, CVE-2024-... Multiple Brother Devices: Multiple Vulnerabilities (CVE-2024-51977, CVE-2024-51978, CVE-2024-51979, CVE-2024-51980, CVE-2024-51981, CVE-2024-51982, CVE-2024-51983, CVE-2024-51984) - sfewer-r7/Broth...

Shout-out to @stephenfewer.bsky.social and STAR Labs - their awesome research was the inspiration behind the theme of this challenge ๐Ÿ’œ

github.com/sfewer-r7/Br...
starlabs.sg/blog/2025/11...

27.11.2025 10:39 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Mother Printers challenge PoC ๐Ÿ’œ

Mother Printers challenge PoC ๐Ÿ’œ

Didn't get chance to solve my "Mothers Printers" challenge on @hackinghub.bsky.social? ๐Ÿ–จ

Here's the official writeup โžก book.cryptocat.me/blog/ctf/mon...

Prefer video? Stay tuned for a beginner-friendly walkthrough on YT next week โ–ถ

27.11.2025 10:39 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0

Time to drop a couple of hints for my @hackinghub.bsky.social challenge!

1๏ธโƒฃ First flag is on the website (you need to find it before flag 3/4/5)
2๏ธโƒฃ The chall is inspired by some cool research I read (go find it)

Writeups will be published once we hit 10 solves โžก app.hackinghub.io/hubs/mother-...

18.11.2025 11:42 ๐Ÿ‘ 0 ๐Ÿ” 1 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0
First blood on https://app.hackinghub.io/hubs/mother-printers

First blood on https://app.hackinghub.io/hubs/mother-printers

Congratulations to Bhavya for being the first to capture all 5 flags on my @hackinghub.bsky.social challenge! ๐Ÿฅณ๐ŸŽ‰

We've released a small patch. If you were stuck on flag 3, please re-download files! Good time to practice your patch-diffing ๐Ÿ‘€

app.hackinghub.io/hubs/mother-...

14.11.2025 14:03 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 0 ๐Ÿ“Œ 0

Honestly I never bothered working out how to use ghidra with debugger ๐Ÿ˜… I just use it for reversing then run gdb (pwndbg) for the breakpoints and debugging

14.11.2025 13:13 ๐Ÿ‘ 0 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0

Yayyy ๐Ÿฅฐ

13.11.2025 16:30 ๐Ÿ‘ 1 ๐Ÿ” 0 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0
Post image

So, who's gonna blood my new @hackinghub.bsky.social challenge? ๐Ÿ˜ผ

Challenge ๐Ÿ”— app.hackinghub.io/hubs/mother-...

First 3 solves will earn the "Hacker Cat" role in my discord server โžก๏ธ discord.cryptocat.me

#ctf #capturetheflag #ethicalhacking #cybersecurity #infosec #offsec

13.11.2025 14:52 ๐Ÿ‘ 1 ๐Ÿ” 1 ๐Ÿ’ฌ 1 ๐Ÿ“Œ 0