Advertisement ยท 728 ร— 90

Posts by CryptoCat

Video

โ–ถ๏ธ Now Playing: Telecom Sleeper Cells, SD-WAN Bypasses, & LLM Bug Bounties.

In Episode 2 of Hacktics and Telemetry, Douglas McKee & @cryptocat.me continue to bring you the latest in cybersecurity news, vuln research, and actionable defensive strategies: https://r-7.co/4sTbDu5

2 weeks ago 2 1 0 0
Preview
Argument Injection via Wildcard Expansion | YesWeHack Dojo 49: Secret Manager | CryptoCat's Blog YesWeHack Dojo #49 writeup: exploiting wildcard argument injection in shell cp and grep commands to access internal secrets

My writeup for the "Secret Manager" challenge by zerodaygym (@yeswehack.bsky.social) ๐Ÿคซ

cryptocat.me/blog/ctf/mon...

3 weeks ago 0 1 0 0
โ˜˜๐Ÿ˜บโ˜˜

โ˜˜๐Ÿ˜บโ˜˜

Happy St Patrick's day โ˜˜

4 weeks ago 3 1 0 0
Post image

๐ŸŽค๐Ÿ‘พ Introducing Hacktics and Telemetry, a bi-weekly video and audio podcast out of Rapid7 Labs, starring Rapid7's Doug McKee (fulmetalpackets) & Jonah Burgess (@cryptocat.me)!

๐Ÿงต Find episode 1's companion blog here: r-7.co/4di8tuH
โ–ถ๏ธ Or dive right into the full vid on YouTube: r-7.co/3NiQfP2

1 month ago 3 2 0 0
Preview
GitHub - sfewer-r7/CVE-2026-20127: An exploit for the Cisco Catalyst SD-WAN Controller authentication bypass vulnerability, CVE-2026-20127 An exploit for the Cisco Catalyst SD-WAN Controller authentication bypass vulnerability, CVE-2026-20127 - sfewer-r7/CVE-2026-20127

PoC from @stephenfewer.bsky.social ๐Ÿ”ฅ

github.com/sfewer-r7/CV...

1 month ago 1 0 0 0
Preview
CVE-2026-20127 | AttackerKB ## Overview On 25th February 2026, Cisco published an advisory for CVE-2026-20127, a critical authentication bypass vulnerability in the vdaemon service of Cisโ€ฆ

๐Ÿšจ CVE-2026-20127: Cisco SD-WAN authentication bypass. An unauthenticated attacker can inject SSH keys without crypto verification via a flawed state machine. Active exploitation by UAT-8616 since 2023 ๐Ÿ’€

Check out the full @rapid7.com analysis ๐Ÿ‘‡

attackerkb.com/topics/bP3FM...

1 month ago 2 0 1 1
Post image Post image

BREAKING: powerful iPhone hacking tools used by Chinese criminals originated from US defense giant L3 Harris.

Their zero-click exploits went to Russian spies too.

Unbelievable harm to our collective security.

Scoop: @lorenzofb.bsky.social, here's why it matters 1/
techcrunch.com/2026/03/09/a...

1 month ago 497 249 5 21
Preview
Look What You Made Us Patch: 2025 Zero-Days in Review | Google Cloud Blog Our analysis of 90 zero-day vulnerabilities tracked in 2025, focusing on techniques and how AI will accelerate the vulnerability landscape.

"For the first time since we began tracking zero-day exploitation, we attributed more zero-days to commercial surveillance vendors than to traditional state-sponsored cyber espionage groups."

Love to see the stats backing up my hunch.

cloud.google.com/blog/topics/...

1 month ago 77 35 4 0
Preview
CVE-2026-1731 | AttackerKB On February 6, 2026, BeyondTrust published an advisory for a new critical command injection vulnerability, CVE-2026-1731, affecting their products Remote Suppoโ€ฆ

Check out the full @rapid7.com technical analysis! attackerkb.com/topics/jNMBc...

1 month ago 0 0 0 0
CVE-2026-1731 Metasploit module demo

CVE-2026-1731 Metasploit module demo

My first @metasploit-r7.bsky.social module is live! You can now exploit CVE-2026-1731 (BeyondTrust command injection) with the latest version ๐Ÿ˜Ž

1 month ago 3 2 1 0
Advertisement
Preview
Stored XSS + JSONP Callback Injection to Cookie Exfiltration | Intigriti 02-26: InkDrop | CryptoCat's Blog Intigriti 02-26 writeup: unsafe markdown rendering leads to stored XSS, which is executed via a client-side script reinjection gadget loading /api JSONP, allowing CSP bypass and bot flag cookie exfilt...

My writeup for @intigriti.com's "InkDrop" challenge ๐Ÿ–‹

cryptocat.me/blog/ctf/mon...

1 month ago 1 1 0 0
Post image

๐Ÿšจ In conducting 0 day research against #Grandstream GXP1600 VoIP phones, Rapid7 Labs discovered CVE-2026-2329.

The unauthenticated stack-based buffer overflow vulnerability ultimately allows an attacker to intercept phone calls and eavesdrop on audio. Read on: r-7.co/4tIzope

1 month ago 1 2 0 0
Preview
Ruby Object Injection to RCE via Oj Deserialization | YesWeHack Dojo: RubitMQ | CryptoCat's Blog YesWeHack Dojo #48 writeup: exploiting unsafe Oj.load deserialization to inject a Node gadget and achieve command execution via find -exec.

My writeup for the "RubitMQ" challenge by @yeswehack.bsky.social ๐Ÿ‡

cryptocat.me/blog/ctf/mon...

#ctf #capturetheflag #bugbounty #ethicalhacking #cybersecurity #infosec #yeswehack

1 month ago 0 1 0 0
Preview
Top 10 web hacking techniques of 2025 Welcome to the Top 10 Web Hacking Techniques of 2025, the 19th edition of our annual community-powered effort to identify the most innovative must-read web security research published in the last year

The voting has concluded, and we're thrilled to announce the top ten web hacking techniques of 2025! Massive thanks to everyone in the community for sharing their hard-earned discoveries, plus the panel and everyone who nominated or voted! portswigger.net/research/top...

2 months ago 10 7 1 0
CryptoCat x Rapid7 ๐Ÿงก

CryptoCat x Rapid7 ๐Ÿงก

Couldn't be more excited to announce I'm joining the vulnerability research team at @rapid7.com next week! ๐Ÿฅณ

Really looking forward to teaming up with some seriously talented researchers and digging into real-world threats and vulnerabilities. Stay tuned ๐Ÿ˜Ž

2 months ago 2 0 0 0
Preview
Race Condition via GraphQL Aliases | YesWeHack 11-25: APICrash | CryptoCat's Blog YesWeHack Dojo 11-25 writeup: exploiting unsynchronised threaded TinyDB writes via GraphQL aliases to corrupt storage and trigger error-based flag disclosure.

My writeup for the "APICrash" challenge from @yeswehack.bsky.social ๐Ÿ’ฅ

cryptocat.me/blog/ctf/mon...

3 months ago 0 0 0 0
Video

At least four videos show what really happened when ICE shot a woman in Minneapolis on Wednesday. DHS has established itself as an agency that cannot be trusted to live in or present reality. @evystadium.bsky.social has more.

Full story by @josephcox.bsky.social: www.404media.co/dhs-is-lying...

3 months ago 1308 427 20 12
Advertisement
Post image Post image

Happy new year!! ๐Ÿฅณ๐ŸŽ‰

3 months ago 2 0 0 0

I'm already glad I did this, but honestly I would have been happy to leave my content on Gitbook.

The problem was that Google refused to index a single page in the 1+ year since I connected my own [sub]domain to Gitbook.

Up until then, indexing worked without any issues ๐Ÿ˜ซ

3 months ago 1 0 0 0
New blog live @ https://cryptocat.me/blog/ ๐Ÿ’œ

New blog live @ https://cryptocat.me/blog/ ๐Ÿ’œ

I've been working hard to move my written content from gitbook over to my own website ๐Ÿ‘ทโ€โ™‚๏ธ

It's still a work in progress, but I'm pretty happy with the results so far ๐Ÿ™‚

๐Ÿ”— cryptocat.me/blog/

3 months ago 2 0 1 0
Hacky Christmas ๐ŸŽ„

Hacky Christmas ๐ŸŽ„

Wishing a very hacky christmas to all the hacker fam! ๐ŸŽ…

3 months ago 1 0 0 0
Manipulating Memory with Cheat Engine - Hacky Christmas [NahamCon 2025 CTF]
Manipulating Memory with Cheat Engine - Hacky Christmas [NahamCon 2025 CTF] YouTube video by CryptoCat

Video walkthrough for the Hacky Christmas challenge I made for #NahamCon2025 ๐Ÿ˜‡

youtu.be/fs9WeNkUB4M

3 months ago 0 0 0 0
Hacky Christmas Challenge [gamepwn]

Hacky Christmas Challenge [gamepwn]

The #NahamCon2025 CTF is over โœ… Writeups for my challs ๐Ÿ‘‡

๐ŸŽฎ Hacky Christmas โžก book.cryptocat.me/blog/ctf/202...

๐Ÿ’ฅ VulnBank โžก book.cryptocat.me/blog/ctf/202...

๐Ÿ’ฅ Snorex 2K CCTV โžก book.cryptocat.me/blog/ctf/202...

Stay tuned for a video walkthrough of Hacky Christmas ๐ŸŽ…๐ŸŽ„

3 months ago 0 0 0 0
Video

I made a couple of [easy-med] challenges for #NahamCon2025 - you've got 24 hours! ๐Ÿ’œ

๐ŸŽฎ ctf.nahamcon.com/hubs/hacky-c...
๐Ÿ’ฅ ctf.nahamcon.com/hubs/vuln-bank
๐Ÿ’ฅ ctf.nahamcon.com/hubs/snorex-...

Here's a sneak peek at Hacky Christmas ๐ŸŽ… Can you escape the ice box and take out 1 MILLION gingerbread men? ๐ŸŽ„

3 months ago 1 0 0 0
Advertisement

I also made some challenges for #NahamCon2025, hope you will check them out! ๐ŸŽ…

3 months ago 1 0 0 0

Awww thank you! For now you'll have to find me at a hacking con ๐Ÿ˜‰ Next time I run a CTF challenge, I'll send some out as prizes too ๐Ÿ‘€

4 months ago 1 0 0 0
Video

๐ŸŒˆโœจ๏ธ

4 months ago 1 0 1 0
Video

New stickers ๐Ÿ˜ผ

4 months ago 3 0 1 0
Mother Printers (Print2Own) - Full Exploit Chain Walkthrough [HackingHub]
Mother Printers (Print2Own) - Full Exploit Chain Walkthrough [HackingHub] YouTube video by CryptoCat

New video covering the solution to the Mother Printers challenge I created for @hackinghub.bsky.social ๐Ÿ’œ

Tried to make it as beginner friendly as possible as I know many players aren't familiar with rev/pwn ๐Ÿ˜‡

youtu.be/ebNYtX_8lOY

4 months ago 1 0 0 0

You can still play the challenge for free! app.hackinghub.io/hubs/mother-...

4 months ago 2 0 0 0