Channels

CryptoCat

42 Followers

Islam Criticato

13 Followers

cryptoCatch

1 Follower

cryptocat

0 Followers
  1. Jalil Afridi ha criticato aspramente il portavoce di Biden Vedant Patel

    Jalil Afridi ha criticato aspramente il portavoce di Biden Vedant Patel

    1.84K
  2. 15 - Authorisation Bypass (low/med/high) - Damn Vulnerable Web Application (DVWA)

    15 - Authorisation Bypass (low/med/high) - Damn Vulnerable Web Application (DVWA)

    336
  3. Doublespeak: Jailbreaking ChatGPT-style Sandboxes using Linguistic Hacks

    Doublespeak: Jailbreaking ChatGPT-style Sandboxes using Linguistic Hacks

    302
    2
  4. HackTheBox Certified Penetration Testing Specialist (CPTS) - Review + Tips

    HackTheBox Certified Penetration Testing Specialist (CPTS) - Review + Tips

    5
    0
    307
  5. Tier 1: Three - HackTheBox Starting Point - Full Walkthrough

    Tier 1: Three - HackTheBox Starting Point - Full Walkthrough

    2
    0
    141
  6. Tier 1: Funnel - HackTheBox Starting Point - Full Walkthrough

    Tier 1: Funnel - HackTheBox Starting Point - Full Walkthrough

    156
    2
  7. HackTheBox Battlegrounds - Server Siege (Practice Mode)

    HackTheBox Battlegrounds - Server Siege (Practice Mode)

    51
  8. Tier 0: Mongod - HackTheBox Starting Point - Full Walkthrough

    Tier 0: Mongod - HackTheBox Starting Point - Full Walkthrough

    94
  9. CVE-2022-4510: Directory Traversal RCE in binwalk

    CVE-2022-4510: Directory Traversal RCE in binwalk

    62
  10. Tier 0: Synced - HackTheBox Starting Point - Full Walkthrough

    Tier 0: Synced - HackTheBox Starting Point - Full Walkthrough

    80
  11. Intergalactic Recovery [easy]: HackTheBox Forensics Challenge (RAID 5 Disk Recovery)

    Intergalactic Recovery [easy]: HackTheBox Forensics Challenge (RAID 5 Disk Recovery)

    65
  12. 16 - Open Redirect (low/med/high) - Damn Vulnerable Web Application (DVWA)

    16 - Open Redirect (low/med/high) - Damn Vulnerable Web Application (DVWA)

    27
  13. NahamConCTF 2022: Web Challenge Walkthroughs

    NahamConCTF 2022: Web Challenge Walkthroughs

    8
    1
    27
  14. Exploiting a Vulnerable Linked List Implementation - "Links 1" Pwn Challenge [ImaginaryCTF]

    Exploiting a Vulnerable Linked List Implementation - "Links 1" Pwn Challenge [ImaginaryCTF]

    28
  15. Tier 0: Redeemer - HackTheBox Starting Point - Full Walkthrough

    Tier 0: Redeemer - HackTheBox Starting Point - Full Walkthrough

    81
  16. Teleporting Through Walls with Cheat Engine - "No Way Out" [PicoCTF 2023]

    Teleporting Through Walls with Cheat Engine - "No Way Out" [PicoCTF 2023]

    54
  17. Leaking Secret Data with a Heap Overflow - "Leek" Pwn Challenge [Angstrom CTF 2023]

    Leaking Secret Data with a Heap Overflow - "Leek" Pwn Challenge [Angstrom CTF 2023]

    46
  18. Unity Game Hacking Challenge - "Azusawa’s Gacha World" [SekaiCTF]

    Unity Game Hacking Challenge - "Azusawa’s Gacha World" [SekaiCTF]

    2
    0
    76
    1
  19. Linked List Exploit Continued - GOT Overwrite - "Links 2+3" Pwn Challenge [ImaginaryCTF]

    Linked List Exploit Continued - GOT Overwrite - "Links 2+3" Pwn Challenge [ImaginaryCTF]

    190
  20. Exploiting a Use-After-Free (UAF) Vulnerability - "Unsubscriptions Are Free" Pwn Challenge [PicoGym]

    Exploiting a Use-After-Free (UAF) Vulnerability - "Unsubscriptions Are Free" Pwn Challenge [PicoGym]

    2
    0
    571
  21. Emdee Five for Life [easy]: HackTheBox Misc Challenge (BeautifulSoup / Burp Intruder)

    Emdee Five for Life [easy]: HackTheBox Misc Challenge (BeautifulSoup / Burp Intruder)

    5
    0
    24
  22. Tier 2: Base - HackTheBox Starting Point - Full Walkthrough

    Tier 2: Base - HackTheBox Starting Point - Full Walkthrough

    52
  23. Binary Exploitation (Pwn) Challenge Walkthroughs - PicoCTF 2022 (BEGINNER-FRIENDLY Capture The Flag)

    Binary Exploitation (Pwn) Challenge Walkthroughs - PicoCTF 2022 (BEGINNER-FRIENDLY Capture The Flag)

    6
    0
    54
  24. Tier 1: Responder - HackTheBox Starting Point - Full Walkthrough

    Tier 1: Responder - HackTheBox Starting Point - Full Walkthrough

    73
  25. 10: Bypassing Stack Canaries (leak + write) - Buffer Overflows - Intro to Binary Exploitation (Pwn)

    10: Bypassing Stack Canaries (leak + write) - Buffer Overflows - Intro to Binary Exploitation (Pwn)

    36