1. Cryptodad: Always store bitcoin in your own wallet! #bitcoin #securewallet #cryptocurrencywallet

    Cryptodad: Always store bitcoin in your own wallet! #bitcoin #securewallet #cryptocurrencywallet

    93
    1
  2. The New Tangem Wallet: CryptoDad's Guide to Seamless Seed Phrase Backups & More!

    The New Tangem Wallet: CryptoDad's Guide to Seamless Seed Phrase Backups & More!

    3
    0
    125
  3. Crypto Regulation & The Future Of CBDCs - Christopher Giancarlo AKA CryptoDad

    Crypto Regulation & The Future Of CBDCs - Christopher Giancarlo AKA CryptoDad

    121
  4. Doublespeak: Jailbreaking ChatGPT-style Sandboxes using Linguistic Hacks

    Doublespeak: Jailbreaking ChatGPT-style Sandboxes using Linguistic Hacks

    331
    2
  5. 15 - Authorisation Bypass (low/med/high) - Damn Vulnerable Web Application (DVWA)

    15 - Authorisation Bypass (low/med/high) - Damn Vulnerable Web Application (DVWA)

    358
  6. Tier 1: Three - HackTheBox Starting Point - Full Walkthrough

    Tier 1: Three - HackTheBox Starting Point - Full Walkthrough

    2
    0
    145
  7. CVE-2022-4510: Directory Traversal RCE in binwalk

    CVE-2022-4510: Directory Traversal RCE in binwalk

    69
  8. Dark Web Navigation: Safeguarding Your Privacy & Anonymity. CryptoDad's Complete Guide.

    Dark Web Navigation: Safeguarding Your Privacy & Anonymity. CryptoDad's Complete Guide.

    3
    0
    237
  9. Unity Game Hacking Challenge - "Azusawa’s Gacha World" [SekaiCTF]

    Unity Game Hacking Challenge - "Azusawa’s Gacha World" [SekaiCTF]

    2
    0
    85
    1
  10. Leaking Secret Data with a Heap Overflow - "Leek" Pwn Challenge [Angstrom CTF 2023]

    Leaking Secret Data with a Heap Overflow - "Leek" Pwn Challenge [Angstrom CTF 2023]

    53
  11. Heap Exploit (ret2win) - "Hellbound" Pwn Challenge [HackTheBox Cyber Apocalypse CTF 2022]

    Heap Exploit (ret2win) - "Hellbound" Pwn Challenge [HackTheBox Cyber Apocalypse CTF 2022]

    116
  12. Ultimate Privacy: CryptoDad's Tails OS Setup & Configuration Guide 🛡️💻

    Ultimate Privacy: CryptoDad's Tails OS Setup & Configuration Guide 🛡️💻

    161
  13. Cryptodad & Family Picking Cherries in Northern Michigan on the Mission Peninsula.

    Cryptodad & Family Picking Cherries in Northern Michigan on the Mission Peninsula.

    29
    4
    4
  14. Linked List Exploit Continued - GOT Overwrite - "Links 2+3" Pwn Challenge [ImaginaryCTF]

    Linked List Exploit Continued - GOT Overwrite - "Links 2+3" Pwn Challenge [ImaginaryCTF]

    190
  15. Exploiting a Use-After-Free (UAF) Vulnerability - "Unsubscriptions Are Free" Pwn Challenge [PicoGym]

    Exploiting a Use-After-Free (UAF) Vulnerability - "Unsubscriptions Are Free" Pwn Challenge [PicoGym]

    2
    0
    571
  16. HackTheBox Certified Penetration Testing Specialist (CPTS) - Review + Tips

    HackTheBox Certified Penetration Testing Specialist (CPTS) - Review + Tips

    5
    0
    310
  17. Crypto.com Visa Card Reward Update: How will the Changes Affect you?

    Crypto.com Visa Card Reward Update: How will the Changes Affect you?

    16
    1
    3
  18. Crypto.com Visa Card Review 2022: Upgrading to 40k Rose Gold Card

    Crypto.com Visa Card Review 2022: Upgrading to 40k Rose Gold Card

    16
    2
    7
  19. Emdee Five for Life [easy]: HackTheBox Misc Challenge (BeautifulSoup / Burp Intruder)

    Emdee Five for Life [easy]: HackTheBox Misc Challenge (BeautifulSoup / Burp Intruder)

    5
    0
    24
  20. Tier 2: Base - HackTheBox Starting Point - Full Walkthrough

    Tier 2: Base - HackTheBox Starting Point - Full Walkthrough

    52
  21. Crypto Currency Investing update from Your favorite cash flow specialist

    Crypto Currency Investing update from Your favorite cash flow specialist

    142
  22. Tier 1: Responder - HackTheBox Starting Point - Full Walkthrough

    Tier 1: Responder - HackTheBox Starting Point - Full Walkthrough

    73
  23. 10: Bypassing Stack Canaries (leak + write) - Buffer Overflows - Intro to Binary Exploitation (Pwn)

    10: Bypassing Stack Canaries (leak + write) - Buffer Overflows - Intro to Binary Exploitation (Pwn)

    36