🚀 We Successfully Hosted the ADWA CTF Challenge! 🛡️
We are thrilled to announce that the ADWA CTF Challenge was successfully hosted by @codencrax Team! 🎉 This event brought together cybersecurity enthusiasts, ethical hackers, and aspiring professionals to test their skills in areas such as Reverse Engineering, Binary Exploitation, Web Security, Cryptography, OSINT, Forensics and more.
A huge thank you to everyone who participated, collaborated, and contributed to making this challenge a success. Your enthusiasm and talent made the competition truly exciting and inspiring! 💻🔐
We look forward to organizing more events that foster learning, innovation, and cybersecurity excellence. Stay tuned for upcoming challenges!
Created by CodeNCrax Team. Thanks to INSA for giving us this opportunity!
#CyberSecurity #ADWA #CTF #EthicalHacking #codeNcrax #CyberAwareness
We are thrilled to announce that the ADWA CTF Challenge was successfully hosted by @codencrax Team! 🎉 This event brought together cybersecurity enthusiasts, ethical hackers, and aspiring professionals to test their skills in areas such as Reverse Engineering, Binary Exploitation, Web Security, Cryptography, OSINT, Forensics and more.
A huge thank you to everyone who participated, collaborated, and contributed to making this challenge a success. Your enthusiasm and talent made the competition truly exciting and inspiring! 💻🔐
We look forward to organizing more events that foster learning, innovation, and cybersecurity excellence. Stay tuned for upcoming challenges!
Created by CodeNCrax Team. Thanks to INSA for giving us this opportunity!
#CyberSecurity #ADWA #CTF #EthicalHacking #codeNcrax #CyberAwareness
🔥15
𝘾𝙤𝙙𝙚 𝙉 𝘾𝙧𝙖𝙭
Get Ready, Hackers!🚀 We’re thrilled to announce that, we are hosting our 2nd CTF Challenge! For summer program students only! Test your skills in binary exploitation, reverse engineering, web security, and more! Telegram | LinkedIn
Update:
INSA Summer program students you have exam tomorrow in the morning so the CTF will be after that! Please share it with your friends.
INSA Summer program students you have exam tomorrow in the morning so the CTF will be after that! Please share it with your friends.
🤝4👍2
The Vanished Admin
The admin of your channel has gone missing, but before disappearing, they left behind cryptic breadcrumbs scattered across posts. @ThreatXSecurity
The admin of your channel has gone missing, but before disappearing, they left behind cryptic breadcrumbs scattered across posts. @ThreatXSecurity
👍7😁3
🚨 Google patched 120 Android security flaws — including 2 already exploited in real-world attacks.
Hackers don’t need your clicks. They don’t need your permission. They’re already in.
Update immediately. Full story → https://thehackernews.com/2025/09/android-security-alert-google-patches.html
Hackers don’t need your clicks. They don’t need your permission. They’re already in.
Update immediately. Full story → https://thehackernews.com/2025/09/android-security-alert-google-patches.html
👀7❤1
Hello #Hackers 😎 are you up for the challenge?
#TinaMart says their system is rock solid. We say .... prove them wrong. 😉
Target : Tinamart.com
Report: cto@tinamart.com
PS. Valid reports #maybe rewarded!
By YEKOLO TEMARI
#TinaMart says their system is rock solid. We say .... prove them wrong. 😉
Target : Tinamart.com
Report: cto@tinamart.com
PS. Valid reports #maybe rewarded!
By YEKOLO TEMARI
🔥10🫡1
𝘾𝙤𝙙𝙚 𝙉 𝘾𝙧𝙖𝙭
Hello #Hackers 😎 are you up for the challenge? #TinaMart says their system is rock solid. We say .... prove them wrong. 😉 Target : Tinamart.com Report: cto@tinamart.com PS. Valid reports #maybe rewarded! By YEKOLO TEMARI
Hello Everyone,
It has come to our attention that, in the absence of a clearly defined Rules of Engagement document, it is not advisable to proceed with any system testing activities.
Until the necessary documentation is made available by the company, please #refrain from conducting any testing on their platform.
Thank you for your understanding and cooperation.
#cybersecurity #bugbounty
It has come to our attention that, in the absence of a clearly defined Rules of Engagement document, it is not advisable to proceed with any system testing activities.
Until the necessary documentation is made available by the company, please #refrain from conducting any testing on their platform.
Thank you for your understanding and cooperation.
#cybersecurity #bugbounty
👌5👍2❤1
𝘾𝙤𝙙𝙚 𝙉 𝘾𝙧𝙖𝙭
Hello Everyone, It has come to our attention that, in the absence of a clearly defined Rules of Engagement document, it is not advisable to proceed with any system testing activities. Until the necessary documentation is made available by the company, please…
Update
The bug bounty program for Tina Mart is temporarily paused. We'll let you know as soon as it's back up and running!
The bug bounty program for Tina Mart is temporarily paused. We'll let you know as soon as it's back up and running!
👍9
𝘾𝙤𝙙𝙚 𝙉 𝘾𝙧𝙖𝙭
Get Ready, Hackers!🚀 We’re thrilled to announce that, we are hosting our 2nd CTF Challenge! For summer program students only! Test your skills in binary exploitation, reverse engineering, web security, and more! Telegram | LinkedIn
A big thank you to everyone who participated in The ADWA CTF last week! 🥳
You all showed incredible skill and patience. We're getting a lot of requests to host more CTFs, so we'll be back soon with another challenge.
Until then, keep learning and keep hacking! Ethically, of course.
Code N Crax Team
Telegram | LinkedIn
You all showed incredible skill and patience. We're getting a lot of requests to host more CTFs, so we'll be back soon with another challenge.
Until then, keep learning and keep hacking! Ethically, of course.
Code N Crax Team
Telegram | LinkedIn
👍17🔥2🫡2
#NEWS
⚠️ Samsung just fixed a zero-day bug in Android 13–16.
Hackers were already using it to break in through a hidden image library 😳
If you’ve got a Galaxy, update ASAP. Don’t wait.
Here’s the full story → https://thehackernews.com/2025/09/samsung-fixes-critical-zero-day-cve.html
Telegram | LinkedIn
⚠️ Samsung just fixed a zero-day bug in Android 13–16.
Hackers were already using it to break in through a hidden image library 😳
If you’ve got a Galaxy, update ASAP. Don’t wait.
Here’s the full story → https://thehackernews.com/2025/09/samsung-fixes-critical-zero-day-cve.html
Telegram | LinkedIn
😭2👀2