#TryHackMe

2025-05-24

Today on the IC_Null strimmz: We'll talk certifications framed by the #tryHackMe PT1 cert released this week. We'll do some THM rooms while discussing the #accessibility obstacles in certs by #offSec, #COMPTIA etc. when using a #screenReader. I'm trying a new timeslot for these so would love to see if saturday's easier for folks wanting to see this kind of thing. We're starting in an hour over at twitch.tv/ic_null and/or youtube.com/@blindlyCoding #goingLive #selfPromo #cybersecurity #shamelessPlug #infoSec #whateverOtherHashtagsWeAreMeantToUseTheseDays

🌱 Ligniform :donor:​ligniform@infosec.exchange
2025-04-18

My new #blog post got accepted as a write-up featured on a #TryHackMe room. Hell yeah baby.

ligniform.blog/posts/ms-sentin

Arthur Lutz (Zenika)arthurzenika@pouet.chapril.org
2025-03-28

Très content d'avoir obtenu une nouvelle certification auprès de TryHackMe : SOC (Security Operations Center) Level 1. 🏅

Il s'agit d'un cursus de Cyber qui se focalise sur l'approche défensive (Blue Team 🔵), avec plein de contenus sur la défense et l'investigation. Et plein de chouettes technologies dedans : MITRE, OSInt, Yara, MISP, Snort, Zeek, Brim, Wireshark, tshark, osquery, wazuh, ELK, Splunk, Autopsy, Volatility, Velociraptor, PhishTool, etc.

tryhackme.com/certificate/THM-

#TryHackMe

Certificat de suivi d'un cursus TryHackMe
k-kaufholdx64_RAX
2025-03-23

Ich habe zum Raum: tryhackme.com/room/blockroom
eine deutschsprachige Anleitung (write-up) erstellt. Dieses findest du hier:
k-kaufhold.github.io/content/w

Block Room -> TryHackMe
2025-03-18

I completed the Basic Static Analysis #tryhackme Room

Learn basic malware analysis techniques without running the malware.

#malware #blueteam
@RealTryHackMe

tryhackme.com/r/room/staticana

2025-03-14

Completed 'Abusing Windows Internals' on #TryHackMe! Windows internals—processes, DLLs, PE format—are prime targets for attackers to hide code & evade detection. Learned to exploit these vulnerabilities & apply mitigations. #Cybersecurity #WindowsSecurity

www.tryhackme.com/r/room/abusingwindowsinternals?utm_campaign=social_share&utm_medium=social&utm_source=twitter

2025-03-11

[ 3時間でハッキング実践入門【総集編#0~#10】#サイバーセキュリティ #プログラミング #tryhackme ]
https://youtube.com/watch?v=eI91fFbBE38
:有益情報:

2025-03-09

Finshed 'Registry Persistence Detection' on @TryHackMe
! Explored malware persistence techniques & learned to use AutoRuns PS module to detect & remove Registry-based mechanisms. #cybersecurity #malware #TryHackMe

www.tryhackme.com/r/room/registrypersistencedetection?utm_campaign=social_share&utm_medium=social&utm_source=twitter

2025-03-08

Completed a TryHackMe room on Memory Forensics! Learned basic concepts, environment setup, gathering info from a compromised Windows target, searching for suspicious activity, and extracting/analyzing data to identify potential malicious actors.

#tryhackme

www.tryhackme.com/r/room/critical

2025-03-08

Finished the Jr Penetration Tester Learning path on @realtryhackme after the Cyber Security 101. I’ve learned a lot. I like that there are a lot of challenges to practice.
#pentesting #learning #tryhackme
gyorban.net/micro/iesn-thm-jr-

2025-03-04

#tryHackMe has a new certification out, the Security Analyst Level 1 or #SAL1 for short. I will NOT be covering it on my channel to assess its #accessibility for #screenReader users, because in a sense I already have. I did a stream on their #SOC simulator recently which is a big part of this cert, and that was a disaster. Add to that that on the "About' page, they couldn't even be bothered to #altText the one logo in the descriptive text makes me feel it is utterly unnecessary to even give this a chance. It's a #fail. plain and simple.

2025-02-27

We are celebrating our 400th issue of the Linux Update newsletter! Check out this week's feature from Chris Binnie on ethical hacking. Thank you to our readers and partners for your continued support!
mailchi.mp/linux-magazine.com/
#TryHackMe #Linux #OpenSource #newsletter #EthicalHacking #Ubuntu #GNOME #Bash #LibreWolf #jobs #events #PyConUS #LAS2025

Celebrating 400 Issues | LINUX UPDATE: Delivering news and information on Linux and open source every week!
2025-02-23
I just read this (now deleted) question on Reddit:

"Wich One İs better Hack the box Or Try Hack me?" (sic!)

This may be unpopular, but IMO
1) Nothing beats building your own environments, as you'll learn *how* the stuff works and *why* misconfigs happen.
2) Real targets rarely have as limited attack surfaces as these lab machines. A crucial skill is to filter the data you get from initial scans (IIRC OSCP labs were more realisting in this aspect).

#TryHackMe #HackTheBox #pentest #training
hubertfhubertf
2025-02-18

Mein TryHackMe StuxCTF WriteUp ist jetzt verlinkt

G33kst4 :verified:geeksta@hachyderm.io
2025-02-17

Geeksta CyberLab today: testing out TryHackMe 🔥💻
I’ll be diving into challenges, learning new things, and seeing how far we can push it. If you're into cybersecurity, I’ll be live—just putting it out there.

youtube.com/@geekstaparadise

#GeekstaCyberLab #TryHackMe #Cybersecurity

2025-02-16

I just wanted you to know that doing #thm learning paths can be used to gain #cpe for #isc2.

#cissp #ccsp #tryhackme #infosec

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst