#Tryhackme

2025-06-26

🚀 First steps in my red team lab today:

Set up Burp Suite locally

Hit TryHackMe’s OWASP Juice Shop

Worked around free-tier browser limitations by switching to OpenVPN + local tools

Small step, but important — building a real offensive workflow from scratch.

#RedTeam #TryHackMe #BurpSuite #AppSec #LearningInPublic #DEFCON32 #HackerJourney

🌱 Ligniform :donor:​ligniform@infosec.exchange
2025-06-25

Dopamine engine go brrr

#InfoSec #TryHackMe #CyberSecurity

Dark blue/navy background of a popup on TryHack me. Green text reads "172" with a green flame icon. Smaller white text to the right reads "Your streak has increased. You're 8 streaks away from a badge!"
Wen Bin :verified:kongwenbin@infosec.exchange
2025-06-10

🚨 Want to start learning ethical web hacking for FREE?

🎯 In this video, I break down 3 websites that offer hands-on labs, structured paths, and gamified learning - perfect for beginners in web application penetration testing and bug bounty!

🎓 Here’s who made the list:

✅ PortSwigger Web Security Academy
Learn real-world web vulnerabilities with interactive labs

✅ TryHackMe
Gamified challenges + guided learning paths

✅ Hack The Box
Academy modules, practice labs & certifications — all linked together

But I didn’t stop at listing them.

💡 I shared my professional take on:
1️⃣ Their unique strengths
2️⃣ What makes each platform great for beginners
3️⃣ And where they could improve to become even better

This isn't just another list — they are insights from an active bug bounty hunter from Singapore 🇸🇬😊

📺 Watch here: youtube.com/watch?v=_LrpMiAD8rg
📌 Timestamps and useful links in the video description

👇 Comment your favorite FREE hacking resources — let's share and help each other grow!

#BugBounty #BugBountyTips #CyberSecurity #EthicalHacking #TryHackMe #HackTheBox #PortSwigger

2025-05-24

Today on the IC_Null strimmz: We'll talk certifications framed by the #tryHackMe PT1 cert released this week. We'll do some THM rooms while discussing the #accessibility obstacles in certs by #offSec, #COMPTIA etc. when using a #screenReader. I'm trying a new timeslot for these so would love to see if saturday's easier for folks wanting to see this kind of thing. We're starting in an hour over at twitch.tv/ic_null and/or youtube.com/@blindlyCoding #goingLive #selfPromo #cybersecurity #shamelessPlug #infoSec #whateverOtherHashtagsWeAreMeantToUseTheseDays

🌱 Ligniform :donor:​ligniform@infosec.exchange
2025-04-18

My new #blog post got accepted as a write-up featured on a #TryHackMe room. Hell yeah baby.

ligniform.blog/posts/ms-sentin

Arthur Lutz (Zenika)arthurzenika@pouet.chapril.org
2025-03-28

Très content d'avoir obtenu une nouvelle certification auprès de TryHackMe : SOC (Security Operations Center) Level 1. 🏅

Il s'agit d'un cursus de Cyber qui se focalise sur l'approche défensive (Blue Team 🔵), avec plein de contenus sur la défense et l'investigation. Et plein de chouettes technologies dedans : MITRE, OSInt, Yara, MISP, Snort, Zeek, Brim, Wireshark, tshark, osquery, wazuh, ELK, Splunk, Autopsy, Volatility, Velociraptor, PhishTool, etc.

tryhackme.com/certificate/THM-

#TryHackMe

Certificat de suivi d'un cursus TryHackMe
k-kaufholdx64_RAX
2025-03-23

Ich habe zum Raum: tryhackme.com/room/blockroom
eine deutschsprachige Anleitung (write-up) erstellt. Dieses findest du hier:
k-kaufhold.github.io/content/w

Block Room -> TryHackMe
2025-03-18

I completed the Basic Static Analysis #tryhackme Room

Learn basic malware analysis techniques without running the malware.

#malware #blueteam
@RealTryHackMe

tryhackme.com/r/room/staticana

2025-03-14

Completed 'Abusing Windows Internals' on #TryHackMe! Windows internals—processes, DLLs, PE format—are prime targets for attackers to hide code & evade detection. Learned to exploit these vulnerabilities & apply mitigations. #Cybersecurity #WindowsSecurity

www.tryhackme.com/r/room/abusingwindowsinternals?utm_campaign=social_share&utm_medium=social&utm_source=twitter

:fox_ear:root@kmlg.jp
2025-03-11

[ 3時間でハッキング実践入門【総集編#0~#10】#サイバーセキュリティ #プログラミング #tryhackme ]
https://youtube.com/watch?v=eI91fFbBE38
:有益情報:

2025-03-09

Finshed 'Registry Persistence Detection' on @TryHackMe
! Explored malware persistence techniques & learned to use AutoRuns PS module to detect & remove Registry-based mechanisms. #cybersecurity #malware #TryHackMe

www.tryhackme.com/r/room/registrypersistencedetection?utm_campaign=social_share&utm_medium=social&utm_source=twitter

2025-03-08

Completed a TryHackMe room on Memory Forensics! Learned basic concepts, environment setup, gathering info from a compromised Windows target, searching for suspicious activity, and extracting/analyzing data to identify potential malicious actors.

#tryhackme

www.tryhackme.com/r/room/critical

2025-03-08

Finished the Jr Penetration Tester Learning path on @realtryhackme after the Cyber Security 101. I’ve learned a lot. I like that there are a lot of challenges to practice.
#pentesting #learning #tryhackme
gyorban.net/micro/iesn-thm-jr-

2025-03-04

#tryHackMe has a new certification out, the Security Analyst Level 1 or #SAL1 for short. I will NOT be covering it on my channel to assess its #accessibility for #screenReader users, because in a sense I already have. I did a stream on their #SOC simulator recently which is a big part of this cert, and that was a disaster. Add to that that on the "About' page, they couldn't even be bothered to #altText the one logo in the descriptive text makes me feel it is utterly unnecessary to even give this a chance. It's a #fail. plain and simple.

2025-02-27

We are celebrating our 400th issue of the Linux Update newsletter! Check out this week's feature from Chris Binnie on ethical hacking. Thank you to our readers and partners for your continued support!
mailchi.mp/linux-magazine.com/
#TryHackMe #Linux #OpenSource #newsletter #EthicalHacking #Ubuntu #GNOME #Bash #LibreWolf #jobs #events #PyConUS #LAS2025

Celebrating 400 Issues | LINUX UPDATE: Delivering news and information on Linux and open source every week!

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst