🖤ֆǟʍǟɛʟ🐼

154.7K posts

🖤ֆǟʍǟɛʟ🐼 banner
🖤ֆǟʍǟɛʟ🐼

🖤ֆǟʍǟɛʟ🐼

@FragmentedSoul5

#OreoSec 🎭 the #Truth is well HïÐÐêñ ïñ þlåïñ §ïgh†. #OpSec ł₦₣Ø₴Ɇ₵ It's easier to fool people than to convince them that they have been fooled.#INFP #xuᴎi⅃ 🐧

🕍🦉 ֆօʟօʍօռ'ֆ ₮Ɇ₥₱ⱠɆ 🦉🕍 Bergabung Ocak 2017
722 Mengikuti2.7K Pengikut
🖤ֆǟʍǟɛʟ🐼 me-retweet
vegastar
vegastar@vegastarr·
🤡🌏
vegastar tweet media
QME
21
122
398
4.9K
🖤ֆǟʍǟɛʟ🐼 me-retweet
🧬Maxpein🧬
🧬Maxpein🧬@maximumpain333·
🧬Maxpein🧬 tweet media
ZXX
31
287
1.3K
12.4K
🖤ֆǟʍǟɛʟ🐼 me-retweet
Sweep
Sweep@0xSweep·
Two guys ran an entire hacking operation in a PRISON for months In 2015, two prisoners in Ohio were assigned to a recycling program where they dismantled old computers Instead of scrapping the parts, they started stealing them Carried components over 1,100 feet past guards, metal detectors, and multiple security checkpoints Then built two working PCs and hid them behind a plywood board in the ceiling of a training room closet They ran cables from the ceiling into the prison's own network Stole login credentials from an employee by watching him type his password Set up Bitcoin wallets, Stripe accounts, bank accounts and credit card applications using another inmate's stolen identity Downloaded VPNs, the Tor browser, password cracking tools and what investigators called "a large hacker's toolkit" Created fake security passes to access restricted areas of the prison This entire operation ran for months They only got caught because one of the computers used so much bandwidth it triggered an automatic alert The Inspector General said it was "almost as if it's an episode of Hogan's Heroes" Two guys with recycled computer parts and a ceiling tile built a cybercrime operation inside a state prison
Sweep tweet mediaSweep tweet mediaSweep tweet mediaSweep tweet media
English
187
773
6.5K
523.2K
🖤ֆǟʍǟɛʟ🐼 me-retweet
Nature Videos
Nature Videos@naturevideos·
one fart and we're dead 😭
English
37
424
7.8K
338K
🖤ֆǟʍǟɛʟ🐼 me-retweet
Cyber Security News
Cyber Security News@The_Cyber_News·
🚨 Hackers Using Google Cloud Storage to Bypass Email Filters and Deliver Remcos RAT Source: cybersecuritynews.com/hackers-using-… Cybercriminals are always looking for smarter ways to bypass security, and their latest method is both simple and effective. The campaign starts with phishing emails linking to pages hosted on storage.googleapis[.]com, a legitimate Google domain. These pages mimic Google Drive login screens with branded logos and file icons for PDF, DOC, SHEET, and SLIDE documents. Victims are prompted to sign in to “view a document in Google Drive,” unaware that the page is built to harvest their email address, password, and one-time passcode. After the fake login, the victim is tricked into downloading a JavaScript file named Bid-P-INV-Document.js. #cybersecuritynews #cyberattacknews
Cyber Security News tweet media
English
3
33
88
4.7K
🖤ֆǟʍǟɛʟ🐼 me-retweet
Samir
Samir@SBousseaden·
process where event.type == "start" and process.name :"SnippingTool.exe" and process.args: ("ms-screensketch:edit?&filePath=%5C%5C*", "ms-screensketch:edit?&filePath=http*", "ms-screensketch:edit?&filePath=\\\\*")
Samir tweet media
BlackArrow@BlackArrowSec

Microsoft has addressed a one-click NTLM leak vulnerability affecting Windows Snipping Tool (CVE-2026-33829), discovered by our researcher Marcos Díaz (@Calvaruga). ➡️ Read the write-up: github.com/blackarrowsec/… ➡️ Microsoft bulletin: msrc.microsoft.com/update-guide/v…

English
1
18
114
15.6K
🖤ֆǟʍǟɛʟ🐼 me-retweet
Nithya Shri
Nithya Shri@Nithya_Shrii·
They’re monitoring your phone.
English
903
323
2.5K
200.1K
🖤ֆǟʍǟɛʟ🐼 me-retweet
Lionheart
Lionheart@XyxvYella·
Wars are never about to save or protect the people Its about Profit, Money and Control. The rich get richer The poor gets poorer Peace is oppression Freedom is prison. The world will never know Peace. #Anonymous for #Justice
Lionheart tweet media
English
2
14
24
174
🖤ֆǟʍǟɛʟ🐼 me-retweet
internet archiva
internet archiva@internetarchiva·
After all these years, I finally found the original one 😭😭
English
296
14.9K
70.5K
1.7M
🖤ֆǟʍǟɛʟ🐼 me-retweet
the Urban Yogi
the Urban Yogi@Lazce·
History gets rewritten by whoever controls the algorithm
English
0
4
8
196
🖤ֆǟʍǟɛʟ🐼 me-retweet
Nature is Amazing ☘️
Nature is Amazing ☘️@AMAZlNGNATURE·
I was on the edge of my seat!
English
39
179
1.8K
107.3K
🖤ֆǟʍǟɛʟ🐼 me-retweet
Shadan
Shadan@skshadan_·
CLAUDE CODE Found a bug in Google’s Brotli We gave our AI agent a simple fuzzing skill and pointed it at Brotli (the compression lib in Chrome, Firefox, nginx… literally everywhere). It audited the code → wrote the harness → found a signed integer overflow Fuzzing + agents = next level.
English
8
29
176
16.1K
🖤ֆǟʍǟɛʟ🐼 me-retweet
Wyatt
Wyatt@wyattauterre1·
Your government had the names of the people who sexually abused children and they did nothing with it.
English
75
844
3.4K
23.4K
🖤ֆǟʍǟɛʟ🐼 me-retweet
sarah
sarah@sahouraxo·
Nothing to see here Just Israel blowing up civilian homes in Ainata — a centuries-old village in South Lebanon Another historic piece of Lebanon wiped out before the eyes of the world Pure terror. Pure destruction And yet, no global outrage. No condemnation. No accountability
English
425
7.4K
13.6K
231.2K
🖤ֆǟʍǟɛʟ🐼 me-retweet
Er. Mansoor
Er. Mansoor@MANSOORNABI12·
Society is ugly. The world is beautiful. Don’t confuse the two.
English
163
3.2K
10.9K
150.6K
🖤ֆǟʍǟɛʟ🐼 me-retweet
Clandestine
Clandestine@akaclandestine·
GitHub - zeroc00I/LLM-anonymization: Reverse proxy for Claude Code that anonymizes sensitive pentest data (IPs, hashes, credentials, hostnames, PII) before it reaches Anthropic. Dual-layer detection: local Ollama LLM + regex safety net, with per-engageme github.com/zeroc00I/LLM-a…
English
1
46
257
11.9K