Zack Sโ—‹L bot Gnoma ๐Ÿง™โ€โ™‚๏ธ,๐Ÿง™โ€โ™‚๏ธ ๐Ÿฆ‡๐Ÿ”Š ๎จ€

5.4K posts

Zack Sโ—‹L bot Gnoma ๐Ÿง™โ€โ™‚๏ธ,๐Ÿง™โ€โ™‚๏ธ ๐Ÿฆ‡๐Ÿ”Š ๎จ€ banner
Zack Sโ—‹L bot Gnoma ๐Ÿง™โ€โ™‚๏ธ,๐Ÿง™โ€โ™‚๏ธ ๐Ÿฆ‡๐Ÿ”Š ๎จ€

Zack Sโ—‹L bot Gnoma ๐Ÿง™โ€โ™‚๏ธ,๐Ÿง™โ€โ™‚๏ธ ๐Ÿฆ‡๐Ÿ”Š ๎จ€

@Boornfirst

Solana Gnoma Anoma (๐Ÿง™โ€โ™‚๏ธ,๐Ÿง™โ€โ™‚๏ธ)

United Kingdom ๊ฐ€์ž…์ผ AฤŸustos 2020
1.1K ํŒ”๋กœ์ž‰120 ํŒ”๋กœ์›Œ
Zack Sโ—‹L bot Gnoma ๐Ÿง™โ€โ™‚๏ธ,๐Ÿง™โ€โ™‚๏ธ ๐Ÿฆ‡๐Ÿ”Š ๎จ€ ๋ฆฌํŠธ์œ—ํ•จ
Vivek | Cybersecurity
Vivek | Cybersecurity@VivekIntelยท
โš”๏ธTop 50 Cyber Security Tools 1. ๐Ÿ”’ Wireshark 2. ๐Ÿ›ก๏ธ Snort 3. ๐Ÿ–ฅ๏ธ Metasploit 4. ๐Ÿ“ก Nmap 5. ๐Ÿ› ๏ธ Burp Suite 6. ๐ŸŒ OWASP ZAP 7. ๐Ÿ“Š Security Onion 8. ๐Ÿš€ Kali Linux 9. ๐Ÿ›ก๏ธ Suricata 10. ๐ŸŒ Nessus 11. ๐Ÿšช OpenVAS 12. ๐Ÿ›ก๏ธ ModSecurity 13. ๐Ÿ—๏ธ Hashcat 14. ๐Ÿงฑ OSSEC 15. ๐Ÿ›ก๏ธ Fail2ban 16. ๐Ÿค– YARA 17. ๐Ÿ“œ SELinux 18. ๐Ÿงฌ ClamAV 19. ๐Ÿ›ก๏ธ Security+Plus 20. ๐Ÿ” GPG 21. ๐Ÿ“ก Aircrack-ng 22. ๐Ÿ› ๏ธ Sysinternals Suite 23. ๐Ÿ–ฅ๏ธ Wireshark 24. ๐Ÿ”‘ KeePass 25. ๐Ÿ›ก๏ธ Tripwire 26. ๐Ÿ“ Ophcrack 27. ๐Ÿ“ก Netcat 28. ๐Ÿ›ก๏ธ Wazuh 29. ๐Ÿ› ๏ธ Microsoft Baseline Security Analyzer 30. ๐Ÿ“Š AlienVault OSSIM 31. ๐Ÿ” VeraCrypt 32. ๐Ÿ“ก Hping 33. ๐Ÿ›ก๏ธ OSQuery 34. ๐Ÿ› ๏ธ Acunetix 35. ๐Ÿ”‘ LastPass 36. ๐Ÿ›ก๏ธ Lynis 37. ๐Ÿ“œ AppArmor 38. ๐Ÿ› ๏ธ SQLMap 39. ๐Ÿ—๏ธ John the Ripper 40. ๐Ÿ“ก Zenmap 41. ๐Ÿ›ก๏ธ Sn1per 42. ๐Ÿ–ฅ๏ธ Wireshark 43. ๐Ÿงฑ Rkhunter 44. ๐Ÿ› ๏ธ Splunk 45. ๐Ÿ” 1Password 46. ๐Ÿ›ก๏ธ Bro IDS 47. ๐Ÿ“ก Angry IP Scanner 48. ๐Ÿ› ๏ธ Security Onion 49. ๐Ÿ”‘ Bitwarden 50. ๐Ÿ›ก๏ธ McAfee ESM #infosec #cybersecurity #hacking #pentesting #Security #OSINT #BugBounty #NetworkSecurity
English
3
82
534
12.3K
Zack Sโ—‹L bot Gnoma ๐Ÿง™โ€โ™‚๏ธ,๐Ÿง™โ€โ™‚๏ธ ๐Ÿฆ‡๐Ÿ”Š ๎จ€ ๋ฆฌํŠธ์œ—ํ•จ
Beri๐ŸŒš
Beri๐ŸŒš@beri_grizouยท
Man left speechless as he called his GF while she was having s3x and she forgot to hang up the call๐Ÿ˜ญ๐Ÿ’”๐Ÿ’”
English
115
840
9.2K
668.5K
Zack Sโ—‹L bot Gnoma ๐Ÿง™โ€โ™‚๏ธ,๐Ÿง™โ€โ™‚๏ธ ๐Ÿฆ‡๐Ÿ”Š ๎จ€ ๋ฆฌํŠธ์œ—ํ•จ
precis0x
precis0x@precisoxยท
Alguien ha creado el juego mรกs adictivo para aprender redes de centros de datos. Esta increรญblee! Se llama Data Center; cuesta 6 dรณlares y empiezas con el suelo completamente vacรญo: compras racks, montas servidores y tiendes cada cable a mano. Lo mรกs brutal es que el trรกfico de cada cliente se visualiza como esferas de colores que circulan por tus cables, literalmente ves los cuellos de botella en tiempo real. 190 reseรฑas en 48 horas, gente con equipos equipados con tarjetas RTX 4090 estรก totalmente enganchada y divirtiรฉndose en un simulador de cableado de 6 dรณlares.
Espaรฑol
129
1.1K
11.4K
973.8K
Zack Sโ—‹L bot Gnoma ๐Ÿง™โ€โ™‚๏ธ,๐Ÿง™โ€โ™‚๏ธ ๐Ÿฆ‡๐Ÿ”Š ๎จ€ ๋ฆฌํŠธ์œ—ํ•จ
Voices from paradise
Voices from paradise@1_Q_zยท
ุฑุชูˆูŠุช ู„ุนู„ู‘ู‡ุง ุงู„ู…ูู†ุฌูŠู‡
ุงู„ุนุฑุจูŠุฉ
9
3.7K
8.9K
164.2K
Zack Sโ—‹L bot Gnoma ๐Ÿง™โ€โ™‚๏ธ,๐Ÿง™โ€โ™‚๏ธ ๐Ÿฆ‡๐Ÿ”Š ๎จ€ ๋ฆฌํŠธ์œ—ํ•จ
NullSecurityX
NullSecurityX@NullSecurityXยท
LFI attack can allow an attacker to read critical system files such as / etc / passwd and C: \ Windows \ win .ini.
English
1
13
79
4K
GetMoe WIreless
GetMoe WIreless@getmoenowยท
@howertonjosh Brother this is false , the Jews killed Jesus because they didnโ€™t accept his message , there messiah is the one thatโ€™s gonna be the antichrist , and to call Islam demonic and it enslaves its followers , brother you seem intelligent whatโ€™s going on here man
English
2
0
5
746
Josh Howerton
Josh Howerton@howertonjoshยท
If you overlay Christian beliefs on the end times with Islamic beliefs on the end times, what you discover will send a chill down your spine. Buckle up for this one ๐Ÿ‘‡
English
3.1K
5.7K
33.1K
1.2M
Zack Sโ—‹L bot Gnoma ๐Ÿง™โ€โ™‚๏ธ,๐Ÿง™โ€โ™‚๏ธ ๐Ÿฆ‡๐Ÿ”Š ๎จ€ ๋ฆฌํŠธ์œ—ํ•จ
Sky Sports
Sky Sports@SkySportsยท
Man City fan Tal Rehman reveals all about that viral clip from the Stamford Bridge yesterday ๐Ÿ˜…๐Ÿซฃ
English
1.2K
5.2K
34.3K
5M
HackenProof
HackenProof@HackenProofยท
Which country are you hacking from?
English
36
0
65
8.6K
Nick Percoco
Nick Percoco@c7fiveยท
Kraken Security Update We are currently being extorted by a criminal group threatening to release videos of our internal systems with client data shown if we do not comply with their demands. Itโ€™s important to start with the most important points: our systems were never breached; funds were never at risk; we will not pay these criminals; we will not ever negotiate with bad actors. Kraken identified and shut down two instances of inappropriate access to limited client support data. In February 2025, we received a tip from a trusted source regarding a video shared on a criminal forum that appeared to show access to our client support systems. We immediately launched an investigation and quickly identified the individual involved as a member of our support team. Their access was revoked immediately, a full investigation was conducted, additional security controls were put in place and a limited number of affected clients were notified. Since then, we have been collaborating with industry partners and law enforcement to investigate and disrupt insider recruitment efforts targeting not only crypto companies, but also gaming and telecommunications organizations. More recently, we received another tip, along with a new video showing similar activity. We quickly identified the individual involved and terminated their access. As before, we acted immediately to revoke access, conduct a full investigation, and notify the small number of affected clients. Across both incidents, only a very small number of client accounts were potentially viewed - approximately 2,000 in total (0.02% of clients). Shortly after access was terminated, we began receiving extortion demands. The criminals threatened to distribute materials from both the February 2025 incident and the recent incident to media outlets and on social media if we did not comply. We will not pay these criminals. Based on intelligence gathered across both incidents, along with extensive ongoing analysis, we believe there is sufficient evidence to support the identification and arrest of those responsible. We are actively working with federal law enforcement across multiple jurisdictions to pursue all individuals involved and bring them to justice. Due to the ongoing investigation, we cannot share additional details at this time. However, anyone with relevant information is encouraged to contact us directly. The security of our clients is our highest priority, and we remain fully committed to combating the growing global threat of insider recruitment and constantly enhancing our security practices to combat new threats. Note: If you are a client potentially affected by this, you've already been notified.
English
256
498
3.8K
1.2M
Zack Sโ—‹L bot Gnoma ๐Ÿง™โ€โ™‚๏ธ,๐Ÿง™โ€โ™‚๏ธ ๐Ÿฆ‡๐Ÿ”Š ๎จ€ ๋ฆฌํŠธ์œ—ํ•จ
By Grabthar's Hammer
By Grabthar's Hammer@RealAceFox1ยท
@StellarArtoisGB Cool story Stellar.
Everyday Astronaut@Erdayastronaut

There are honestly some decent and common questions about the Apollo programโ€™s moon landings that I figured we should check out ourselves. Because thereโ€™s no denying things from the Apollo program look unusual and are quite literally foreign to us in all other contexts. Enjoy 10 months of research, work, dozens of animations, 9 hours of 6k dialogue that took up 3.1 terabytes of hard drive space and MOUNTAINS OF LOVE covering the most incredible journey in all of human history (so far), the Apollo Program. Send this to anyone who watched the Bart Siebrel video on @joerogan, and maybe @elonmusk, you should make Joe watch this so he has answers to his questions. 00:00:00 - INTRO 00:04:40 - APOLLO 17 LIFTOFF FOOTAGE 00:19:05 - WHY DON'T WE SEE STARS 00:25:40 - LUNAR SHADOWS 00:32:00 - CROSSHAIRS BEHIND OBJECTS 00:34:10 - WHY DID THE FLAG WAVE 00:38:00 - ASTRONAUTS ON WIRES 00:47:15 - FOOTPRINTS / PROP ROCKS 00:49:05 - MOON ROCK OR WOOD 00:51:35 - VAN ALLEN BELT RADIATION 01:12:55 - LOST APOLLO 11 TAPES 01:07:55 - DID NASA FAKE FOOTAGE 01:19:30 - LOST SATURN V PLANS 01:23:00 - THE LUNAR LANDER'S THIN SKIN 01:27:50 - LUNAR ROVER DUST 01:29:30 - OTHER PHOTOGRAPHIC EVIDENCE 01:37:20 - DID ANYONE ELSE TRACK THE MISSIONS 01:40:15 - THE SOVIETS' REACTION TO APOLLO 01:42:10 - ORBITAL MECHANICS OF APOLLO 01:51:15 - DELTA V OF APOLLO 02:04:30 - WHY HAVEN'T WE GONE BACK 02:14:30 - SUMMARY

English
0
6
32
6.1K
Sister__
Sister__@ana_herleemerhยท
Over 200 Muslims, like chickens, you called it Accidentally in a broad daylight inside the market, same happened during Maulud in Kaduna, why only Muslims gathering ๐Ÿ˜ญ
Sister__ tweet mediaSister__ tweet mediaSister__ tweet mediaSister__ tweet media
English
258
482
765
53.8K
Zack Sโ—‹L bot Gnoma ๐Ÿง™โ€โ™‚๏ธ,๐Ÿง™โ€โ™‚๏ธ ๐Ÿฆ‡๐Ÿ”Š ๎จ€ ๋ฆฌํŠธ์œ—ํ•จ
Nigerian Army
Nigerian Army@HQNigerianArmyยท
This successful strike is yet another demonstration of the resolve and operational capability of OPHK to sustain relentless pressure on terrorist elements, disrupt their logistics networks, and deny them freedom of movement within the Theatre. The Theatre Command also wishes to reiterate that the use of motorcycles remains strictly prohibited across the North East operational theatre, particularly in Borno and Yobe States, due to their established and continued use by terrorist elements for movement, logistics, and attack operations. Any such movements in restricted areas are therefore treated with the utmost seriousness in line with existing operational directives. The Joint Task Force (North East) OPHK assures the good people of the North East and indeed all law-abiding Nigerians, that ongoing operations will continue with renewed intensity until all terrorist enclaves are dismantled and lasting peace is restored to the region. SANI UBA Lieutenant Colonel Media Information Officer Headquarters Joint Task Force (North East) Operation HADIN KAI 12 April 2026
Nigerian Army tweet mediaNigerian Army tweet mediaNigerian Army tweet media
English
159
659
1.3K
121.8K
Nazy Inyass โœŒ๏ธ๐Ÿ˜Ž
@Barristerstreet It is never a mistake... BH were there in the market... The people know them but they allow them to mix with them... They are the BH that attacked Banisheikh 3 days ago
English
10
5
117
6.9K
BSN
BSN@Barristerstreetยท
๐Ÿ‡ณ๐Ÿ‡ฌ JUST IN: Up to 200 Feared Dead After Nigerian Air Force Airstrike Hits Busy Market on Bornoโ€“Yobe Border As many as 200 people are feared dead, with dozens injured, after a Nigerian Air Force (NAF) airstrike mistakenly struck a crowded weekly market on Saturday. The incident occurred at Jilli Market, a key trading hub located between Gubio Local Government Area and Geidam Local Government Area, where traders from surrounding communities had gathered in large numbers. According to eyewitnesses and local officials, fighter jets operating under Operation Hadin Kai launched the strike targeting suspected Boko Haram and Islamic State West Africa Province elements believed to be active in the area. However, the bombs missed their intended targets and hit the civilian market instead. Multiple explosions tore through the crowded trading ground, sending traders and buyers fleeing in panic. Eyewitnesses described widespread devastation, with bodies scattered across the scene and many victims buried under debris. Victims were rushed to the Specialist Hospital Geidam, where at least 14 injured persons are currently receiving treatment. Several others have reportedly been referred to Damaturu due to the severity of their injuries. While initial eyewitness counts confirmed at least 56 bodies, local sources now warn that the true death toll could be significantly higher, with some estimates placing it at up to 200 fatalities as recovery efforts continue. As of Sunday afternoon, the Nigerian Air Force and Defence Headquarters have yet to issue an official statement addressing the incident or confirming civilian casualties. The Bornoโ€“Yobe border remains a volatile frontline in Nigeriaโ€™s ongoing counter-insurgency campaign, where civilian populations continue to face deadly risks as terrorists operate within and around local communities. This is a developing story. Casualty figures are expected to be updated as more information emerges.
BSN tweet mediaBSN tweet mediaBSN tweet media
English
580
1.2K
1.9K
474.2K
Zack Sโ—‹L bot Gnoma ๐Ÿง™โ€โ™‚๏ธ,๐Ÿง™โ€โ™‚๏ธ ๐Ÿฆ‡๐Ÿ”Š ๎จ€ ๋ฆฌํŠธ์œ—ํ•จ
Co11ateral
Co11ateral@co11ateralยท
Remote DLL Injection with Timer-based Shellcode Execution Classic DLL injection using CreateThreadpoolTimer to execute shellcode in memory. It can help evade antivirus detection github.com/andreisss/Remoโ€ฆ #apt #redteam
English
0
43
213
10.2K