๐’ชZ.A.P๐’ช

25.8K posts

๐’ชZ.A.P๐’ช banner
๐’ชZ.A.P๐’ช

๐’ชZ.A.P๐’ช

@Zappit3

๐’ช๐’ชStardust๐’ช๐’ช No bs, just me myself and I, - Swedish/Finnish. Pizza and kebab lover, no need to fake personalities. แ•™โ (โ ย โ 

๊ฐ€์ž…์ผ Temmuz 2021
3.2K ํŒ”๋กœ์ž‰1.3K ํŒ”๋กœ์›Œ
๐’ชZ.A.P๐’ช ๋ฆฌํŠธ์œ—ํ•จ
shree
shree@shreeswyxยท
The dark web isnโ€™t just for criminals. Researchers, journalists & security pros use it daily. Here are 18 tools youโ€™ve never heard of but should know ๐Ÿง… ๐Ÿงต Thread (1/10)
shree tweet media
English
6
14
34
239
๐’ชZ.A.P๐’ช
Att fรฅ ut ledaren och exakt vem man misstรคnkt genom att se hur en mรคnniska agerar pรฅ sina egna ord รคr inget annat รคn check mate.
GIF
Svenska
0
0
0
13
๐’ชZ.A.P๐’ช ๋ฆฌํŠธ์œ—ํ•จ
Tiryoh / ใŸใ„ใ‚Šใ‚‡ใƒผ
SSH็ตŒ็”ฑใงใ‚‚ #ROS2 ใฎ diagnostics ใ‚’ๅฏ่ฆ–ๅŒ–ใงใใ‚‹ TUI ใƒ„ใƒผใƒซใ€Œros2-diag-monitorใ€ใ‚’ไฝœใ‚Šใพใ—ใŸใ€‚ ROS 2 ใŒๅ…ฅใฃใฆใ„ใ‚‹็’ฐๅขƒใชใ‚‰ใ€ไปฅไธ‹ใฎใ‚ณใƒžใƒณใƒ‰ใ ใ‘ใง diagnostics ใ‚’ TUI ่กจ็คบใงใใพใ™ใ€‚ใ‚คใƒณใ‚นใƒˆใƒผใƒซใฏ pip ใงใ™ใ€‚ pip install ros2-diag-monitor GUI ใชใ—ใฎ็’ฐๅขƒใ‚„ใƒชใƒขใƒผใƒˆๅ…ˆใงใ‚‚็Šถๆ…‹็ขบ่ชใ—ใ‚„ใ™ใใชใ‚Šใพใ™ใ€‚
Tiryoh / ใŸใ„ใ‚Šใ‚‡ใƒผ tweet media
ๆ—ฅๆœฌ่ชž
1
8
32
3K
๐’ชZ.A.P๐’ช ๋ฆฌํŠธ์œ—ํ•จ
WeeklyRobotics
WeeklyRobotics@WeeklyRoboticsยท
Today in Weekly Robotics: ๐Ÿค– Drones in GPS-denied environments, ๐Ÿค– spline-based trajectory planning, ๐Ÿค– a fault-tolerant flight computer for Artemis II, ๐Ÿค– a new sensor-fusion library for ROS, and more! weeklyrobotics.com/weekly-roboticโ€ฆ #robotics
English
0
19
98
5.7K
๐’ชZ.A.P๐’ช ๋ฆฌํŠธ์œ—ํ•จ
7h3h4ckv157
7h3h4ckv157@7h3h4ckv157ยท
Another Crack in the Chain of Trust: Uncovering (Yet Another) Secure Boot Bypass Resource: binarly.io/blog/another-cโ€ฆ
7h3h4ckv157 tweet media7h3h4ckv157 tweet media7h3h4ckv157 tweet media
English
0
31
126
7.4K
๐’ชZ.A.P๐’ช ๋ฆฌํŠธ์œ—ํ•จ
Nana Sei Anyemedu
Nana Sei Anyemedu@RedHatPentesterยท
WHEN A LAW ENFORCEMENT OFFICER ATTEMPTS TO UNLOCK YOUR MOBILE DEVICE BY BRUTE-FORCEING IT USING TOOLS LIKE GRAYKEY OR VERAKEY. I pulled a trace of gray key that was used in the iPhone while hunting for spywares and brute-force attacks. If the FBI or a law enforcement officer, like police, seizes your phone and returns it, you can know if they performed a brute-force attack on it if you know you didn't give them the password to your phone. They Often use GRAY KEY or VERA KEY Modern mobile operating systems and their underlying firmware maintain detailed security and diagnostic logs that can record authentication attempts and forensic access activity. As a result, when tools such as GrayKey or other law enforcement-grade extraction systems are used to perform password brute forcing or advanced device access, traces of these operations may be recorded within system logs, diagnostic artifacts, or security event records on the device. Attackers or suspects may also try to hide activity, but system-level artifacts can still reveal failed brute-force attempts. FUN FACT iOS devices often keep behind-the-scenes logs showing things like: a. when a brute-force attempt started b. when the device was finally unlocked c. and even when extraction tools connected and disconnected. That means a forensic examiner can sometimes tell not just that data was extractedโ€ฆ but how it was extracted and how long it took.
Nana Sei Anyemedu tweet mediaNana Sei Anyemedu tweet media
English
27
216
1.3K
113.3K