3ackd0or

4.8K posts

3ackd0or banner
3ackd0or

3ackd0or

@3ackd0or

🔥 A back door between the bits. 🔗 Coming soon...

جمهوری اسلامی ایران Katılım Mart 2022
29 Takip Edilen21.6K Takipçiler
Sabitlenmiş Tweet
3ackd0or
3ackd0or@3ackd0or·
3ackd0or tweet media
ZXX
66
15
164
72.3K
3ackd0or
3ackd0or@3ackd0or·
مترجم: inj3ct0r سلام فرمانده، سلام درمانده در ادامه داستان، افسران و سربازان سایبری نظام را مثل گذشته منتشر خواهیم کرد. بارها گفتیم اربابان دنیای سایبری ما هستیم. #Gomnaman @NarimanGharib @m_pourmohsen @IranIntl
3ackd0or tweet media
فارسی
14
2
38
13.4K
3ackd0or
3ackd0or@3ackd0or·
مترجم: inj3ct0r سلام خفن سلام جذاب سلام جیمز باند فکر کردی پیدات نمی کنیم؟ چربش کن😁 اینا نباشن ما به کی بخندیم؟ #Gomnaman @NarimanGharib @m_pourmohsen
فارسی
6
0
7
9.5K
3ackd0or retweetledi
0b1d1
0b1d1@_0b1d1·
🔓 Top 20 Free Hacking Books You Can Read Online Want to level up your cybersecurity skillswithout paying a penny? Here’s a hand-picked list of 20 high-quality hacking & infosec books that are available online (PDFs or official readers)
0b1d1 tweet media
English
16
283
1.9K
94.4K
3ackd0or retweetledi
The Hacker News
The Hacker News@TheHackersNews·
🚨 A fake PDF editor is hijacking Google ads—tricking users into downloading TamperedChef, a new info-stealing malware. It steals logins, cookies & even backdoors your system. The worst part? It hid for 56 days before activating. Read → thehackernews.com/2025/08/tamper…
English
3
74
142
22K
3ackd0or retweetledi
7h3h4ckv157
7h3h4ckv157@7h3h4ckv157·
ReconFTW Tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities (Just Sharing) Link: github.com/six2dez/reconf…
7h3h4ckv157 tweet media
English
2
22
119
9.3K
3ackd0or retweetledi
inversecos
inversecos@inversecos·
NEW LAB: Scattered Spider (UNC3944) 🕷️🕸️ Scattered Spider hits indie studio AB Projekt Blue, deploying ransomware and stealing unreleased game code. Test your skills on: 👀 Social Engineering & MFA Fatigue 👀 Credential Theft via OST Files 👀 Bring Your Own Vulnerable Driver (BYOVD) 👀 EDR Manipulation 👀 Custom Ransomware Binary 👀 RMM Exploitation Lab Contributors Adversarial Emulation @fawazo Incident Response @r3nzsec Threat Intelligence @CuratedIntel Solve it here 👉 xintra.org @XintraOrg
inversecos tweet mediainversecos tweet media
English
13
86
515
71.4K
3ackd0or retweetledi
The Hacker News
The Hacker News@TheHackersNews·
🚨 One flaw. Total takeover. A critical bug in Windows Server 2025 lets attackers generate any dMSA/gMSA password—across the forest. It bypasses Credential Guard and can persist for years. Details here → thehackernews.com/2025/07/critic…
English
4
109
328
38.9K
3ackd0or retweetledi
The Hacker News
The Hacker News@TheHackersNews·
🚨 A critical flaw in Fortinet’s FortiWeb lets unauthenticated attackers run SQL commands remotely (CVSS 9.6). The bug? It blindly trusts tokens—letting attackers write to the file system. Fix it now or risk real damage. Read → thehackernews.com/2025/07/fortin…
English
5
83
161
26.1K
3ackd0or retweetledi
0xor0ne
0xor0ne@0xor0ne·
Evaluation of different tools for routers firmware emulation (FACT, QEMU, EMUX, Qiling, Firmadyne, FAT, FirmAE, Pandawan, and EMBA) "Challenges and Pitfalls while Emulating Six Current Icelandic Household Routers" skemman.is/bitstream/1946… #infosec #embedded
0xor0ne tweet media
English
4
106
450
17.6K
3ackd0or retweetledi
Germán Fernández
Germán Fernández@1ZRR4H·
📌 FYI: #CryptersAndTools es un servicio de crypter-as-a-service de origen brasileño 🇧🇷 utilizado por actores como #BlindEagle (APT-C-36), #TA558 y #Aggah entre otros. Anteriormente hubo algo de confusión por el uso compartido de infraestructura, sin embargo, algunos servidores formaban parte del mismo CaaS (+x.com/1ZRR4H/status/…). Una de las funciones más destacadas del crypter es la capacidad de ocultar código malicioso en imágenes legítimas, flujo que también es conocido como #StegoCampaign. Más referencias en el análisis de #AndeLoader (esentire.com/blog/blind-eag…). Anteriormente, también vimos a Blind Eagle y Aggah utilizar otros crypters como Vs-Crypt, 3LOSH, "codigo" y FuckCrypt, escritos por Roda o Pjoao1578. este último también se encuentra desarrollando Upcrypter (ya incluye la función para utilizar imágenes). + REF (Parte 1): global.ptsecurity.com/analytics/pt-e…. + REF (Parte 2): global.ptsecurity.com/analytics/pt-e…. H/T @01Xyris 🥷
Germán Fernández tweet mediaGermán Fernández tweet mediaGermán Fernández tweet mediaGermán Fernández tweet media
Español
5
23
70
15.5K