Fox

1.4K posts

Fox

Fox

@DenFox93

Katılım Temmuz 2013
1.4K Takip Edilen81 Takipçiler
₿IRB
₿IRB@crypto_birb·
The reply that gets 0 likes receives $500 good luck
₿IRB tweet media
English
1.5K
58
1.1K
276K
Fox retweetledi
Pramod Goyal
Pramod Goyal@goyal__pramod·
Gpt-2 is just 174 lines of code... How crazy is that
Pramod Goyal tweet media
English
111
185
3.8K
862.3K
Fox
Fox@DenFox93·
@zetachain @esatoshiclub Zetachain lets you call a Bitcoin wallet from an Ethereum smart contract no bridges or wrapped BTC needed!
English
0
0
2
293
ZetaChain 🟩
ZetaChain 🟩@ZetaChain·
Thanks to everyone who joined our 𝕏 Space with @esatoshiclub today! As promised — we’re giving away $400 ZETA 🎉 🟩 Like this post 🟩 In the comment: share one thing you learned or found interesting from the Space We'll pick 4 winners after 24 hours.
ZetaChain 🟩@ZetaChain

Ready to explore the future where Bitcoin seamlessly connects with every blockchain? Join our 𝕏 Space with @esatoshiclub on April 29 at 1 PM UTC. 🟩 $400 ZETA Giveaway 🟩 Set your reminder: twitter.com/i/spaces/1jMJg…

English
547
393
604
42.7K
Fox
Fox@DenFox93·
@BGatesIsaPyscho Not true, this is is Maya Bay at koh Phi Phi. You cannot enter in the water because of the sharks
English
1
0
14
2.7K
Concerned Citizen
Concerned Citizen@BGatesIsaPyscho·
On some Thailand beaches tourists aren’t supposed to paddle deeper than their ankles. The reason given will absolutely shock you.
English
404
3.2K
23.2K
6.8M
Fox
Fox@DenFox93·
@dustfuncrypto @zetachain Some say it’s just a degen meme protocol, others believe it’s a portal to an alternate dimension where every dust wallet holds millions in lost Bitcoin. But the truth? The truth is hidden in the etherscan tx history of the Illuminati’s MetaMask.
English
22
0
3
299
dust.fun
dust.fun@dustfuncrypto·
💥 WHAT IS DUST.FUN? Winner gets $20 USDC! 💥 Drop the funniest, most exaggerated, or totally wild answer you can think of! 🤪 💸 The funniest comment wins $20 USDC!🔥Comment as many times as you want. 📢 Winner announced at the Twitter Space AMA with @ZetaChain on Monday. Judges: @maistebuilds & @ZetaChain 🚀
English
530
3
61
3.9K
Kris | ai.com
Kris | ai.com@kris·
When Bitcoin hits $100,000 I will give 1 BTC to one person who follows me. The rules are simple: - like this tweet, follow me and RT - comment “100k incoming” Let’s go! $BTC #bitcoin
English
48.2K
34.9K
60.3K
6.7M
Fox
Fox@DenFox93·
@kris 100k incoming
English
0
0
0
8
Fox retweetledi
Lupin
Lupin@0xLupin·
Today I received a $12,000 bounty using the Sandwich Attack ! 🤑 The vulnerability allowed me to enumerate the API Keys of other users 🤯 How did I do that ? Well the API key was a UUIDv1. If you are not familiar with UUIDv1s you need to know that they are constructed in 6 sections: High, Mid, Low, Clock Sequence, Node ID, and UUID version. Interestingly, the Node ID corresponds to the MAC address of the system generating the identifier. This means that if two consequent UUIDs are generated on the same device, this part remains the same, similar to the Clock Sequence. When High, Mid, and Low are combined, they reveal a timestamp represented in hexadecimal value. Using some basic mathematics it's possible to subtract the offset between the Gregorian Calendar and the Julian Calendar and then divide by 1000 to get an Epoch TimeStamp. Ok now that we know that they are generated by a timestamp + machine ID, it means that we could generate them back if we know when the API keys were created 🧐 Luckily enough the API Key that I was using was generated in a batch, meaning I could use the Sandwich Attack in order to brute force the API Keys of other users easily 🔥 If you want to know more about how I exploited the Sandwich Attack, go check my video about this on my YouTube channel 🤟
Lupin tweet mediaLupin tweet mediaLupin tweet mediaLupin tweet media
English
34
263
1.1K
99K
Fox retweetledi
LiveOverflow 🔴
LiveOverflow 🔴@LiveOverflow·
Let's play a game. W̵h̵a̵t̵ ̵i̵s̵ ̵t̵h̵e̵ ̵v̵u̵l̵n̵e̵r̵a̵b̵i̵l̵i̵t̵y̵?̵ How would you respond to this report?
LiveOverflow 🔴 tweet media
Português
38
9
240
91.6K
vx-underground
vx-underground@vxunderground·
We are giving away two vx-underground Black Mass Volume I and II bundles. In other words, winners will be given both volumes =D Comment on this tweet for a chance to win.
vx-underground tweet mediavx-underground tweet media
English
492
64
665
99.2K
Fox retweetledi
DC | David Lee
DC | David Lee@dccybersec·
Are you interested in freelancing in cybersecurity and automation services? I'm on the lookout for people who are interested in freelancing in Cybersecurity &/OR Automation of business processes within the IT industry with training starting immediately. If this sounds like you, please get in touch with me! #cybersecurity #freelancing #freelancer #automation #ai #workfromanywhere
DC | David Lee tweet media
English
539
169
1.1K
240.5K
Fox retweetledi
Beosin Alert
Beosin Alert@BeosinAlert·
Analysis of the Stars Arena exploit:🔽 The contract is not open source, there seems to be a reentrancy vulnerability. During the call of the 0xe9ccf3a3 function, the attacker reentered and called the 0x5632b2e4 function, setting a block height. Then, in the sellShares function, this height was used as a parameter to calculate the amount of $AVAX to send, resulting in an abnormally large calculated amount. Ultimately, the attacker was able to obtain a large profit.
Beosin Alert tweet mediaBeosin Alert tweet media
Beosin Alert@BeosinAlert

Stars Arena on AVAX exploited for ~$2.9M. Stay alert!

English
3
13
36
14K
Fox retweetledi
Bankless
Bankless@Bankless·
Vitalik dropped a big blog post about Ethereum's future Here's everything you need to know (even if you're non-technical) A THREAD 🧵
Bankless tweet media
English
45
293
875
222.9K
Fox retweetledi
Today In Infosec
Today In Infosec@todayininfosec·
1990: Clifford Stoll's book "The Cuckoo's Egg" was turned into an episode of NOVA entitled "The KGB, the Computer, and Me". Without spoiling it, it's a story of how he tracked down a hacker who broke into his employer's computer. Watch it for free: archive.org/details/The_KG…
Today In Infosec tweet media
English
27
150
466
80K
Fox retweetledi
Luke Stephens (hakluke)
$50k bug bounty on Shopify explained. In this video, learn how Augusto Zanellato found a critical GitHub PAT linked to private Shopify repositories, earning a $50,000 bounty! Watch now 👇 youtube.com/watch?v=xOoWHK…
YouTube video
YouTube
English
0
34
161
21K
Fox retweetledi
Mobile Hacker
Mobile Hacker@androidmalware2·
Use silent #SMS messages to track LTE users’ locations An attacker sends silent SMS messages with a defined pattern and analyze LTE traffic to verify the victim location. All you need is just: SDR + SIM cards + LTESniffer software mandomat.github.io/2023-09-21-loc…
Mobile Hacker tweet media
English
18
725
2.9K
341.4K
Fox retweetledi
The Moisrex
The Moisrex@the_moisrex·
Oh wow, this joke is actually true! 🙃
The Moisrex tweet mediaThe Moisrex tweet media
English
4
14
149
18.6K
Fox retweetledi
Sebastian Sigl
Sebastian Sigl@sesigl·
I interviewed over 70 full-stack engineers in the last years. I created a Notion based "Learn Full-Stack Development Pack V3" that contains a learning path to become a full-stack dev based on free resources. Retweet and reply with "free" and I'll DM it to you. (need to follow)
Sebastian Sigl tweet media
English
1.1K
814
1.1K
288.2K
Fox retweetledi
Norbert Tihanyi, PhD
Norbert Tihanyi, PhD@TihanyiNorbert·
NEW fully undetectable AMSI bypass script based on Matt Graeber @mattifestation 'amsiInitFailed' script. After one year my "old" AMSI bypass script is now detected by 9 AV. So here is the new fully undetectable script: @kmkz_security
Norbert Tihanyi, PhD tweet media
Norbert Tihanyi, PhD@TihanyiNorbert

My new AMSI bypass script based on Matt Graeber @mattifestation 'amsiInitFailed' script. With a little math 0/59 AV detects as malicious in 2020. Happy pentesting. @kmkz_security

English
6
132
342
0