Mohamed Mater🇵🇸

2K posts

Mohamed Mater🇵🇸 banner
Mohamed Mater🇵🇸

Mohamed Mater🇵🇸

@micro0x00

Hunting Bugs ,IOC & Bad Hackers ^_^ https://t.co/04Xr5VzDz2 CRTP, EWPTX, EJPT,CRTE

OPSEC Katılım Haziran 2020
536 Takip Edilen4.6K Takipçiler
Mohamed Mater🇵🇸 retweetledi
Huy Nguyen
Huy Nguyen@Little_34306·
34306.lol support iOS 17.2.1 and lower
Huy Nguyen tweet media
English
80
146
1.1K
313.8K
Mohamed Mater🇵🇸 retweetledi
@·
A Rust dev just killed Headless Chrome. It's called Obscura. The open-source headless browser purpose-built for AI agents and scrapers at scale. Chrome vs Obscura: - Memory: 200MB+ → 30MB - Binary: 300MB+ → 70MB - Page load: 500ms → 85ms - Startup: 2s → Instant - Anti-detect: None → Built-in Single binary. No Node, no Chrome, no dependencies. Stealth mode is brutal: → Per-session fingerprint randomization (GPU, canvas, audio, battery) → 3,520 tracker domains blocked by default → navigator.webdriver masked to match real Chrome → Native function masking so detectors can't sniff it out Drop-in replacement for Puppeteer and Playwright over CDP. Zero code changes. If you run agents or serious scraping at scale, this repo prints money. 100% Opensource.
 tweet media
English
160
793
7.8K
623.2K
Mohamed Mater🇵🇸
Mohamed Mater🇵🇸@micro0x00·
RT @nahamike01: An open directory at 104.164.55[.]107 contains dropper files with .vrf extensions, and an exposed dashboard tracking active…
English
0
6
0
0
Mohamed Mater🇵🇸
Mohamed Mater🇵🇸@micro0x00·
@kimmydotzip @loop0420 @h4x0r_dz ِActually, it's not just the entire UI. Over the last 3 weeks, I've been working on this: hackers can be targeted through their infrastructure tried via web panel and stealer panel also C2 infra. I saw multiple using vibe coding; others use default creds
Mohamed Mater🇵🇸 tweet media
English
1
0
0
39
Mohamed Mater🇵🇸 retweetledi
vx-underground
vx-underground@vxunderground·
vx-underground tweet media
ZXX
47
536
4.4K
86.7K
Mohamed Mater🇵🇸 retweetledi
@·
Lovable has a mass data breach affecting every project created before november 2025. I made a lovable account today and was able to access another users source code, database credentials, AI chat histories, and customer data are all readable by any free account. nvidia, microsoft, uber, and spotify employees all have accounts. the bug was reported 48 days ago. its not fixed. They marked it as duplicate and left it open.
 tweet media tweet media tweet media
English
271
721
5.7K
1.4M
Mohamed Mater🇵🇸 retweetledi
@·
I vibe coded a tool that fetches your 𝗛𝗮𝗰𝗸𝗲𝗿𝗢𝗻𝗲 programs' 𝗔𝗻𝗱𝗿𝗼𝗶𝗱 scope, downloads the APKs via 𝗮𝗽𝗸𝗲𝗲𝗽, and decompiles them with 𝗷𝗮𝗱𝘅 — all in one go. github.com/0xbartita/h1-a… #hackerone #bugbountytips #android
 tweet media tweet media tweet media tweet media
English
4
44
214
12.3K
Mohamed Mater🇵🇸
Mohamed Mater🇵🇸@micro0x00·
RT @H4ckmanac: 🚨Cyber Alert ‼️ 🇪🇬Egypt - 𝗕𝗲𝘁𝘁𝗲𝗿 𝗛𝗼𝘂𝘀𝗲 Payload hacking group claims to have breached Better House. Allegedly, the attacker…
English
0
13
0
0
Mohamed Mater🇵🇸 retweetledi
@·
🇪🇬 Egypt: Gold Investment Platform Database Allegedly Leaked A threat actor is offering a dataset claimed to belong to taiseer.co, an Egyptian mobile platform focused on gold investment. 📊 Key Details: • Target: taiseer.co (Egypt gold investment app) • Volume: ~71,000 users • Format: MySQL dump (CSV) • Core data: ~71,000 unique email addresses 🧠 Claimed Data Scope: • Email addresses (confirmed in sample description) • Potential additional fields (not fully disclosed): User account details Platform activity data 🧠 Threat Intelligence Insight: • Focus on email-only value suggests: Dataset likely intended for spam/phishing campaigns Lower-tier monetization compared to full PII dumps • However, context matters: Users are financially engaged (gold investment) Makes them high-value phishing targets ⚠️ Assessment: • Medium credibility Specific user count and format provided No detailed sample beyond description Could be: Scraped user base Partial leak or marketing database ⚠️ Potential Impact: • Targeted financial phishing campaigns • Investment scams impersonating the platform • Credential stuffing if reused emails 📊 Status: Unverified — monitor for further proof or samples #CyberSecurity #DataLeak #Egypt #FinTech #ThreatIntel #DDW
 tweet media
English
3
17
71
25.4K
Mohamed Mater🇵🇸 retweetledi
@·
I pointed claude opus at chrome and told it to build a full v8 exploit for discord. A week of back-and-forth pulling it out of dead ends. 2.3B tokens. $2,283 in API costs, and it popped a shell. hacktron.ai/blog/i-let-cla…
English
22
173
1.1K
147.3K
Mohamed Mater🇵🇸 retweetledi
@·
I have been using AIs to find bugs recently and came across a cool site-wide DOM-XSS using Cookie Injection, here is the story of the finding and current state of bug hunting... @renwa/site-dom-xss-using-cookie-injection-the-ai-hackers-are-coming-faster-than-you-think-3ef82f2a991d" target="_blank" rel="nofollow noopener">medium.com/@renwa/site-do…
English
5
55
383
29.2K
Mohamed Mater🇵🇸 retweetledi
IntelOps
IntelOps@IntelOpsV3·
IntelOps tweet media
ZXX
11
51
817
36.7K
Mohamed Mater🇵🇸 retweetledi
faulty *ptrrr
faulty *ptrrr@0x_shaq·
CTF in 2026
faulty *ptrrr tweet media
English
27
209
1.9K
107.9K
Mohamed Mater🇵🇸 retweetledi
@·
Added a writeups page to my HTB AD machines list, each machine now links to the @ippsec video and @0xdf_ writeup github.com/seriotonctf/Ha…
English
1
37
170
6.6K