REED

16.4K posts

REED banner
REED

REED

@RAWAR310

FIGHT, FIGHT, FIGHT!!!!!!!!!

Katılım Mayıs 2022
986 Takip Edilen204 Takipçiler
Anime_moments
Anime_moments@ThrillerAnime·
This moment when side me used his hidden skills 🥶🔥
English
24
15
130
6.1K
ななし
ななし@anime_nanashi·
オグリのシンクロ率が凄すぎる↓↓
日本語
29
650
10.2K
1.1M
REED retweetledi
How To AI
How To AI@HowToAI_·
This is 100% illegal. A Chinese developer open-sourced a system that turns any Android phone into a wireless CarPlay device. You just flash it onto a phone, plug it into your car, and your car's head unit thinks it's talking to an iPhone over CarPlay. except the phone is running Android. → Connects in 4-10 seconds → 60fps video at 25mb bitrate → Lossless PCM audio (48kHz 16-bit stereo) → 1:1 resolution match with your car display 100% Open Source.
How To AI tweet media
English
32
118
2.3K
351.6K
REED retweetledi
Kuriyama's Glasses
Kuriyama's Glasses@KuriyamaMGN·
Weddings are a place to loosen up and enjoy the company of others. #マリッジトキシン #MARRIAGETOXIN
English
6
230
6.2K
431.5K
REED retweetledi
Vivek | Cybersecurity
Vivek | Cybersecurity@VivekIntel·
🧠 Advanced reconnaissance framework for bug hunters, red teamers, and security researchers. TugaRecon goes beyond traditional subdomain enumeration by transforming discovered assets into architectural intelligence. Core capabilities: • Passive & active subdomain enumeration • High-performance brute-force reconnaissance • DNS resolution with fallback resolvers • Semantic infrastructure analysis • Architectural impact scoring (0–100) • Asset prioritization by security relevance • Temporal intelligence & asset memory • Automated reactions to infrastructure changes • ASN and network mapping support TugaRecon can infer: • IAM & authentication layers • Secrets management systems • Databases & data planes • Kubernetes & orchestration infrastructure • CI/CD environments • Monitoring stacks • ICS / SCADA systems Outputs: TXT • JSON • CSV • PNG • SVG • Markdown • PDF Built for modern reconnaissance workflows where understanding infrastructure matters more than collecting random subdomains. 🔗 github.com/skynet0x01/tug… #CyberSecurity #BugBounty #Recon #OSINT #RedTeam #ThreatIntel
English
0
6
33
1.6K
Rogue
Rogue@Roguetwts·
He offended her thinking she was a man
English
21
306
9.8K
1.1M
REED retweetledi
Co11ateral
Co11ateral@co11ateral·
Abusing Printers to Compromise Active Directory In many organizations, sysadmins are only focused on servers and workstations. But printers sit on the same network. They are rarely monitored with the same level of attention as more "important" systems. Many of those printers store AD user credentials which can be extracted in plaintext to attack the DC. Even if the AD is well secured, these creds can be used to poison shares with LNK files. Even print jobs themselves can become a target especially when they contain confidential information. Unfortunaly, many of the IoT devices in the corporate environments are outdated and aren't taken seriously. We also mentioned how you can fix that. hackers-arise.com/iot-hacking-ab… @three_cube @_aircorridor #iot #pentesting
Co11ateral tweet media
English
4
89
454
26.2K
REED retweetledi
i like food
i like food@messedupfoods·
i like food tweet media
ZXX
378
1K
18.4K
2.5M
Shadow
Shadow@Shadow45201·
By far the 2nd best work of Masayuki Kunihiro imo...
Filipino
6
16
102
7.7K
Rogue
Rogue@Roguetwts·
When Baddies get caught 🤭
English
13
202
5.8K
244.5K
R Y Z O
R Y Z O@Ryzoclips·
Michica's beauty >>>
English
6
102
2.2K
118.4K
Shadow
Shadow@Shadow45201·
Been listening to "The four rings" even before I've seen the anime(since 2025), seeing this scene in its entirety alone gives me chills, it's a shame we don't know who animated this part...
English
3
47
592
20.5K
REED retweetledi
タンタンパパ
タンタンパパ@tintinpapa1·
近ごろのAIの動画生成能力には 目を見張りますね😳 ハリーポッターの 筋肉バージョンも作れちゃう なんで作ろうとしたのかは 知らんけど😥 (サウンドオン推奨)
日本語
208
1.5K
9.5K
1.2M
REED retweetledi
Vivek | Cybersecurity
Vivek | Cybersecurity@VivekIntel·
🤖 AI-powered penetration testing agent for autonomous offensive security workflows. Pentest Copilot can: • Run commands directly on a Kali attack box • Analyze outputs and iterate automatically • Use Burp Suite tools natively • Automate browsers for web testing • Spawn parallel subagents for recon/tasks • Manage VPN connections • Install tools on demand • Perform multi-step exploitation workflows Includes: • 16 built-in agent tools • 100+ pentesting capabilities • Burp Repeater / Intruder / Collaborator integration • Browser automation with Magnitude • Support for OpenAI, Claude, Gemini, Mistral & OpenAI-compatible APIs Built for: • Real-world engagements • Boot2Root labs • CTF environments • Autonomous recon and exploitation research 🔗 github.com/bugbasesecurit… #CyberSecurity #Pentesting #AI #RedTeam #BugBounty #OpenSource
English
0
28
147
5.4K
REED retweetledi
Vivek | Cybersecurity
Vivek | Cybersecurity@VivekIntel·
🦖 Autonomous offensive & defensive security research framework built on Claude Code. RAPTOR combines: • Static analysis • Binary analysis • LLM-powered vuln validation • Exploit generation • Patch generation • Fuzzing workflows • OSS forensics • Multi-model analysis pipelines Supports: Semgrep • CodeQL • Z3 SMT solving • AFL++ • Ollama • Claude • GPT • Gemini Built for autonomous security research against source code and binaries. 🔗 github.com/gadievron/rapt… #CyberSecurity #AppSec #CodeQL #Fuzzing #LLM #OpenSource
Vivek | Cybersecurity tweet media
English
0
32
123
3.9K