SyXe'05

52 posts

SyXe'05 banner
SyXe'05

SyXe'05

@SnatCLS

Reverse Engineer · Malware Analyst · Penetration Tester | CTF Player | Hack4u

Spain Katılım Mart 2016
18 Takip Edilen7 Takipçiler
SyXe'05
SyXe'05@SnatCLS·
@The_Cyber_News Impressive work. This looks less like a “BitLocker break” and more like a deep understanding of Windows trust transitions, WinRE, recovery states, and compatibility layers. Very valuable research. Respect to the researchers involved.
English
0
0
0
54
Cyber Security News
Cyber Security News@The_Cyber_News·
⚠️ BitUnlocker Attack on Windows 11 Allows Access to Encrypted Disks in 5 Minutes Source: cybersecuritynews.com/bitunlocker-do… A new tool, BitUnlocker, reveals a practical downgrade attack against Microsoft's BitLocker encryption, allowing attackers with physical access to decrypt protected volumes on patched Windows 11 machines in under 5 minutes by exploiting a crucial gap between patching and certificate revocation. The attack is rooted in CVE-2025-48804, one of four critical zero-day vulnerabilities. Systems that have completed the KB5025885 migration, moving the boot manager signature to the newer Windows UEFI CA 2023 certificate, are also protected against this downgrade path. #cybersecuritynews #Windows11
Cyber Security News tweet media
English
26
359
1.2K
90.5K
ꪆৎ
ꪆৎ@fairiehaze·
why books can’t be in the dark theme?
ꪆৎ tweet media
English
882
1.3K
16.2K
1.7M
SyXe'05
SyXe'05@SnatCLS·
@CyberRacheal It's probably the memory; it's a hypothesis, but it almost always works. It could also be a process overloading the system, or it could be malware, to name a few examples. What to do? A system scan to reveal the cause, another maxim that almost always works.
English
1
0
2
146
Cyber_Racheal
Cyber_Racheal@CyberRacheal·
Pc is running slow, why? 😪
Cyber_Racheal tweet media
English
37
7
84
4.2K
SyXe'05
SyXe'05@SnatCLS·
@v12sec Hey ! ¿Is it a USB drive? iit's very pretty
English
0
0
0
1.6K
SyXe'05
SyXe'05@SnatCLS·
@elonmusk Good idea Elon! Now it just needs to actually be implemented. Open-sourcing recommendation systems is complicated due to privacy issues and potential exploits, but without real transparency there will never be full trust
English
0
0
0
22
Elon Musk
Elon Musk@elonmusk·
To give people confidence that we are not secretly manipulating the 𝕏 recommendations, it is critical that we open source anything that influences what people are shown
English
10.8K
15.6K
163.7K
31.2M
SyXe'05
SyXe'05@SnatCLS·
@PELock Awesome ! So cool to keep seeing you around xD
English
0
0
0
15
Akash
Akash@kaaaash____·
I’m 22 and I want to start learning DSA now. Be honest.… am I already late?
Akash tweet media
English
148
13
536
26.7K
Mr Shivam
Mr Shivam@Shivam25mishra·
Why do most programmers using Dark theme when writing code?
Mr Shivam tweet media
English
188
8
347
16.8K
Irushi
Irushi@Im_IrushiK·
When VibeCoders build a full stack product!
Irushi tweet media
English
37
8
89
2.6K
kritika
kritika@vibeonX69·
Which OS do you like the most till now??
kritika tweet media
English
92
4
123
3.5K
mєdoş
mєdoş@medoliyy·
ERKEKLER, lütfen samimi olun! Bu size yeter mi? Rahatça yaşar mıydınız?
mєdoş tweet media
Türkçe
902
89
2.9K
202.8K
Jeferson Nasa
Jeferson Nasa@Jefersonnasa_·
Hombres, sean brutalmente honestos. ¿Es esto suficiente?
Jeferson Nasa tweet media
Español
989
181
3.2K
162.7K
Anaya
Anaya@Anaya_sharma876·
Genuine question: If Linux is so good… why do most people still use Windows?
Anaya tweet media
English
353
19
766
50.5K
iShowCybersecurity
iShowCybersecurity@ishowcybersec·
At what age did you begin using Linux? I started at 19. How about you?
English
24
6
35
3.1K
SyXe'05
SyXe'05@SnatCLS·
@ishowcybersec jajaja ! That train isn't going anywhere, and don't get confused, they might even throw a Burp Suite on top of it xD
English
0
0
0
108
iShowCybersecurity
iShowCybersecurity@ishowcybersec·
Can anybody with Linux knowledge tell me where this train is going?
iShowCybersecurity tweet media
English
14
7
29
2K
iShowCybersecurity
iShowCybersecurity@ishowcybersec·
A hacker gains access to a Linux server but never creates any files, never installs malware, and only uses built-in commands already present on the system. Can defenders still detect the intrusion later?
English
21
6
66
10.9K