User7472

15 posts

User7472 banner
User7472

User7472

@User74721337

VHQ

Katılım Temmuz 2025
15 Takip Edilen0 Takipçiler
elon musk
elon musk@TheGentlemen25·
I can fix her
elon musk tweet media
English
1
0
2
1.7K
Devman
Devman@Inifintyink·
@HuntressLabs, hey guys, you know right that having @polygonben employed poses a threat to your existing employees? god can have many punishments for people who know what will happen? Or how god could punish them, I recommend terminating him before god decides to punish them=)
English
3
0
4
2.5K
User7472
User7472@User74721337·
@Inifintyink This is literally terrorism in the most primitive sense of the word lol. Time to stop buddy
English
1
0
2
461
Devman
Devman@Inifintyink·
CEOs door burned the company payed 12 hours later after saying they would not ;)
English
2
0
7
2.4K
Devman
Devman@Inifintyink·
Guys I am starting to bold
English
2
0
9
1.9K
Devman
Devman@Inifintyink·
@Ransom_DB Here you are able to see that we support cancer in the fight
English
3
0
6
614
Ransom-DB
Ransom-DB@Ransom_DB·
🚨 Threat actor "Devman" publishes "CANCER" - Brazil 🇧🇷 @Inifintyink dafuq r u doing? 📍 Location: Brazil 🏢 Industry: Nonprofit Healthcare 🔗 Website: cancer.org.br Fundação do Câncer is a Brazilian nonprofit founded in 1991 focused on cancer prevention, research, and education. It collaborates with the National Cancer Institute (INCA) and partners nationwide to develop programs aimed at controlling cancer across Brazil.
Ransom-DB tweet media
English
2
0
6
1.3K
User7472
User7472@User74721337·
@gothburz I used a public exploit with 2000 stars for hack a random website for you No need to thank me, just send me the money
User7472 tweet media
English
0
0
1
37
Peter Girnus 🦅
Peter Girnus 🦅@gothburz·
Someone found an RCE on my website yesterday. CVE-2025-55182. React2Shell. I don't have a bug bounty program. I never asked for a security assessment. I woke up to a DM: "Hey I found a critical vulnerability in your site. I only ran the exploit to verify it worked. Here's my PayPal for the bounty." Bounty? I checked my logs. Forty-seven requests to my RSC endpoint. Something, something ... Prototype pollution payloads. They used the GitHub script. The one with 2,000 stars. The one that runs id automatically "for verification purposes." They spawned a shell on my production server. uid=1001(nextjs) gid=65533(nogroup) They took a screenshot. They posted it on Twitter. "Popped a Shell on a Live Website 🚀💀 #BugBounty #CVE-2025-55182 #YOLO" They got 84781 likes. My customers' data was on that server. I asked them to delete the screenshots. They said "I removed the domain name, you should be thanking me." Thanking them. For unauthorized access to my production infrastructure. For running arbitrary commands on systems I own. For posting proof of exploitation for clout. They called it "responsible disclosure." I called my lawyer. They called me "ungrateful." I called the FBI. Now they're in my DMs explaining that "this is how the industry works" and I "don't understand pen testing." A pen what? I understand it perfectly. I understand that running react2shell-ultimate.py against random websites isn't research. I understand that "I removed the identifying info" doesn't undo the unauthorized access. I understand that #BugBounty doesn't apply when there's no bounty program. I understand that finding my site on Shodan doesn't constitute authorization. Their followers are defending them now. "Presumption of innocence." "You don't know if it was authorized." "The screenshots were redacted." Three hundred people are calling me a bootlicker for reporting a crime. Someone said I should be grateful they didn't deploy a cryptominer. The bar is underground. I just wanted to run a small Next.js app. I didn't ask to be someone's proof-of-concept. I didn't consent to being their "first" I didn't sign up for an unscheduled penetration test from a stranger with a GitHub account. There is no safe harbor for spraying public exploits at random websites. There is no legal protection for "I was just verifying the vulnerability." There is no ethical framework where unauthorized prototype pollution is a favor. But sure. Thank you for your service. You found a CVE that was already public. Using a tool someone else wrote. Against a target that never authorized you. And you posted about it on main. For likes. Hero.
English
269
295
3.9K
514.6K
NET-WORKER
NET-WORKER@networker_sup·
Critical infrastructure + Windows Server 2008 = You have been attacked by NET-WORKER✌️
English
1
0
4
809
Hackmanac
Hackmanac@H4ckmanac·
🚨Cyberattack Alert ‼️ 🇮🇩Indonesia - Ransomware Group vs Ransomware Recovery Company The newly discovered The Gentlemen ransomware group claims to have breached Recovery Ransomware Indonesia. Place your bets. Discover more at hackrisk.io
Hackmanac tweet media
English
1
3
8
4.1K
User7472
User7472@User74721337·
@5mukx Windows Endpoint famous
English
0
0
0
232
Smukx.E
Smukx.E@5mukx·
Perfect Dropper Done. [EDR Bypass Done] ✅
Smukx.E tweet media
English
5
20
186
12.6K
User7472
User7472@User74721337·
Заканчивайте с этим цирком, штурмбаннфюрер
User7472 tweet mediaUser7472 tweet media
Русский
0
0
1
78