20.3K posts

⚓ banner
⚓

@ashrafAlshzw

我的原始帐户 | 我喜欢pencak silat | DFIR and Investigation | OSINT Analyst | ﻻﻏﺎﻟﺐ ﺍٕﻻﺑﺎﻟﻠﻪ | Cyber Security enthusiast 🇷🇺🇵🇸🇸🇦🇨🇳🇰🇵

black hole Katılım Temmuz 2012
2.2K Takip Edilen889 Takipçiler
⚓ retweetledi
Szabolcs Panyi
Szabolcs Panyi@panyiszabolcs·
Inside Moscow's elite Bauman University, a secret department trains the GRU's next-gen hackers, saboteurs, and spies. Leaked documents now expose how its graduates feed the units behind Russia's cyberattacks, election interference, and NATO sabotage. vsquare.org/welcome-to-the…
English
7
375
718
26.2K
⚓ retweetledi
Vivek | Cybersecurity
Vivek | Cybersecurity@VivekIntel·
🔎 𝗦𝗲𝗮𝗿𝗰𝗵 𝗘𝗻𝗴𝗶𝗻𝗲𝘀 𝗳𝗼𝗿 𝗣𝗲𝗻𝘁𝗲𝘀𝘁𝗲𝗿𝘀 🌐 𝗜𝗻𝗳𝗿𝗮𝘀𝘁𝗿𝘂𝗰𝘁𝘂𝗿𝗲 / 𝗦𝗲𝗿𝘃𝗲𝗿𝘀 • shodan.iocensys.ioonyphe.ioivre.rocks 📡 𝗧𝗵𝗿𝗲𝗮𝘁 𝗜𝗻𝘁𝗲𝗹𝗹𝗶𝗴𝗲𝗻𝗰𝗲 • app.binaryedge.io / binaryedge.ioviz.greynoise.iofofa.infozoomeye.orgleakix.netsocradar.iopulsedive.com 🕵️ 𝗢𝗦𝗜𝗡𝗧 & 𝗔𝘁𝘁𝗮𝗰𝗸 𝗦𝘂𝗿𝗳𝗮𝗰𝗲 • intelx.ioapp.netlas.iofullhunt.io 💻 𝗖𝗼𝗱𝗲 & 𝗪𝗲𝗯 𝗔𝗻𝗮𝗹𝘆𝘀𝗶𝘀 • grep.appsearchcode.compublicwww.comurlscan.io 📧 𝗘𝗺𝗮𝗶𝗹 & 𝗜𝗱𝗲𝗻𝘁𝗶𝘁𝘆 • hunter.io 📶 𝗦𝗽𝗲𝗰𝗶𝗮𝗹𝗶𝘇𝗲𝗱 • wigle.net → WiFi networks • crt.sh → SSL certificates • vulners.com → vulnerabilities • google.com → dorks 🎯 Don’t just collect tools. Use them for recon, enumeration, and validation. #OSINT #Pentesting #CyberSecurity #bugbounty
English
4
121
525
18.8K
⚓ retweetledi
War Flash
War Flash@WarFlash_2630·
Omega Group 🏴‍☠️🔱⚔️ The OMEGA Teams were a joint collaborative program run by both the Central Intelligence Agency (CIA) and the JSOC. Combining the elite military units underneath the JSOC structure and the intelligence network run by the CIA has allowed the United States to operate a secretive network of ‘hunter/killer’ teams who operate with little to no oversight around the world. They were used to find high-value-targets (HVTs) in hostile environments
War Flash tweet mediaWar Flash tweet mediaWar Flash tweet mediaWar Flash tweet media
English
10
123
1.3K
63.2K
⚓ retweetledi
New York Post
New York Post@nypost·
FBI offers $200K reward for ex-Air Force intelligence agent accused of spying for Iran trib.al/GbzSCY1
New York Post tweet media
English
368
4.2K
11.4K
678.6K
⚓ retweetledi
Unfiltered
Unfiltered@quotesdaily100·
40 TOOLS TO PROTECT YOUR PRIVACY ONLINE: 1. protonmail. com — encrypted email for free 2. signal. org — most secure messaging app 3. bitwarden. com — open source password manager 4. mullvad. net — anonymous VPN, no logs 5. tor project. org — browse completely anonymously 6. privacyguides. org — full privacy setup guide 7. duckduckgo. com — search without being tracked 8. startpage. com — Google results, zero tracking 9. simplelogin. io — hide your real email address 10. adguard. com — block ads & trackers everywhere 11. ublock origin — best free ad blocker extension 12. haveibeenpwned. com — check if your data leaked 13. virustotal. com — scan any file before opening 14. browserleaks. com — see what sites know about you 15. coveryourtracks. eff. org — test your browser fingerprint 16. justdeleteme. xyz — delete your accounts easily 17. deseat. me — clean up your digital footprint 18. cryptomator. org — encrypt your cloud files 19. veracrypt. fr — encrypt your entire hard drive 20. keybase. io — encrypt messages & files easily 21. privnote. com — send notes that self-destruct 22. temp mail. org — disposable email addresses 23. mysudo. com — fake phone numbers & emails 24. piped. video — watch YouTube without tracking 25. privacy. com — create virtual cards for online payments 26. protonvpn. com — free VPN from the makers of ProtonMail 27. windscribe. com — free VPN with 10GB monthly 28. searx. space — open source private search engine 29. privacy badger — automatically block invisible trackers 30. maildrop. cc — instant throwaway email, no signup 31. guerrillamail. com — disposable email that expires fast 32. 10minutemail. com — email address that lasts 10 minutes 33. authy. com — secure two-factor authentication app 34. aegis authenticator — open source 2FA for Android 35. spideroak. com — zero knowledge cloud backup 36. onionshare. org — share files anonymously over Tor 37. securedrop. org — leak documents to journalists safely 38. openpgp. org — encrypt your emails end to end 39. exodus privacy. fr — see every tracker inside any Android app 40. malwarebytes. com — scan and remove malware for free
English
58
719
2.8K
111.1K
⚓ retweetledi
Muhammad Ayan
Muhammad Ayan@socialwithaayan·
50 WEBSITES GOOGLE DOESN'T WANT YOU TO KNOW 1. 12ft. io — bypass any paywall 2. libgen. is — millions of free textbooks 3. sci-hub. se — free research papers 4. alternativeto. net — find free app alternatives 5. justwatch. com — find where to stream anything 6. archive. org — access any old webpage ever 7. gutenberg. org — 70K free classic books 8. pdfdrive. com — free PDF downloads 9. openculture. com — free courses from top unis 10. wolframalpha. com — solve any math instantly 11. photopea. com — free Photoshop in browser 12. squoosh. app — compress any image free 13. remove. bg — remove image backgrounds free 14. cleanup. pictures — erase objects from photos 15. unscreen. com — remove video backgrounds 16. carbon. now. sh — turn code into art 17. ray. so — beautiful code screenshots 18. shots. so — free product mockups 19. smartmockups. com — mockups without Photoshop 20. haveibeenpwned. com — check if you were hacked 21. virustotal. com — scan any file for malware 22. privnote. com — send self destructing messages 23. temp-mail. org — disposable email instantly 24. file. io — share files that auto delete 25. archive. ph — save any webpage forever 26. similarsites. com — find any site alternatives 27. radio. garden — listen to any radio worldwide 28. everynoise. com — explore every music genre 29. tunefind. com — find songs from any show 30. musicforprogramming. net — music to focus with 31. mynoise. net — custom focus soundscapes 32. coffitivity. com — cafe sounds for productivity 33. elicit. org — AI research paper assistant 34. consensus. app — search what science agrees on 35. connectedpapers. com — map research visually 36. semanticscholar. org — free academic search 37. scispace. com — understand any research paper 38. summarize. tech — summarize any YouTube video 39. phind. com — AI search for developers 40. regex101. com — test any regex instantly 41. codebeautify. org — format any code cleanly 42. jsonformatter. org — read JSON like a human 43. explainshell. com — understand terminal commands 44. raindrop. io — bookmark manager that works 45. downdetector. com — check if any site is down 46. tineye. com — reverse image search 47. fast. com — check your internet speed 48. smallpdf. com — edit PDFs free 49. ilovepdf. com — merge and split PDFs 50. 10minutemail. com — temp email in seconds The internet is bigger than Google shows you. Most people never leave the first page.
Muhammad Ayan tweet mediaMuhammad Ayan tweet mediaMuhammad Ayan tweet mediaMuhammad Ayan tweet media
English
158
4.6K
15K
716.6K
⚓ retweetledi
Redaksi Lain
Redaksi Lain@redaksilain·
Kasus Chromebook Nadiem ini sebenernya gimana sih, kok bisa dituntut 18 tahun? Gue coba jelasin pake bahasa bayi, tanpa istilah hukum yang ribet, Versi Jaksa vs Pembelaan Nadiem ⬇️⬇️
Redaksi Lain tweet media
Indonesia
258
8.9K
31.4K
1.2M
⚓ retweetledi
Nav Toor
Nav Toor@heynavtoor·
Google Maps knows where you live. Google Maps knows where you work. Google Maps knows the doctor you visited on Tuesday. Google Maps knows the bar you went to on Friday. Google Maps knows how long you spent at your ex's apartment. Every route. Every store. Every restaurant. Timestamped. Logged. Forever. On November 14, 2022, Google was caught tracking users who had explicitly turned off location history. They paid $391.5 million to settle with 40 US state attorneys general. The largest internet privacy settlement in American history. Then in September 2023, California fined them another $93 million for the same thing. You are not using a free map app. You are wearing a tracking device that happens to give directions. On December 20, 2020, two developers named Alexander Borsuk and Viktar Havaka walked out on their employer. They had spent years building a maps app called MAPS.ME on top of OpenStreetMap data. The owner had pushed a closed-source build that broke the community's trust. They forked the project the same day. They registered organicmaps.app the next morning. They started over. It is called Organic Maps. Six years later, six million people use it. → Full offline maps. Download a country once. No internet needed. → Turn-by-turn voice navigation for walking, cycling, and driving. → Hiking trails, cycling routes, contour lines, elevation profiles. → Public transport and subway maps for major cities. → Wikipedia articles for places of interest baked in. → Bookmarks and GPX tracks for travelers. → Dark mode. Offline search. Battery sipping by design. → iOS, Android, F-Droid, Huawei AppGallery. → No GPS data sent anywhere. Your location stays on your device. → No ads. No tracking. No analytics. No account. No phoning home. Verified by the Exodus Privacy Project: zero trackers, zero spy permissions. Verified by TrackerControl on iOS: same result. Auditable on GitHub. Not a marketing claim. Here is the wildest part: The whole thing runs on donations. The servers are donated by Mythic Beasts, an ISP that gives them 400 terabytes of bandwidth every month for free. 44+ Technologies in Vietnam donates a dedicated server worth $12,000 a year so Southeast Asia downloads maps fast. NLnet handed them a European Commission grant to improve search and fonts. 100 contributors wrote 1,500 commits in 2025 alone. None of them got paid. 10 petabytes of map data served in 2025. $0 revenue. $0 trackers. Google Maps: Free. Settled $484.5 million in tracking lawsuits. Apple Maps: Free. Still reports to Apple. Waze: Free. Owned by Google. Organic Maps: Free. Tracks nothing. Works offline. Forever. One honest flag: in April 2025, some contributors raised governance concerns and forked a sister project called CoMaps. Both apps are alive. The privacy crowd watches both. 13,963 stars. 1,397 forks. Apache 2.0. But DO NOT install Organic Maps. We should all keep letting Google track where we sleep.
Nav Toor tweet media
English
38
251
829
46.8K
⚓ retweetledi
IT Guy
IT Guy@T3chFalcon·
What privacy-first software looks like — Part II: Whonix(@Whonix) → security-focused operating system that routes all traffic through Tor to help isolate applications and reduce IP leaks. SMSPool(@smspoolnet) → temporary phone number platform useful for compartmentalization and reducing exposure of personal numbers online. Qubes OS(@QubesOS) → compartmentalized operating system that isolates tasks into separate virtual machines for stronger security boundaries. LibreOffice(@LibreOffice) → open-source office suite that gives users local control over documents without dependence on cloud ecosystems. SimpleX(@SimpleXChat) → messenger designed without user IDs or persistent identifiers, reducing metadata exposure by design. ExifTool → powerful metadata analysis and removal tool for inspecting hidden information inside files and images. Proton Drive(@ProtonDrive) → end-to-end encrypted cloud storage focused on protecting files from provider-side access. Tails(@Tails_live) → portable live operating system that routes internet traffic through Tor and leaves minimal traces on the device used. YubiKey(@Yubico) → hardware security key that adds phishing-resistant multi-factor authentication for accounts and devices.
IT Guy tweet media
IT Guy@T3chFalcon

What privacy-first software looks like: ddocs[.]new(@fileverse) → documents encrypted locally before upload. the provider cannot read drafts, deleted text, or revision history. privacy enforced by cryptography. Mullvad VPN(@mullvadnet) → privacy-focused VPN with anonymous account generation, minimal data collection, and optional anonymous payments. Windscribe (@windscribecom)privacy-focused VPN designed to reduce tracking, hide your IP address, and give users more control over their network privacy GrapheneOS(@GrapheneOS) → hardened Android-based OS focused on security, sandboxing, and minimizing unnecessary data collection. Linux → open-source operating systems that give users more transparency, control, and customization over their devices and data. Brave(@brave), LibreWolf, Tor Browser(@torproject) → privacy-focused browsers with tracker blocking, anti-fingerprinting protections, and stronger control over web surveillance. Signal(@signalapp) → end-to-end encrypted messaging with minimal metadata retention. open source and built around private communication. Monero(@monero) → privacy-focused cryptocurrency that hides sender, receiver, and transaction amounts by default instead of exposing everything on a public ledger. What did i miss ? 🤔

English
54
250
1.6K
66.5K
⚓ retweetledi
Rand Paul
Rand Paul@RandPaul·
Today, a CIA whistleblower sat before my committee and confirmed what I've said for years: government officials, including Dr. Fauci, deliberately misled the American people about the origins of COVID-19. This is not a conspiracy theory. This is sworn testimony. 🧵
English
1.9K
12.1K
60.1K
3.4M
⚓ retweetledi
Filmora Hub🍿
Filmora Hub🍿@Therealmeddi·
Pure Masterpieces.. Go and Watch.
Filmora Hub🍿 tweet mediaFilmora Hub🍿 tweet media
English
9
111
829
83K
⚓ retweetledi
Kr
Kr@karirfess·
anak IT kalo flexing.. bisa dilihat dari ekstensi domainnya🫵😌 Kelas subsidi : .xyz .my.id .web.id .biz.id Kelas Menengah: .com .info .net .app .dev Kelas Elit : .ai .io Kelas menolak mengeluarkan uang: .netlify .vercel .github
Indonesia
112
371
5K
124.6K
⚓
@ashrafAlshzw·
@MoviePlusx The terminal list🔥
English
0
0
1
4
MoviePlus📺
MoviePlus📺@MoviePlusx·
Mark Your Calendars. These are coming.
MoviePlus📺 tweet mediaMoviePlus📺 tweet mediaMoviePlus📺 tweet media
English
30
315
2.4K
144.6K
⚓ retweetledi
Vivek | Cybersecurity
Vivek | Cybersecurity@VivekIntel·
𝗢𝗦𝗜𝗡𝗧 & 𝗔𝘁𝘁𝗮𝗰𝗸 𝗦𝘂𝗿𝗳𝗮𝗰𝗲 𝗧𝗼𝗼𝗹𝘀 𝗘𝘃𝗲𝗿𝘆 𝗖𝘆𝗯𝗲𝗿𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗟𝗲𝗮𝗿𝗻𝗲𝗿 𝗦𝗵𝗼𝘂𝗹𝗱 𝗞𝗻𝗼𝘄 🔎⚡ 1. Shodan 🌐 shodan.io → Internet-connected device search → Server & exposed service discovery ━━━━━━━━━━━━━━━━━━ 2. Google 🌐 google.com → Google Dorking → Advanced search reconnaissance ━━━━━━━━━━━━━━━━━━ 3. Censys 🌐 search.censys.io → Internet asset intelligence → Host & certificate enumeration ━━━━━━━━━━━━━━━━━━ 4. Hunter.io 🌐 hunter.io → Email enumeration → Domain-based email discovery ━━━━━━━━━━━━━━━━━━ 5. FullHunt 🌐 fullhunt.io → Attack surface management → Asset discovery & exposure analysis ━━━━━━━━━━━━━━━━━━ 6. ONYPHE 🌐 onyphe.io → Cyber defense search engine → Host & service intelligence ━━━━━━━━━━━━━━━━━━ 7. SOCRadar 🌐 socradar.io → Threat intelligence platform → External attack surface monitoring ━━━━━━━━━━━━━━━━━━ 8. BinaryEdge 🌐 binaryedge.io → Internet scanning intelligence → Exposed systems & services ━━━━━━━━━━━━━━━━━━ 9. IVRE 🌐 ivre.rocks → Network recon framework → Asset discovery & analysis ━━━━━━━━━━━━━━━━━━ 10. crt.sh 🌐 crt.sh → Certificate transparency search → Subdomain enumeration ━━━━━━━━━━━━━━━━━━ 11. Vulners 🌐 vulners.com → Vulnerability intelligence database → CVE & exploit research ━━━━━━━━━━━━━━━━━━ 12. PublicWWW 🌐 publicwww.com → Source code & technology search → JavaScript/API key discovery research ━━━━━━━━━━━━━━━━━━ 13. Pulsedive 🌐 pulsedive.com → IOC & threat intelligence platform → Threat investigation & enrichment ━━━━━━━━━━━━━━━━━━ 14. IntelX 🌐 intelx.io → OSINT & data search engine → Historical data & breach intelligence ━━━━━━━━━━━━━━━━━━ 15. Wigle 🌐 wigle.net → Wi-Fi network mapping → Wireless reconnaissance ━━━━━━━━━━━━━━━━━━ 16. GreyNoise 🌐 viz.greynoise.io → Internet noise intelligence → Scanner & attacker activity analysis ━━━━━━━━━━━━━━━━━━ 📌 Best Use Cases • Subdomain enumeration • Asset discovery • Threat intelligence • Attack surface mapping • Exposure monitoring • Vulnerability research • OSINT investigations ━━━━━━━━━━━━━━━━━━ Knowing tools is not enough. Learn: → when to use them → how to correlate data → how to verify findings That’s where real OSINT skill starts. #OSINT #CyberSecurity #ThreatIntelligence #InfoSec #Recon
English
1
19
92
3K