𝟶𝚡𝙷𝚎𝚗𝚛𝚢

3.5K posts

𝟶𝚡𝙷𝚎𝚗𝚛𝚢 banner
𝟶𝚡𝙷𝚎𝚗𝚛𝚢

𝟶𝚡𝙷𝚎𝚗𝚛𝚢

@evilla_t

Networking & IT/OT & Security enthusiast! Tweeting stuff that inspires, intrigues or outrages me | Cisco Champion 2016-24 | Tweets are my own ;-)

Spain Katılım Temmuz 2011
509 Takip Edilen156 Takipçiler
𝟶𝚡𝙷𝚎𝚗𝚛𝚢 retweetledi
Даниил Чебыкин
Даниил Чебыкин@chebykin_d·
— Вот мой новый VPN сетап. Как вам? — Ух ты, красивый, вы только посмотрите. — Только вчера дописал конфиг. sing-box + GeoIP базы Antizapret для сплит-роутинга на клиенте, FakeIP против утечек DNS, Shadowsocks 2022 over Cloak в качестве транспорта. Первый хоп на сервера VK Cloud в России, потом в Нидерланды. Фолбек на коммерческие сервера RedShield через AmneziaWG2.0. — Оnлично, Бейтман, но всё это пустяки. Смотри. Сплит трафика по приложениям: браузерный трафик идёт через Naive Proxy, тяжёлый трафик — через Hysteria2 с Brutal, на разные VPS, также с мультихопом через Россиию. Telegram через MTProto. Подключено два интернет-провадйера, между которыми роутер переключается по round-robin в случае потери связи. DNS leak исключён за счёт использования DoH к Quad99 и блокировки исходящего трафика на 53 порт. Ну как? — Красиво. Высший класс. (Не думал, что у него столько вкуса. Не могу поверить, что Брайсу больше понравился стек Ван-Пата) — Но постойте. Вы ещё ничего не видели. VLESS через Xray-Core с транспортом в виде WebSocket и gRPC — трафик идёт до известных CDN: Cloudflare, NGENIX, Yandex CDN и CDN77, с domain-fronting и ротацией в зависимости от пинга и загрузки. Глобальный фолбек в виде Tor Snowflake (WebRTC) через хоп на резидентный IP в Беларуси, с которым устанавливается параллельный настоящий звонок для маскировки. — Очень красиво... А покажи-ка VPN Пола Алена. Какой лаконичный стек... Это же золотой стандарт индустрии... VLESS + Reality + XTLS-Vision + uTLS... И первый хоп подобран со вкусом: белосписочный VPS в Yandex Cloud... Максировка под сертификат Yandex Market из той же подсети, защита от активного пробинга... Боже, даже фолбек есть: нелегальный turn-proxy через абьюз WebRTC звонков Вконтакте...
Даниил Чебыкин tweet media
Русский
79
359
5K
252.1K
𝟶𝚡𝙷𝚎𝚗𝚛𝚢 retweetledi
thaddeus e. grugq
thaddeus e. grugq@thegrugq·
BREAKING: Do not sit on this! If you are using this software you are vulnerable to a zero day. A piece of hacker code that unlocks your computer to viruses and malware. AI has turbocharged hackers. They can now built cyber antiVAX systems faster than vendors can respond!
Brendan Dolan-Gavitt@moyix

CRITICAL: if you are running Mosaic 2.4 on a VAX/VMS system, please be aware of this RCE that GPT-5.4 just found and exploited!

English
8
24
127
17.5K
𝟶𝚡𝙷𝚎𝚗𝚛𝚢 retweetledi
@mikko
@mikko@mikko·
Time is a great way to show the scale of mega (million), giga (billion), and tera (trillion). A megasecond ago was March 2026 A gigasecond ago was July 1994 A terasecond ago was 29,663 BCE in the Paleolithic era.
English
3
34
241
15K
𝟶𝚡𝙷𝚎𝚗𝚛𝚢 retweetledi
solst/ICE of Astarte
solst/ICE of Astarte@IceSolst·
- XZ utils backdoor: found by guy debugging 200ms latency - LiteLLM hack: found by guy debugging oom issue These could have been the most impactful compromises ever. Forget security vendors, weaponize your engineers’ autism.
English
56
478
4.3K
148.9K
𝟶𝚡𝙷𝚎𝚗𝚛𝚢 retweetledi
Infoblox
Infoblox@Infoblox·
We discovered a phishing actor that is abusing .arpa to host content on domains that should not resolve to an IP address. The actor uses free services to create domain names from reverse DNS strings for IPv6 tunnels that use the .arpa top level domain. 🧵
Infoblox tweet media
English
15
85
582
67.2K
𝟶𝚡𝙷𝚎𝚗𝚛𝚢 retweetledi
Aaronia AG
Aaronia AG@Aaronia_AG·
Words fastest #Jammer using ground breaking "Silicon-Strike" Technology ⚡️ This jammer is so fast (ns multichirp) & offers such high bandwidth (20GHz) that it can disrupt even the most robust "unjamable" UWB FFH protocols. #Aaronia #CUAS #CUAV #antidrone #EnforceTac
Aaronia AG tweet media
English
0
8
56
3.1K
𝟶𝚡𝙷𝚎𝚗𝚛𝚢 retweetledi
Tech Bro Memes
Tech Bro Memes@techbromemes·
ZXX
93
2.6K
42.4K
1.3M
𝟶𝚡𝙷𝚎𝚗𝚛𝚢 retweetledi
Harshi.exe
Harshi.exe@ishtwts·
Knock knock Race condition Who's there
English
67
644
7.4K
200.6K
𝟶𝚡𝙷𝚎𝚗𝚛𝚢 retweetledi
chiefofautism
chiefofautism@chiefofautism·
someone built a tool that REMOVES LLM CENSORSHIP in 45 minutes with a SINGLE command its called HERETIC here is how it works and why everyone is talking about it
chiefofautism tweet media
English
197
1.3K
12.7K
720.5K
𝟶𝚡𝙷𝚎𝚗𝚛𝚢 retweetledi
GreyNoise
GreyNoise@GreyNoiseIO·
We observed a 65% drop in global telnet traffic in a single hour on Jan 14, settling into a sustained 59% reduction. 18 ASNs went silent, 5 countries disappeared, but cloud providers were unaffected. Our analysis of 51.2M sessions points to backbone-level port 23 filtering by a North American Tier 1 transit provider. 🔗 labs.greynoise.io/grimoire/2026-… #GreyNoise #ThreatIntel #CyberSecurity #InfoSec
English
4
65
223
69.8K
𝟶𝚡𝙷𝚎𝚗𝚛𝚢 retweetledi
International Cyber Digest
International Cyber Digest@IntCyberDigest·
With your permission Gemini can now connect to all of your data.
International Cyber Digest tweet media
Google@Google

Today, we’re introducing Personal Intelligence. With your permission, Gemini can now securely connect information from Google apps like @Gmail, @GooglePhotos, Search and @YouTube history with a single tap to make Gemini uniquely helpful & personalized to *you* ✨ This feature is launching in beta today in the @GeminiApp. See Personal Intelligence in action 🧵 ↓

English
58
1.6K
12.9K
461.7K
𝟶𝚡𝙷𝚎𝚗𝚛𝚢 retweetledi
Branko
Branko@brankopetric00·
Scaled from 1,000 to 100,000 users. Here's what broke. At 5,000 users: - Single database became the bottleneck - Added read replicas At 20,000 users: - Session storage overwhelmed Redis - Switched to JWT tokens At 50,000 users: - File uploads killed our servers - Moved to S3 with presigned URLs At 75,000 users: - Search became unusable - Implemented Elasticsearch At 100,000 users: - DNS became single point of failure - Multi-region with Route53 failover Every stage felt like the final architecture. None of them were. Scaling isn't a destination. It's a continuous series of bottleneck discoveries.
English
122
432
5.8K
331.7K
𝟶𝚡𝙷𝚎𝚗𝚛𝚢 retweetledi
thaddeus e. grugq
thaddeus e. grugq@thegrugq·
Over 20 years ago someone suggested using worm compromised boxes for bounces 1) if they’re haven’t been cleaned up after a year, they’re essentially invisible 2) you already know how to access the box
Shodan@shodanhq

In 2016, somebody decided to write a worm that compromises Ubiquiti devices, change their hostnames to match how the system was compromised and close off the service. Years later the worm is still active with hundreds of compromised systems: #overview" target="_blank" rel="nofollow noopener">trends.shodan.io/search?query=t…

English
1
3
18
7.7K
𝟶𝚡𝙷𝚎𝚗𝚛𝚢 retweetledi
John Lambert
John Lambert@JohnLaTwC·
Think Deeper. One line of this @SentinelOne blog (🙏 @TomHegel and @milenkowski) stood out to me. 💭"Encrypts and password-protects the archive using 7-Zip with the password @WsxCFt6&UJMmko0, ensuring the data is obfuscated from inspection." Pretty strong password at first blush. Let's see if @Copilot can figure out why the threat actor may have chosen it.
John Lambert tweet media
English
2
18
58
9K