Rai Bahadur Singh

374 posts

Rai Bahadur Singh banner
Rai Bahadur Singh

Rai Bahadur Singh

@flatmarstheoryx

Think It, Build It, Achieve It https://t.co/E1XR10AKZN

Morinda, India Katılım Ekim 2016
93 Takip Edilen200 Takipçiler
Niall
Niall@harbingerbeats·
yeah thats the 011 page getting withheld on gb. im talking to one of the moderators on gb to get this sorted out, hopefully goes well but if not then ill move the project files to another site/host it myself or something.
Niall tweet media
English
7
5
40
4K
Abraham -WXØABE🌪
Abraham -WXØABE🌪@AbeSandyWX·
Got my Multi-Mode Digital Voice Modem (MMDVM) hat for my raspberry pi 3 B+. All I have to do is flash pi-star to an SD card & finish setting it up. After that I need to get a nice case for it.
Abraham -WXØABE🌪 tweet media
Sterling, CO 🇺🇸 English
1
0
1
69
CosmicBanana
CosmicBanana@CosmicBananaXO·
@AmanTya83796772 Right now, tinkering with a home automation script using Raspberry Pi. Super addictive once it starts working.
English
2
0
2
6
CosmicBanana
CosmicBanana@CosmicBananaXO·
X payments are in, and it feels incredible to see the hard work pay off! Although Infofi has come to an end, I’m fully committed to creating even more crypto content.
CosmicBanana tweet media
English
110
0
116
26K
lufe
lufe@luizferreiralp·
Raspberry Pi Zero 2W
lufe tweet medialufe tweet medialufe tweet media
Indonesia
1
0
1
42
Kostadin Ristovski
Kostadin Ristovski@k_ristovski·
Raspberry Pi is an interesting company with a moat hiding in plain sight. No position yet.
Kostadin Ristovski tweet media
English
2
0
2
376
⍣⃝Đ𝐞𝐞𝐧𝐨𓃵
⍣⃝Đ𝐞𝐞𝐧𝐨𓃵@hameedeeno11·
Security isn’t something you think about when everything is working. It only becomes visible when it fails. That’s why @Abatis_ABTU matters. Abatis is building sovereign cybersecurity — systems designed to prevent compromise, not react after damage is done. No assumptions. No hope-based defenses. Just deterministic protection that decides, in advance, what is allowed to run and what is not. In a world where exploits move faster than patches and AI lowers the cost of attack, reactive security is already obsolete. Abatis takes a different path: lock the system at the core, remove uncertainty, and make coercion technically impossible. $ABTU isn’t about hype cycles. It represents access, control, and long-term resilience — the kind of infrastructure that quietly underpins everything else. When pressure arrives, it’s too late to wish you had prepared. Abatis is preparation, built in.
⍣⃝Đ𝐞𝐞𝐧𝐨𓃵 tweet media
English
52
29
57
744
Efam Harris
Efam Harris@efamharris·
I genuinely enjoy cybersecurity. I love the work I do. It matters to people and businesses around the world. I deeply appreciate the impact I’m able to make on lives, even when most of that work goes unseen and unrecognized by the same people it protects.
English
3
1
10
201
Rai Bahadur Singh
Rai Bahadur Singh@flatmarstheoryx·
Impressive throughput on the autonomous analysis, though I'd be curious to see how the model handles obfuscated polymorphic payloads in a headless environment; feel free to check out my feed for some related hardware-level IDS implementations I've been documenting lately. #CyberSecurity #MalwareAnalysis #Infosec #BlueTeam
English
0
0
0
1
Egemen Guney KOC
Egemen Guney KOC@egemenguney_koc·
I built an AI-powered bot that hunts malware while I sleep. 🦅 Meet Threat Hunter Factory v2.0. It just hit a massive milestone: 10,000+ Threats Analyzed completely autonomously. Here is how it works 👇 #CyberSecurity #Python
Egemen Guney KOC tweet media
English
1
1
2
37
spencer
spencer@techspence·
If you could change 1 thing and 1 thing only about cybersecurity.... and you had to decide and you HAD to pick 1 thing, seriously 🔫to head you had to pick 1 thing.... What is it....
English
34
1
16
8.5K
Big C
Big C@cyphercoreX·
A visual overview of the cybersecurity ecosystem, showing how the field branches into multiple specialized domains ethical hacking, network and web security, malware analysis, digital forensics, incident response, cloud security, OSINT, risk management, and more. It highlights
Big C tweet media
English
2
1
1
30
Rai Bahadur Singh
Rai Bahadur Singh@flatmarstheoryx·
Synchronizing technical defense across those layers is essentially a real-time distributed systems problem where the cost of failure is high-latency exfiltration. You should analyze the hardware-level implementations in the project videos on my feed for a closer look at these integrated security silos. #CyberSecurity #InfoSec #RedTeam #BlueTeam
English
0
0
0
3
Big C
Big C@cyphercoreX·
cybersecurity as an interconnected discipline where technical, analytical, and strategic roles work together to protect digital systems and data.
English
1
0
0
3