๐‘ญ๐’“โˆ†๐’๐’„๐’Š๐’”

5.9K posts

๐‘ญ๐’“โˆ†๐’๐’„๐’Š๐’” banner
๐‘ญ๐’“โˆ†๐’๐’„๐’Š๐’”

๐‘ญ๐’“โˆ†๐’๐’„๐’Š๐’”

@kallBackk

I break into systems for fun. Pentester| CTF grinder. Teaching you cybersecurity one thread at a time โ†“ AVANTI โ€ผ๏ธ

Katฤฑlฤฑm Mart 2020
628 Takip Edilen571 Takipรงiler
๐‘ญ๐’“โˆ†๐’๐’„๐’Š๐’” retweetledi
Avinash Singh
Avinash Singh@AvinashSingh_20ยท
If you're serious about cybersecurityโ€ฆ donโ€™t scroll past this.I just found a folder that can literally change your career. drive.google.com/drive/folders/โ€ฆ Save this before it disappears.
English
0
20
99
5.3K
๐‘ญ๐’“โˆ†๐’๐’„๐’Š๐’” retweetledi
EnergyUp
EnergyUp@EnergyUp_ยท
A HARVARD psychologist says: โ€œif youโ€™ve achieved nothing by 25, youโ€™ve avoided the most destructive illusion of youthโ€
EnergyUp tweet media
English
285
2.3K
59.8K
3.4M
๐‘ญ๐’“โˆ†๐’๐’„๐’Š๐’” retweetledi
jack
jack@jackยท
everything is programming
English
2.4K
3.5K
20.2K
833.4K
๐‘ญ๐’“โˆ†๐’๐’„๐’Š๐’” retweetledi
Shad0w
Shad0w@Itx_Shad0wยท
A couple of months ago, I told a friend about bug bounty and encouraged him to give it a try. I kept checking in on him here and there, sharing whatever I knew even though I was still a beginner myself. A few days ago, he landed his first bounty Seeing your friends win hits different. Itโ€™s a whole other kind of happiness.
English
5
3
97
2.9K
๐‘ญ๐’“โˆ†๐’๐’„๐’Š๐’” retweetledi
manuel valdezโ›ฉ๏ธ
Is hacking an addiction?
English
21
4
53
4.7K
๐‘ญ๐’“โˆ†๐’๐’„๐’Š๐’”
just grep. the stuff that actually gets you domain admin or a critical finding on a real engagement isn't always a zero-day it's the basics executed thoroughly while everyone else is running noisy automated tools and missing what's right in front of them slow down. grep it !!
English
0
0
0
3
๐‘ญ๐’“โˆ†๐’๐’„๐’Š๐’”
unpopular opinion: grep and strings have closed more real engagements than any fancy scanner clients pay for full pentest reports and the finding that hurts them most is always the simple one. a hardcoded credential in a config file. an API key sitting in a binary. .
English
1
0
0
8
๐‘ญ๐’“โˆ†๐’๐’„๐’Š๐’” retweetledi
H4RUK7 KIRA ๐Ÿ‡ฏ๐Ÿ‡ต๐Ÿ‡จ๐Ÿ‡ต
built a simple evidence collection tool that would show when and evidence has bee tampered with
H4RUK7 KIRA ๐Ÿ‡ฏ๐Ÿ‡ต๐Ÿ‡จ๐Ÿ‡ต tweet mediaH4RUK7 KIRA ๐Ÿ‡ฏ๐Ÿ‡ต๐Ÿ‡จ๐Ÿ‡ต tweet mediaH4RUK7 KIRA ๐Ÿ‡ฏ๐Ÿ‡ต๐Ÿ‡จ๐Ÿ‡ต tweet media
English
6
10
60
2.4K
๐‘ญ๐’“โˆ†๐’๐’„๐’Š๐’” retweetledi
Wode Maya ยฎ
Wode Maya ยฎ@wode_mayaยท
Always pray for grace and wisdom ๐Ÿ™๐Ÿพ
English
61
262
1.9K
21.1K
๐‘ญ๐’“โˆ†๐’๐’„๐’Š๐’” retweetledi
Myrtus
Myrtus@Myrtus0x0ยท
if ppl could stop communicating with threat actors, that would be really great
English
27
8
110
56.9K
๐‘ญ๐’“โˆ†๐’๐’„๐’Š๐’”
Axios. 100 million downloads a week. Compromised. The attacker didn't hack the code. They hacked the maintainer's account, swapped the email to ProtonMail, and pushed a RAT to every OS silently. Within 2 seconds of npm install it was already calling home. Check your lockfiles.
English
0
1
0
73
๐‘ญ๐’“โˆ†๐’๐’„๐’Š๐’”
Supply chain attacks are the new frontier. You can patch your systems all day. But if you blindly trust every npm install you're one dependency away from a breach. RT this to every dev you know. Lives ( prod servers) depend on it. Follow @kallBackk for more real-time breakdowns
English
0
0
0
16
๐‘ญ๐’“โˆ†๐’๐’„๐’Š๐’”
This wasn't luck. It was surgical. Three payloads pre-built for three operating systems. Both release branches poisoned within 39 minutes of each other. Every artifact designed to self-destruct. Someone planned this carefully.
English
1
0
0
11