L

125 posts

L banner
L

L

@nopolygons

Cymru Katılım Nisan 2023
132 Takip Edilen6 Takipçiler
Adam Simecka
Adam Simecka@AdamSimecka·
There will be no more non-KYC apps in 129 days.
Adam Simecka tweet media
English
227
1.3K
4.9K
360.7K
L retweetledi
bun
bun@lovelessbunni·
Guns I had at 19 featuring my grandmothers room
bun tweet media
English
109
418
5.2K
99.4K
L retweetledi
Chef Winters [$BTC]
Chef Winters [$BTC]@WintersChef·
@DoingFedTime my child is repeating sudo airmon-ng start wlan0 in their sleep, someone help
English
0
1
7
216
Mr.E
Mr.E@MisterEReports·
@DoingFedTime The "dark web" is actually a honeypot and your IP can be successfully unmasked 80% of the time.
English
1
0
0
185
L retweetledi
Sam Bent
Sam Bent@DoingFedTime·
The goal is to make software they hate.
Sam Bent tweet media
English
29
32
231
7.9K
L
L@nopolygons·
@RedHatPentester On an iPhone 8 you are demonstrating this? 😂😂
English
0
0
0
177
Nana Sei Anyemedu
Nana Sei Anyemedu@RedHatPentester·
WHEN A LAW ENFORCEMENT OFFICER ATTEMPTS TO UNLOCK YOUR MOBILE DEVICE BY BRUTE-FORCEING IT USING TOOLS LIKE GRAYKEY OR VERAKEY. I pulled a trace of gray key that was used in the iPhone while hunting for spywares and brute-force attacks. If the FBI or a law enforcement officer, like police, seizes your phone and returns it, you can know if they performed a brute-force attack on it if you know you didn't give them the password to your phone. They Often use GRAY KEY or VERA KEY Modern mobile operating systems and their underlying firmware maintain detailed security and diagnostic logs that can record authentication attempts and forensic access activity. As a result, when tools such as GrayKey or other law enforcement-grade extraction systems are used to perform password brute forcing or advanced device access, traces of these operations may be recorded within system logs, diagnostic artifacts, or security event records on the device. Attackers or suspects may also try to hide activity, but system-level artifacts can still reveal failed brute-force attempts. FUN FACT iOS devices often keep behind-the-scenes logs showing things like: a. when a brute-force attempt started b. when the device was finally unlocked c. and even when extraction tools connected and disconnected. That means a forensic examiner can sometimes tell not just that data was extracted… but how it was extracted and how long it took.
Nana Sei Anyemedu tweet mediaNana Sei Anyemedu tweet media
English
27
216
1.3K
113.9K
belle 𑣲
belle 𑣲@phreshfoidswag·
are there sober sematary fans do they exist
English
58
16
287
8.9K
güs
güs@nukefags·
@k1rallik Id say the bulk of CPUZ users don’t have the latest download from the website. I downloaded mine like a year ago thus I am not affected.
English
1
0
2
525
BuBBliK
BuBBliK@k1rallik·
🚨 do you understand what just happened to your passwords cpuid one of the most trusted sites in PC hardware. hacked. April 10th, 2026. CPU-Z and HWMonitor. both compromised. > fake CRYPTBASE.dll ships inside the installer > connects to C2, downloads a C# file > compiles it silently using YOUR own Windows tools > injects into memory. never touches disk. AV sees nothing. > opens Chrome's password vault. dumps everything. the chain: cpuid → HWMonitor installer → DLL hijack → supp0v3[.]com → silent .NET compile → in-memory injection → Chrome credentials stolen same group. same C2 domain. hit FileZilla in March 2026. they got lazy. that's the only reason we caught it.
vx-underground@vxunderground

Mr. Titus Tech is correct. cpuid-dot-com is indeed delivering malware right now. As I began poking this with I stick I discovered this is not your typical run-of-the-mill malware. This malware is deeply trojanized, distributes from a compromised domain (cpuid-dot-com), performs file masquerading, is multi-staged, operates (almost) entirely in-memory, and uses some interesting methods to evade EDRs and/or AVs such as proxying NTDLL functionality from a .NET assembly. The C2 domain present in one of the binaries is a clear IoC. This is the same Threat Group who was masquerading FileZilla in early March, 2026. They've been busy.

English
185
832
6.5K
1.1M
L retweetledi
Mullvad.net
Mullvad.net@mullvadnet·
This is Senate House in London. When George Orwell wrote 1984, the building served as the model for the headquarters of the Ministry of Truth (the propaganda ministry). The Ministry of Truth decided what was true, for example that 2+2=5. It was responsible for censorship and rewriting history, and it banned the word “free” in the sense of freedom. When we projected our banned TV ads onto buildings in London, we thought this would be a fitting location. Nineteen Eighty-Four was supposed to be a warning, not an instruction manual.
Mullvad.net tweet media
English
36
506
4.1K
87.3K
L
L@nopolygons·
@Pirat_Nation Good incentive to switch to non centralised crypto🖕
English
0
0
0
3
Pirat_Nation 🔴
Pirat_Nation 🔴@Pirat_Nation·
A technical glitch in the mobile apps of Lloyds, Halifax, and Bank of Scotland allowed some UK customers to briefly view other users' transactions, including wages, payments, and personal details “I can see another person’s bank account, he got paid £6,000 yesterday ... I can see where they work, almost their whole identity” Via: dexerto
Pirat_Nation 🔴 tweet mediaPirat_Nation 🔴 tweet media
English
50
97
1.2K
110.7K
L retweetledi
The White House
The White House@WhiteHouse·
UNDEFEATED.
English
23K
24.5K
200.7K
102.5M
L retweetledi
Aphex Twin Updates
Aphex Twin Updates@shellyrealest·
'Selected Ambient Works Volume II' was released 32 years ago, on March 7, 1994. The transcendent double album is notable for its alien-like soundscapes that range from beautiful (#3 / Rhubarb) to horrifying (#16 / Grey Stripe). To this day, nothing else sounds like it.
Aphex Twin Updates tweet mediaAphex Twin Updates tweet mediaAphex Twin Updates tweet mediaAphex Twin Updates tweet media
English
3
142
770
19.9K
L retweetledi
Doc 🥇
Doc 🥇@backendoc·
Doc 🥇 tweet media
ZXX
9
744
6.9K
82.2K
L retweetledi
eric
eric@defyneric·
if you recognize this screen your probably a millionaire rn
eric tweet media
English
411
462
7.4K
785.7K
L retweetledi
Web Design Museum
Web Design Museum@WebDesignMuseum·
21 years of evolution of web design trends. The Pirate Bay homepage in 2005 vs. The Pirate Bay homepage in 2026 #WebDesignHistory
Web Design Museum tweet mediaWeb Design Museum tweet media
English
281
1.6K
20.1K
1.3M