Tweet fixado
🖤ֆǟʍǟɛʟ🐼
154.7K posts

🖤ֆǟʍǟɛʟ🐼
@FragmentedSoul5
#OreoSec 🎭 the #Truth is well HïÐÐêñ ïñ þlåïñ §ïgh†. #OpSec ł₦₣Ø₴Ɇ₵ It's easier to fool people than to convince them that they have been fooled.#INFP #xuᴎi⅃ 🐧
🕍🦉 ֆօʟօʍօռ'ֆ ₮Ɇ₥₱ⱠɆ 🦉🕍 Entrou em Ocak 2017
722 Seguindo2.7K Seguidores
🖤ֆǟʍǟɛʟ🐼 retweetou
🖤ֆǟʍǟɛʟ🐼 retweetou

🚨 Hackers Using Google Cloud Storage to Bypass Email Filters and Deliver Remcos RAT
Source: cybersecuritynews.com/hackers-using-…
Cybercriminals are always looking for smarter ways to bypass security, and their latest method is both simple and effective.
The campaign starts with phishing emails linking to pages hosted on storage.googleapis[.]com, a legitimate Google domain.
These pages mimic Google Drive login screens with branded logos and file icons for PDF, DOC, SHEET, and SLIDE documents.
Victims are prompted to sign in to “view a document in Google Drive,” unaware that the page is built to harvest their email address, password, and one-time passcode. After the fake login, the victim is tricked into downloading a JavaScript file named Bid-P-INV-Document.js.
#cybersecuritynews #cyberattacknews

English
🖤ֆǟʍǟɛʟ🐼 retweetou
🖤ֆǟʍǟɛʟ🐼 retweetou

process where event.type == "start" and process.name :"SnippingTool.exe" and process.args: ("ms-screensketch:edit?&filePath=%5C%5C*", "ms-screensketch:edit?&filePath=http*", "ms-screensketch:edit?&filePath=\\\\*")

BlackArrow@BlackArrowSec
Microsoft has addressed a one-click NTLM leak vulnerability affecting Windows Snipping Tool (CVE-2026-33829), discovered by our researcher Marcos Díaz (@Calvaruga). ➡️ Read the write-up: github.com/blackarrowsec/… ➡️ Microsoft bulletin: msrc.microsoft.com/update-guide/v…
English
🖤ֆǟʍǟɛʟ🐼 retweetou
🖤ֆǟʍǟɛʟ🐼 retweetou

Wars are never about to save or protect the people
Its about Profit, Money and Control.
The rich get richer
The poor gets poorer
Peace is oppression
Freedom is prison.
The world will never know Peace.
#Anonymous for #Justice

English
🖤ֆǟʍǟɛʟ🐼 retweetou
🖤ֆǟʍǟɛʟ🐼 retweetou
🖤ֆǟʍǟɛʟ🐼 retweetou
🖤ֆǟʍǟɛʟ🐼 retweetou
🖤ֆǟʍǟɛʟ🐼 retweetou
🖤ֆǟʍǟɛʟ🐼 retweetou
🖤ֆǟʍǟɛʟ🐼 retweetou
🖤ֆǟʍǟɛʟ🐼 retweetou
🖤ֆǟʍǟɛʟ🐼 retweetou

GitHub - zeroc00I/LLM-anonymization: Reverse proxy for Claude Code that anonymizes sensitive pentest data (IPs, hashes, credentials, hostnames, PII) before it reaches Anthropic. Dual-layer detection: local Ollama LLM + regex safety net, with per-engageme github.com/zeroc00I/LLM-a…
English
🖤ֆǟʍǟɛʟ🐼 retweetou
🖤ֆǟʍǟɛʟ🐼 retweetou
🖤ֆǟʍǟɛʟ🐼 retweetou

A Detailed Guide on Feroxbuster
🔥 Telegram: t.me/hackinarticles
✴ Twitter: x.com/hackinarticles
Feroxbuster is a high-performance web content discovery tool used by pentesters and bug bounty hunters to find hidden directories, files, and endpoints in web applications through wordlist-based brute forcing. ()
⚡ Key Features of Feroxbuster
🚀 Fast directory & file enumeration
🔁 Recursive scanning of discovered paths
📚 Custom wordlist support
⚙️ Advanced filtering options
🌐 Proxy & custom header support
🛠️ Common Feroxbuster Techniques
📂 Directory brute-forcing
🔎 Hidden file discovery
🧭 Recursive web path scanning
⚡ Filtering responses by status codes
📡 Web application reconnaissance
📖 Article: hackingarticles.in/a-detailed-gui…
#CyberSecurity #EthicalHacking #Pentesting #BugBounty #InfoSec #Recon




English
🖤ֆǟʍǟɛʟ🐼 retweetou

Microsoft has addressed a one-click NTLM leak vulnerability affecting Windows Snipping Tool (CVE-2026-33829), discovered by our researcher Marcos Díaz (@Calvaruga).
➡️ Read the write-up: github.com/blackarrowsec/…
➡️ Microsoft bulletin: msrc.microsoft.com/update-guide/v…
English
🖤ֆǟʍǟɛʟ🐼 retweetou

Claude Code / Codex Skill for Ghidra github.com/OwenPawl/ghidr…
Română














