Zack S○L bot Gnoma 🧙‍♂️,🧙‍♂️ 🦇🔊 

5.4K posts

Zack S○L bot Gnoma 🧙‍♂️,🧙‍♂️ 🦇🔊  banner
Zack S○L bot Gnoma 🧙‍♂️,🧙‍♂️ 🦇🔊 

Zack S○L bot Gnoma 🧙‍♂️,🧙‍♂️ 🦇🔊 

@Boornfirst

Solana Gnoma Anoma (🧙‍♂️,🧙‍♂️)

United Kingdom شامل ہوئے Ağustos 2020
1.1K فالونگ120 فالوورز
Zack S○L bot Gnoma 🧙‍♂️,🧙‍♂️ 🦇🔊  ری ٹویٹ کیا
Vivek | Cybersecurity
Vivek | Cybersecurity@VivekIntel·
⚔️Top 50 Cyber Security Tools 1. 🔒 Wireshark 2. 🛡️ Snort 3. 🖥️ Metasploit 4. 📡 Nmap 5. 🛠️ Burp Suite 6. 🌐 OWASP ZAP 7. 📊 Security Onion 8. 🚀 Kali Linux 9. 🛡️ Suricata 10. 🌐 Nessus 11. 🚪 OpenVAS 12. 🛡️ ModSecurity 13. 🗝️ Hashcat 14. 🧱 OSSEC 15. 🛡️ Fail2ban 16. 🤖 YARA 17. 📜 SELinux 18. 🧬 ClamAV 19. 🛡️ Security+Plus 20. 🔐 GPG 21. 📡 Aircrack-ng 22. 🛠️ Sysinternals Suite 23. 🖥️ Wireshark 24. 🔑 KeePass 25. 🛡️ Tripwire 26. 📝 Ophcrack 27. 📡 Netcat 28. 🛡️ Wazuh 29. 🛠️ Microsoft Baseline Security Analyzer 30. 📊 AlienVault OSSIM 31. 🔐 VeraCrypt 32. 📡 Hping 33. 🛡️ OSQuery 34. 🛠️ Acunetix 35. 🔑 LastPass 36. 🛡️ Lynis 37. 📜 AppArmor 38. 🛠️ SQLMap 39. 🗝️ John the Ripper 40. 📡 Zenmap 41. 🛡️ Sn1per 42. 🖥️ Wireshark 43. 🧱 Rkhunter 44. 🛠️ Splunk 45. 🔐 1Password 46. 🛡️ Bro IDS 47. 📡 Angry IP Scanner 48. 🛠️ Security Onion 49. 🔑 Bitwarden 50. 🛡️ McAfee ESM #infosec #cybersecurity #hacking #pentesting #Security #OSINT #BugBounty #NetworkSecurity
English
4
86
558
12.8K
Zack S○L bot Gnoma 🧙‍♂️,🧙‍♂️ 🦇🔊  ری ٹویٹ کیا
Beri🌚
Beri🌚@beri_grizou·
Man left speechless as he called his GF while she was having s3x and she forgot to hang up the call😭💔💔
English
127
942
10.4K
757.7K
Zack S○L bot Gnoma 🧙‍♂️,🧙‍♂️ 🦇🔊  ری ٹویٹ کیا
precis0x
precis0x@precisox·
Alguien ha creado el juego más adictivo para aprender redes de centros de datos. Esta increíblee! Se llama Data Center; cuesta 6 dólares y empiezas con el suelo completamente vacío: compras racks, montas servidores y tiendes cada cable a mano. Lo más brutal es que el tráfico de cada cliente se visualiza como esferas de colores que circulan por tus cables, literalmente ves los cuellos de botella en tiempo real. 190 reseñas en 48 horas, gente con equipos equipados con tarjetas RTX 4090 está totalmente enganchada y divirtiéndose en un simulador de cableado de 6 dólares.
Español
129
1.1K
11.5K
980.6K
Zack S○L bot Gnoma 🧙‍♂️,🧙‍♂️ 🦇🔊  ری ٹویٹ کیا
Voices from paradise
رتويت لعلّها المُنجيه
العربية
9
3.8K
9K
167.5K
Zack S○L bot Gnoma 🧙‍♂️,🧙‍♂️ 🦇🔊  ری ٹویٹ کیا
NullSecurityX
NullSecurityX@NullSecurityX·
LFI attack can allow an attacker to read critical system files such as / etc / passwd and C: \ Windows \ win .ini.
English
1
13
80
4K
GetMoe WIreless
GetMoe WIreless@getmoenow·
@howertonjosh Brother this is false , the Jews killed Jesus because they didn’t accept his message , there messiah is the one that’s gonna be the antichrist , and to call Islam demonic and it enslaves its followers , brother you seem intelligent what’s going on here man
English
2
0
5
746
Josh Howerton
Josh Howerton@howertonjosh·
If you overlay Christian beliefs on the end times with Islamic beliefs on the end times, what you discover will send a chill down your spine. Buckle up for this one 👇
English
3.1K
5.7K
33.1K
1.2M
Zack S○L bot Gnoma 🧙‍♂️,🧙‍♂️ 🦇🔊  ری ٹویٹ کیا
Sky Sports
Sky Sports@SkySports·
Man City fan Tal Rehman reveals all about that viral clip from the Stamford Bridge yesterday 😅🫣
English
1.2K
5.2K
34.3K
5M
HackenProof
HackenProof@HackenProof·
Which country are you hacking from?
English
36
0
65
8.6K
Nick Percoco
Nick Percoco@c7five·
Kraken Security Update We are currently being extorted by a criminal group threatening to release videos of our internal systems with client data shown if we do not comply with their demands. It’s important to start with the most important points: our systems were never breached; funds were never at risk; we will not pay these criminals; we will not ever negotiate with bad actors. Kraken identified and shut down two instances of inappropriate access to limited client support data. In February 2025, we received a tip from a trusted source regarding a video shared on a criminal forum that appeared to show access to our client support systems. We immediately launched an investigation and quickly identified the individual involved as a member of our support team. Their access was revoked immediately, a full investigation was conducted, additional security controls were put in place and a limited number of affected clients were notified. Since then, we have been collaborating with industry partners and law enforcement to investigate and disrupt insider recruitment efforts targeting not only crypto companies, but also gaming and telecommunications organizations. More recently, we received another tip, along with a new video showing similar activity. We quickly identified the individual involved and terminated their access. As before, we acted immediately to revoke access, conduct a full investigation, and notify the small number of affected clients. Across both incidents, only a very small number of client accounts were potentially viewed - approximately 2,000 in total (0.02% of clients). Shortly after access was terminated, we began receiving extortion demands. The criminals threatened to distribute materials from both the February 2025 incident and the recent incident to media outlets and on social media if we did not comply. We will not pay these criminals. Based on intelligence gathered across both incidents, along with extensive ongoing analysis, we believe there is sufficient evidence to support the identification and arrest of those responsible. We are actively working with federal law enforcement across multiple jurisdictions to pursue all individuals involved and bring them to justice. Due to the ongoing investigation, we cannot share additional details at this time. However, anyone with relevant information is encouraged to contact us directly. The security of our clients is our highest priority, and we remain fully committed to combating the growing global threat of insider recruitment and constantly enhancing our security practices to combat new threats. Note: If you are a client potentially affected by this, you've already been notified.
English
256
498
3.8K
1.2M
Zack S○L bot Gnoma 🧙‍♂️,🧙‍♂️ 🦇🔊  ری ٹویٹ کیا
By Grabthar's Hammer
By Grabthar's Hammer@RealAceFox1·
@StellarArtoisGB Cool story Stellar.
Everyday Astronaut@Erdayastronaut

There are honestly some decent and common questions about the Apollo program’s moon landings that I figured we should check out ourselves. Because there’s no denying things from the Apollo program look unusual and are quite literally foreign to us in all other contexts. Enjoy 10 months of research, work, dozens of animations, 9 hours of 6k dialogue that took up 3.1 terabytes of hard drive space and MOUNTAINS OF LOVE covering the most incredible journey in all of human history (so far), the Apollo Program. Send this to anyone who watched the Bart Siebrel video on @joerogan, and maybe @elonmusk, you should make Joe watch this so he has answers to his questions. 00:00:00 - INTRO 00:04:40 - APOLLO 17 LIFTOFF FOOTAGE 00:19:05 - WHY DON'T WE SEE STARS 00:25:40 - LUNAR SHADOWS 00:32:00 - CROSSHAIRS BEHIND OBJECTS 00:34:10 - WHY DID THE FLAG WAVE 00:38:00 - ASTRONAUTS ON WIRES 00:47:15 - FOOTPRINTS / PROP ROCKS 00:49:05 - MOON ROCK OR WOOD 00:51:35 - VAN ALLEN BELT RADIATION 01:12:55 - LOST APOLLO 11 TAPES 01:07:55 - DID NASA FAKE FOOTAGE 01:19:30 - LOST SATURN V PLANS 01:23:00 - THE LUNAR LANDER'S THIN SKIN 01:27:50 - LUNAR ROVER DUST 01:29:30 - OTHER PHOTOGRAPHIC EVIDENCE 01:37:20 - DID ANYONE ELSE TRACK THE MISSIONS 01:40:15 - THE SOVIETS' REACTION TO APOLLO 01:42:10 - ORBITAL MECHANICS OF APOLLO 01:51:15 - DELTA V OF APOLLO 02:04:30 - WHY HAVEN'T WE GONE BACK 02:14:30 - SUMMARY

English
0
6
32
6.1K
Sister__
Sister__@ana_herleemerh·
Over 200 Muslims, like chickens, you called it Accidentally in a broad daylight inside the market, same happened during Maulud in Kaduna, why only Muslims gathering 😭
Sister__ tweet mediaSister__ tweet mediaSister__ tweet mediaSister__ tweet media
English
258
482
766
53.8K
Zack S○L bot Gnoma 🧙‍♂️,🧙‍♂️ 🦇🔊  ری ٹویٹ کیا
Nigerian Army
Nigerian Army@HQNigerianArmy·
This successful strike is yet another demonstration of the resolve and operational capability of OPHK to sustain relentless pressure on terrorist elements, disrupt their logistics networks, and deny them freedom of movement within the Theatre. The Theatre Command also wishes to reiterate that the use of motorcycles remains strictly prohibited across the North East operational theatre, particularly in Borno and Yobe States, due to their established and continued use by terrorist elements for movement, logistics, and attack operations. Any such movements in restricted areas are therefore treated with the utmost seriousness in line with existing operational directives. The Joint Task Force (North East) OPHK assures the good people of the North East and indeed all law-abiding Nigerians, that ongoing operations will continue with renewed intensity until all terrorist enclaves are dismantled and lasting peace is restored to the region. SANI UBA Lieutenant Colonel Media Information Officer Headquarters Joint Task Force (North East) Operation HADIN KAI 12 April 2026
Nigerian Army tweet mediaNigerian Army tweet mediaNigerian Army tweet media
English
159
659
1.3K
121.9K
Nazy Inyass ✌️😎
Nazy Inyass ✌️😎@NazyInyass·
@Barristerstreet It is never a mistake... BH were there in the market... The people know them but they allow them to mix with them... They are the BH that attacked Banisheikh 3 days ago
English
10
5
117
6.9K
BSN
BSN@Barristerstreet·
🇳🇬 JUST IN: Up to 200 Feared Dead After Nigerian Air Force Airstrike Hits Busy Market on Borno–Yobe Border As many as 200 people are feared dead, with dozens injured, after a Nigerian Air Force (NAF) airstrike mistakenly struck a crowded weekly market on Saturday. The incident occurred at Jilli Market, a key trading hub located between Gubio Local Government Area and Geidam Local Government Area, where traders from surrounding communities had gathered in large numbers. According to eyewitnesses and local officials, fighter jets operating under Operation Hadin Kai launched the strike targeting suspected Boko Haram and Islamic State West Africa Province elements believed to be active in the area. However, the bombs missed their intended targets and hit the civilian market instead. Multiple explosions tore through the crowded trading ground, sending traders and buyers fleeing in panic. Eyewitnesses described widespread devastation, with bodies scattered across the scene and many victims buried under debris. Victims were rushed to the Specialist Hospital Geidam, where at least 14 injured persons are currently receiving treatment. Several others have reportedly been referred to Damaturu due to the severity of their injuries. While initial eyewitness counts confirmed at least 56 bodies, local sources now warn that the true death toll could be significantly higher, with some estimates placing it at up to 200 fatalities as recovery efforts continue. As of Sunday afternoon, the Nigerian Air Force and Defence Headquarters have yet to issue an official statement addressing the incident or confirming civilian casualties. The Borno–Yobe border remains a volatile frontline in Nigeria’s ongoing counter-insurgency campaign, where civilian populations continue to face deadly risks as terrorists operate within and around local communities. This is a developing story. Casualty figures are expected to be updated as more information emerges.
BSN tweet mediaBSN tweet mediaBSN tweet media
English
580
1.2K
1.9K
474.3K
Zack S○L bot Gnoma 🧙‍♂️,🧙‍♂️ 🦇🔊  ری ٹویٹ کیا
Co11ateral
Co11ateral@co11ateral·
Remote DLL Injection with Timer-based Shellcode Execution Classic DLL injection using CreateThreadpoolTimer to execute shellcode in memory. It can help evade antivirus detection github.com/andreisss/Remo… #apt #redteam
English
0
43
213
10.2K