𒐪Z.A.P𒐪

25.8K posts

𒐪Z.A.P𒐪 banner
𒐪Z.A.P𒐪

𒐪Z.A.P𒐪

@Zappit3

𒐪𒐪Stardust𒐪𒐪 No bs, just me myself and I, - Swedish/Finnish. Pizza and kebab lover, no need to fake personalities. ᕙ⁠(⁠ ⁠

شامل ہوئے Temmuz 2021
3.2K فالونگ1.3K فالوورز
𒐪Z.A.P𒐪 ری ٹویٹ کیا
shree
shree@shreeswyx·
The dark web isn’t just for criminals. Researchers, journalists & security pros use it daily. Here are 18 tools you’ve never heard of but should know 🧅 🧵 Thread (1/10)
shree tweet media
English
6
14
34
219
𒐪Z.A.P𒐪
𒐪Z.A.P𒐪@Zappit3·
Att få ut ledaren och exakt vem man misstänkt genom att se hur en människa agerar på sina egna ord är inget annat än check mate.
GIF
Svenska
0
0
0
13
𒐪Z.A.P𒐪 ری ٹویٹ کیا
Tiryoh / たいりょー
SSH経由でも #ROS2 の diagnostics を可視化できる TUI ツール「ros2-diag-monitor」を作りました。 ROS 2 が入っている環境なら、以下のコマンドだけで diagnostics を TUI 表示できます。インストールは pip です。 pip install ros2-diag-monitor GUI なしの環境やリモート先でも状態確認しやすくなります。
Tiryoh / たいりょー tweet media
日本語
1
8
32
3K
𒐪Z.A.P𒐪 ری ٹویٹ کیا
WeeklyRobotics
WeeklyRobotics@WeeklyRobotics·
Today in Weekly Robotics: 🤖 Drones in GPS-denied environments, 🤖 spline-based trajectory planning, 🤖 a fault-tolerant flight computer for Artemis II, 🤖 a new sensor-fusion library for ROS, and more! weeklyrobotics.com/weekly-robotic… #robotics
English
0
19
98
5.7K
𒐪Z.A.P𒐪 ری ٹویٹ کیا
7h3h4ckv157
7h3h4ckv157@7h3h4ckv157·
Another Crack in the Chain of Trust: Uncovering (Yet Another) Secure Boot Bypass Resource: binarly.io/blog/another-c…
7h3h4ckv157 tweet media7h3h4ckv157 tweet media7h3h4ckv157 tweet media
English
0
31
126
7.4K
𒐪Z.A.P𒐪 ری ٹویٹ کیا
Nana Sei Anyemedu
Nana Sei Anyemedu@RedHatPentester·
WHEN A LAW ENFORCEMENT OFFICER ATTEMPTS TO UNLOCK YOUR MOBILE DEVICE BY BRUTE-FORCEING IT USING TOOLS LIKE GRAYKEY OR VERAKEY. I pulled a trace of gray key that was used in the iPhone while hunting for spywares and brute-force attacks. If the FBI or a law enforcement officer, like police, seizes your phone and returns it, you can know if they performed a brute-force attack on it if you know you didn't give them the password to your phone. They Often use GRAY KEY or VERA KEY Modern mobile operating systems and their underlying firmware maintain detailed security and diagnostic logs that can record authentication attempts and forensic access activity. As a result, when tools such as GrayKey or other law enforcement-grade extraction systems are used to perform password brute forcing or advanced device access, traces of these operations may be recorded within system logs, diagnostic artifacts, or security event records on the device. Attackers or suspects may also try to hide activity, but system-level artifacts can still reveal failed brute-force attempts. FUN FACT iOS devices often keep behind-the-scenes logs showing things like: a. when a brute-force attempt started b. when the device was finally unlocked c. and even when extraction tools connected and disconnected. That means a forensic examiner can sometimes tell not just that data was extracted… but how it was extracted and how long it took.
Nana Sei Anyemedu tweet mediaNana Sei Anyemedu tweet media
English
27
216
1.3K
113.3K