Dark | Light
# ![@CyberPentestLab Avatar](https://lunarcrush.com/gi/w:26/cr:twitter::1882489472400363520.png) @CyberPentestLab Cyber ​​Library

Cyber ​​Library posts on X about tools, systems, windows, in the the most. They currently have [-----] followers and [--] posts still getting attention that total [---] engagements in the last [--] hours.

### Engagements: [---] [#](/creator/twitter::1882489472400363520/interactions)
![Engagements Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::1882489472400363520/c:line/m:interactions.svg)

- [--] Months [---] -98%
- [--] Year [------] -11%

### Mentions: [--] [#](/creator/twitter::1882489472400363520/posts_active)
![Mentions Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::1882489472400363520/c:line/m:posts_active.svg)


### Followers: [-----] [#](/creator/twitter::1882489472400363520/followers)
![Followers Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::1882489472400363520/c:line/m:followers.svg)

- [--] Months [-----] -15%

### CreatorRank: [---------] [#](/creator/twitter::1882489472400363520/influencer_rank)
![CreatorRank Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::1882489472400363520/c:line/m:influencer_rank.svg)

### Social Influence

**Social category influence**
[technology brands](/list/technology-brands)  [social networks](/list/social-networks)  [stocks](/list/stocks) 

**Social topic influence**
[tools](/topic/tools), [systems](/topic/systems), [windows](/topic/windows), [in the](/topic/in-the), [ip](/topic/ip), [target](/topic/target), [search](/topic/search), [admin](/topic/admin), [create an](/topic/create-an), [network](/topic/network)

**Top assets mentioned**
[Alphabet Inc Class A (GOOGL)](/topic/$googl)
### Top Social Posts
Top posts by engagements in the last [--] hours

"Curated Tools for Building an Anonymous Environment 🟢 OnionShare Enables secure and anonymous file sharing and data exchange via Tor by generating temporary "onion" addresses for uploading and downloading. 🟢 SecureDrop A secure whistleblowing platform designed for anonymous communication between sources and journalists allowing confidential tip submissions. 🟢 CalyxOS A privacy and security-focused mobile operating system that prioritizes user anonymity offering built-in privacy-centric apps and enhanced data protection. 🟢 Cryptocat Facilitates real-time encrypted messaging securing both"  
[X Link](https://x.com/anyuser/status/1896277524188930186)  2025-03-02T19:12Z [----] followers, [---] engagements


"Tartufo 🟢 The Tartufo tool scans repositories for accidentally leaked tokens and credentials. It can inspect the entire commit history to detect secrets. 🟢 Documentation: 🟢 GitHub: #Tools #Red_Team #redteam https://github.com/godaddy/tartufo.git https://tartufo.readthedocs.io https://github.com/godaddy/tartufo.git https://tartufo.readthedocs.io"  
[X Link](https://x.com/anyuser/status/1897766658464452705)  2025-03-06T21:50Z [----] followers, [---] engagements


"CVE-2022-24500 RCE Exploit GitHub: Windows SMB Remote Code Execution Vulnerability Vulnerability: Windows [--] - Windows [----] #cve #smb #exploit #rce https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24500 https://github.com/0xZipp0/CVE-2022-24500 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24500 https://github.com/0xZipp0/CVE-2022-24500"  
[X Link](https://x.com/anyuser/status/1898898895201050896)  2025-03-10T00:49Z [----] followers, [---] engagements


"Critical Vulnerability in Jenkins: Arbitrary File Read Leading to Remote Code Execution (RCE) via CVE-2024-23897 A critical vulnerability has been identified in Jenkins enabling attackers to execute arbitrary code (RCE) on affected systems by exploiting a flaw in the vulnerable component of the args4j library. This functionality is enabled by default and remains active in Jenkins versions [-----] and earlier as well as Long-Term Support (LTS) versions 2.426.2 and earlier allowing unauthorized file reads and subsequent remote code execution. Jenkins: POC: args4j: Usage: python"  
[X Link](https://x.com/anyuser/status/1903567951812256083)  2025-03-22T22:02Z [----] followers, [---] engagements


"OPENSKY Open (free) air traffic data for research: - live data - historical data - tracking 264K+ aircrafts - scientific datasets - #Python library #osint #geoint http://opensky-network.org https://github.com/open-aviation/pyopensky http://opensky-network.org https://github.com/open-aviation/pyopensky"  
[X Link](https://x.com/anyuser/status/1909076850359279620)  2025-04-07T02:52Z [----] followers, [---] engagements


"CVE-2024-27199 TeamCity server CVE makes it easy to create an unauthorized admin account bypassing [---] errors on a domain. GitHub: usage: python -t --verbose #teamcity http://teamcity.com:8111 http://RCity.py https://github.com/Stuub/RCity-CVE-2024-27199 http://teamcity.com:8111 http://RCity.py https://github.com/Stuub/RCity-CVE-2024-27199"  
[X Link](https://x.com/anyuser/status/1915148344910918090)  2025-04-23T20:58Z [----] followers, [---] engagements


"Scan for security vulnerabilities in a web application WhatWeb is a scanner written in Ruby that can identify and recognize all web technologies available on a target website. ➖WhatWeb has over [---] plugins each of which recognizes something different. It also identifies version numbers email addresses account IDs web framework modules SQL errors and more. GitHub: https://github.com/urbanadventurer/WhatWeb https://github.com/urbanadventurer/WhatWeb"  
[X Link](https://x.com/anyuser/status/1918398797983400250)  2025-05-02T20:14Z [----] followers, [---] engagements


"SQLiv Massive SQL Injection Scanner SQL injection is one of the popular and highly effective attacks on web applications This tool is used to scan for SQL injection vulnerabilities based on Python which can also find vulnerable SQL websites via Google Dorks. GitHub: #SQLiv #SQL #Scan #Scanner https://github.com/the-robot/sqliv https://github.com/the-robot/sqliv"  
[X Link](https://x.com/CyberPentestLab/status/1937675716708933865)  2025-06-25T00:54Z [----] followers, [--] engagements


"Esp8266_deauther is a popular and well-known open source project that uses the ESP8266 Wi-Fi module to perform deauthentication attacks on Wi-Fi networks. ➖With its help the device can scan networks and access points perform attacks on networks and disconnect clients from them. GitHub: #WiFi #Attack #Deauth #Scanning https://github.com/SpacehuhnTech/esp8266_deauther.git https://github.com/SpacehuhnTech/esp8266_deauther.git"  
[X Link](https://x.com/CyberPentestLab/status/1938405308079972727)  2025-06-27T01:13Z [----] followers, [---] engagements


"This is an exploit for a zero-day vulnerability in the Linux kernel that allows arbitrary code execution in the kernel space with root privileges. The exploit uses a vulnerability in the Bluetooth A2MP protocol to take control of the system. BleedingTooth: Remote Code Execution in the Linux Bluetooth Stack Without User Interaction (Zero-Click) Compile: $ gcc -o exploit BleedingTooth.c -lbluetooth Run: $ sudo ./exploit MAC address of the target device In another terminal run: $ nc -lvp [----] If successfully exploited the following will be executed to run the calculator: $ export"  
[X Link](https://x.com/CyberPentestLab/status/1941239995932549624)  2025-07-04T20:57Z [----] followers, [--] engagements


"CVE-2025-49144 is a high-severity local privilege escalation vulnerability found in the Notepad++ v8.8.1 and prior version installers. This vulnerability stems from uncontrolled executable search path behavior during installation allowing a local attacker to gain SYSTEM-level privileges by placing malicious executables in the same directory as the installer. GitHub: #Exploits #Windows #Linux https://github.com/TheTorjanCaptain/CVE-2025-49144_PoC.git https://github.com/TheTorjanCaptain/CVE-2025-49144_PoC.git"  
[X Link](https://x.com/CyberPentestLab/status/1944516848202256893)  2025-07-13T21:58Z [----] followers, [--] engagements


"15 efficient commands for pentesting on Linux: nmap: nmap -p- target IP (Scan all ports on a target) netcat: nc -nv target IP port (Open a TCP connection to a target) tcpdump: tcpdump -i eth0 tcp port [--] (Capture network traffic on port 80) wireshark: wireshark (Start the Wireshark GUI) traceroute: traceroute target IP (Show the route that packets take to reach a target) dig: dig target domain (Query DNS information for a domain) whois: whois target domain (Lookup WHOIS information for a domain) ncat: ncat -lvp port (Listen on a specific port for incoming connections) snort: snort -c"  
[X Link](https://x.com/CyberPentestLab/status/1945602957535580530)  2025-07-16T21:54Z [----] followers, [---] engagements


"I translated a video by a YouTube blogger who analyzed three Russian social networks to determine whether they spy on their users. The Russian social networks reviewed: Telegram MAX VK Notably the Russian government is attempting to slow down and block Telegram within its territory as the platforms administration refuses to cooperate with Russian authorities or comply with their demands. #telegram #max #vk #spy https://twitter.com/i/web/status/2022445554848895471 https://twitter.com/i/web/status/2022445554848895471"  
[X Link](https://x.com/CyberPentestLab/status/2022445554848895471)  2026-02-13T22:59Z [----] followers, [---] engagements


"Subscribe to the channel https://www.youtube.com/@CyberPentestLab https://www.youtube.com/@CyberPentestLab"  
[X Link](https://x.com/anyuser/status/1885363655866224826)  2025-01-31T16:24Z [----] followers, 10.6K engagements


"LTE Sniffer with Full Functionality LTE Sniffer is an open source tool that passively intercepts wireless traffic of 4G base station subscribers. ➖ It exploits vulnerabilities in the LTE protocol to intercept and decrypt wireless traffic. #LTE https://github.com/SysSec-KAIST/LTESniffer.git https://github.com/SysSec-KAIST/LTESniffer.git"  
[X Link](https://x.com/anyuser/status/1885007430175650175)  2025-01-30T16:49Z [----] followers, [---] engagements


"Curated Tools for Building an Anonymous Environment 🟢 OnionShare Enables secure and anonymous file sharing and data exchange via Tor by generating temporary "onion" addresses for uploading and downloading. 🟢 SecureDrop A secure whistleblowing platform designed for anonymous communication between sources and journalists allowing confidential tip submissions. 🟢 CalyxOS A privacy and security-focused mobile operating system that prioritizes user anonymity offering built-in privacy-centric apps and enhanced data protection. 🟢 Cryptocat Facilitates real-time encrypted messaging securing both"  
[X Link](https://x.com/anyuser/status/1896277524188930186)  2025-03-02T19:12Z [----] followers, [---] engagements


"CVE-2022-24500 RCE Exploit GitHub: Windows SMB Remote Code Execution Vulnerability Vulnerability: Windows [--] - Windows [----] #cve #smb #exploit #rce https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24500 https://github.com/0xZipp0/CVE-2022-24500 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24500 https://github.com/0xZipp0/CVE-2022-24500"  
[X Link](https://x.com/anyuser/status/1898898895201050896)  2025-03-10T00:49Z [----] followers, [---] engagements


"TheFatRat is a tool to use that compiles malware with a payload and then the compiled maware can be run on Linux Windows Mac and Android. sudo git clone cd TheFatRat sudo chmod +x sudo ./setup.sh sudo fatrat #Hacking #Linux #Windows http://setup.sh https://github.com/Screetsec/TheFatRat.git http://setup.sh https://github.com/Screetsec/TheFatRat.git"  
[X Link](https://x.com/anyuser/status/1888282193048502542)  2025-02-08T17:42Z [----] followers, [---] engagements


"Critical Vulnerability in Jenkins: Arbitrary File Read Leading to Remote Code Execution (RCE) via CVE-2024-23897 A critical vulnerability has been identified in Jenkins enabling attackers to execute arbitrary code (RCE) on affected systems by exploiting a flaw in the vulnerable component of the args4j library. This functionality is enabled by default and remains active in Jenkins versions [-----] and earlier as well as Long-Term Support (LTS) versions 2.426.2 and earlier allowing unauthorized file reads and subsequent remote code execution. Jenkins: POC: args4j: Usage: python"  
[X Link](https://x.com/anyuser/status/1903567951812256083)  2025-03-22T22:02Z [----] followers, [---] engagements


"Friends your engagement and support mean a lot to me. Thank you to everyone who follows me and interacts with my tweets 😁"  
[X Link](https://x.com/anyuser/status/1909078967509975170)  2025-04-07T03:01Z [----] followers, [---] engagements


"Face Search Library The simplest open-source library for people search. If you've been wanting to play with this device for a long time this is what you need. Instructions for use included #github https://github.com/ageitgey/face_recognition https://github.com/ageitgey/face_recognition"  
[X Link](https://x.com/anyuser/status/1888341394697105756)  2025-02-08T21:37Z [----] followers, [---] engagements


"Tartufo 🟢 The Tartufo tool scans repositories for accidentally leaked tokens and credentials. It can inspect the entire commit history to detect secrets. 🟢 Documentation: 🟢 GitHub: #Tools #Red_Team #redteam https://github.com/godaddy/tartufo.git https://tartufo.readthedocs.io https://github.com/godaddy/tartufo.git https://tartufo.readthedocs.io"  
[X Link](https://x.com/anyuser/status/1897766658464452705)  2025-03-06T21:50Z [----] followers, [---] engagements


"Securing AWS My-arsenal-of-aws-security-tools is a curated list of open source tools for AWS security auditing forensics and incident response. ➖It serves as a comprehensive resource for security professionals DevOps engineers and AWS administrators to improve cloud security and optimize security-related tasks on the AWS platform. GitHub: #Tool #AWS #Security #GitHub https://github.com/toniblyx/my-arsenal-of-aws-security-tools https://github.com/toniblyx/my-arsenal-of-aws-security-tools"  
[X Link](https://x.com/anyuser/status/1914036647907168499)  2025-04-20T19:21Z [----] followers, [---] engagements


"Raspberry Pi Operating Systems Review: From Cinema to Data Storage #Raspberry #System #OS https://medium.com/@cyberlabpentest/raspberry-pi-operating-systems-review-from-cinema-to-data-storage-88ae96cff9d1 https://medium.com/@cyberlabpentest/raspberry-pi-operating-systems-review-from-cinema-to-data-storage-88ae96cff9d1"  
[X Link](https://x.com/anyuser/status/1896723486992715955)  2025-03-04T00:44Z [----] followers, [---] engagements


"SSHwatch is a powerful yet easy-to-use platform designed to monitor analyze and secure your SSH access. With real-time threat monitoring and detection it keeps your systems secure while providing a clean user-friendly dashboard. ➖Instant access to key details like general logs high-risk events failed login attempts and unique IP addresses - all in one place. GitHub: #SSH #Scanning #Analysis https://github.com/marshyski/sshwatch https://github.com/marshyski/sshwatch"  
[X Link](https://x.com/anyuser/status/1916618965293424840)  2025-04-27T22:22Z [----] followers, [---] engagements


"Reverse Engineer's Toolkit A collection of tools you might find useful if youre interested in reverse engineering and/or malware analysis for **x86 and x64 Windows systems. #Windows #x86 #x64 https://github.com/mentebinaria/retoolkit https://github.com/mentebinaria/retoolkit"  
[X Link](https://x.com/anyuser/status/1884733768830681316)  2025-01-29T22:42Z [----] followers, [---] engagements


"VenomRAT HVNC is one of the most searched and popular RAT and the best in the market right now GitHub: #Venom #rat #CyberSecurity https://github.com/VenomRATHVNC/VenomRAT-HVNC-5.6.git https://github.com/VenomRATHVNC/VenomRAT-HVNC-5.6.git"  
[X Link](https://x.com/anyuser/status/1903656157907976485)  2025-03-23T03:52Z [----] followers, [---] engagements


"Search engine for hackers/pentesters == servers == dorks == wifi networks == code search https://app.binaryedge == threat intelligence == server == threat intelligence == server == email addresses == threat intelligence == threat intelligence == threat intelligence == OSINT == attack surface == code search == threat intelligence == code search == attack surface == threat intelligence ==attack surface == server == certificate search == vulnerabilities == threat intelligence #URL #service https://pulsedive.com https://vulners.com https://crt.sh https://ivre.rocks https://binaryedge.io"  
[X Link](https://x.com/anyuser/status/1907951560367460542)  2025-04-04T00:21Z [----] followers, [---] engagements


"New update on my GitHub dont miss out Follow updates on my GitHub: https://t.co/7fNZlPXM8A #redteam #git #github Follow updates on my GitHub: https://t.co/7fNZlPXM8A #redteam #git #github"  
[X Link](https://x.com/anyuser/status/1901389600465011131)  2025-03-16T21:46Z [----] followers, [---] engagements


"Follow updates on my GitHub: #redteam #git #github https://github.com/CyberPentestLab https://github.com/CyberPentestLab"  
[X Link](https://x.com/anyuser/status/1898220563295789420)  2025-03-08T03:53Z [----] followers, [----] engagements


"Tor Onion Site Scraper - crawler of .onion sites https://github.com/MikeMeliz/TorCrawl.py https://github.com/joelhagvall/tor-onion-site-scraper https://github.com/MikeMeliz/TorCrawl.py https://github.com/joelhagvall/tor-onion-site-scraper"  
[X Link](https://x.com/anyuser/status/1906189862056652850)  2025-03-30T03:40Z [----] followers, [---] engagements


"Scan for security vulnerabilities in a web application WhatWeb is a scanner written in Ruby that can identify and recognize all web technologies available on a target website. ➖WhatWeb has over [---] plugins each of which recognizes something different. It also identifies version numbers email addresses account IDs web framework modules SQL errors and more. GitHub: https://github.com/urbanadventurer/WhatWeb https://github.com/urbanadventurer/WhatWeb"  
[X Link](https://x.com/anyuser/status/1918398797983400250)  2025-05-02T20:14Z [----] followers, [---] engagements


"CrossC2 GitHub: Generate CobaltStrike's cross-platform payload: Windows Android iOS Linux MacOS Embedded Wiki: #cobalt #CrossC2 #C2 https://gloxec.github.io/CrossC2/en/ https://github.com/gloxec/CrossC2 https://gloxec.github.io/CrossC2/en/ https://github.com/gloxec/CrossC2"  
[X Link](https://x.com/anyuser/status/1900136939774198199)  2025-03-13T10:48Z [----] followers, [---] engagements


"Spoofing Timezone Geolocation Locale and User Agent Vytal is a browser extension that customizes your browser settings to mimic internet access from a different location locale or device. Key features of Vytal: 🔵 Timezone spoofing 🔵 Geolocation alteration 🔵 Locale customization With Vytal users can: Select a preset location from a list Adjust settings to match an IP address Add a custom location for precise control. GitHub: #tool #CyberSecurity https://github.com/vytal-io/vytal-extension.git https://github.com/vytal-io/vytal-extension.git"  
[X Link](https://x.com/anyuser/status/1895236632686797121)  2025-02-27T22:16Z [----] followers, [---] engagements


"🔖Top [--] JavaScript path files used to store sensitive information in Web Application [--]. /js/config.js [--]. /js/credentials.js [--]. /js/secrets.js [--]. /js/keys.js [--]. /js/password.js [--]. /js/api_keys.js [--]. /js/auth_tokens.js [--]. /js/access_tokens.js [--]. /js/sessions.js [--]. /js/authorization.js [--]. /js/encryption.js [--]. /js/certificates.js [--]. /js/ssl_keys.js [--]. /js/passphrases.js [--]. /js/policies.js [--]. /js/permissions.js [--]. /js/privileges.js [--]. /js/hashes.js [--]. /js/salts.js [--]. /js/nonces.js [--]. /js/signatures.js [--]. /js/digests.js [--]. /js/tokens.js [--]. /js/cookies.js 25."  
[X Link](https://x.com/anyuser/status/1905715470210371728)  2025-03-28T20:15Z [----] followers, [---] engagements


"❗ A new reverse shell called ReverseShell_2025_01.ps1 At the time of publication none of the scripts were flagged by antivirus systems. However typically within 2-3 weeks after publication some vendors begin to detect and flag the malicious files. GitHub: #GitHub #TOOLS https://github.com/tihanyin/PSSW100AVB/blob/main/ReverseShell_2025_01.ps1 https://github.com/tihanyin/PSSW100AVB/blob/main/ReverseShell_2025_01.ps1"  
[X Link](https://x.com/anyuser/status/1910863973831827961)  2025-04-12T01:14Z [----] followers, [---] engagements


"Fuzz Faster U Fool (FFUF) Ffuf is a powerful command line tool designed to brute force web application content. ➖It allows you to automate the fuzzing process thereby discovering hidden files and directories as well as checking various URL parameters and HTTP headers. GitHub: #Brute #Web https://github.com/ffuf/ffuf https://github.com/ffuf/ffuf"  
[X Link](https://x.com/anyuser/status/1920098947403546854)  2025-05-07T12:50Z [----] followers, [---] engagements


"Evil Crow Keylogger Cable 🔥 https://www.amazon.co.uk/KSEC-Evil-Crow-Cable-USB/dp/B0BKWF2R2F https://www.amazon.co.uk/KSEC-Evil-Crow-Cable-USB/dp/B0BKWF2R2F"  
[X Link](https://x.com/anyuser/status/1888181722308612137)  2025-02-08T11:02Z [----] followers, [---] engagements


"CVE-2024-27199 TeamCity server CVE makes it easy to create an unauthorized admin account bypassing [---] errors on a domain. GitHub: usage: python -t --verbose #teamcity http://teamcity.com:8111 http://RCity.py https://github.com/Stuub/RCity-CVE-2024-27199 http://teamcity.com:8111 http://RCity.py https://github.com/Stuub/RCity-CVE-2024-27199"  
[X Link](https://x.com/anyuser/status/1915148344910918090)  2025-04-23T20:58Z [----] followers, [---] engagements


"Hacked and Stolen Data Search Service DeHashed is a service for searching through a database of hacked and stolen personal data. You can search by IP addresses email addresses logins phone numbers VIN numbers home addresses etc. The service offers reverse search by passwords hash sums and other types of data. #database #search https://www.dehashed.com https://www.dehashed.com"  
[X Link](https://x.com/anyuser/status/1892030183940505801)  2025-02-19T01:55Z [----] followers, [---] engagements


"A Linux system called BountyOS This system is dedicated to the work of bug bounty contains all the tools you can use directly. The system is designed to be my personality and nothing else except the tools needed for bug bounty you can download and use for free here https://bountyos.github.io/ https://bountyos.github.io/"  
[X Link](https://x.com/anyuser/status/1925655007526817844)  2025-05-22T20:48Z [----] followers, [---] engagements


"Dear friends I have updated and added new features to my program. 😎 If anyone wants to thank the developer the details are at the bottom of the description.😅 GitHub: https://github.com/CyberPentestLab/TGkeylogger/ https://github.com/CyberPentestLab/TGkeylogger/"  
[X Link](https://x.com/anyuser/status/1923198308773695927)  2025-05-16T02:06Z [----] followers, [---] engagements


"HacknDroid: Automation of some MAPT activities and interaction with the mobile Android device Prerequisites: adb enabled ✅ device authorized ✅ GitHub: https://github.com/RaffaDNDM/HacknDroid https://github.com/RaffaDNDM/HacknDroid"  
[X Link](https://x.com/anyuser/status/1924399079846531520)  2025-05-19T09:37Z [----] followers, [---] engagements


"SIPVicious is a set of tools for auditing SIP (Session Initiation Protocol) based voice communication systems. ➖SIPVicious was used to hack VoIP servers to call expensive premium numbers or for voice phishing. GitHub: #VoIP #sip https://github.com/EnableSecurity/sipvicious https://github.com/EnableSecurity/sipvicious"  
[X Link](https://x.com/anyuser/status/1922041478726951071)  2025-05-12T21:29Z [----] followers, [---] engagements


"OPENSKY Open (free) air traffic data for research: - live data - historical data - tracking 264K+ aircrafts - scientific datasets - #Python library #osint #geoint http://opensky-network.org https://github.com/open-aviation/pyopensky http://opensky-network.org https://github.com/open-aviation/pyopensky"  
[X Link](https://x.com/anyuser/status/1909076850359279620)  2025-04-07T02:52Z [----] followers, [---] engagements


"⚡ New method for hacking Tranax MiniBank [----] series ATMs is being distributed https://attrition.org/misc/ee/atm_manuals/Tranax%20Mini-Bank%201500%20-%20Operator%20Manual.pdf https://attrition.org/misc/ee/atm_manuals/Tranax%20Mini-Bank%201500%20-%20Operator%20Manual.pdf"  
[X Link](https://x.com/anyuser/status/1893116131432452379)  2025-02-22T01:50Z [----] followers, [---] engagements


"👩💻 Nagios XI RCE Nagios XI 2024R1.01 has a vulnerability in the monitoringwizard.php component allowing authenticated SQL injection (CVE-2024-24401) that lets attackers create an admin account and remote code execution. 🔗 Source: #nagios #sqlinjection #rce #privesc #poc #exploit https://github.com/MAWK0235/CVE-2024-24401 https://github.com/MAWK0235/CVE-2024-24401"  
[X Link](https://x.com/anyuser/status/1912333617050575353)  2025-04-16T02:33Z [----] followers, [---] engagements


"https://www.mobile-hacker.com/2024/06/26/rfid-hacking-with-proxmark3-cloning-emulating-and-standalone-mode/ https://www.mobile-hacker.com/2024/06/26/rfid-hacking-with-proxmark3-cloning-emulating-and-standalone-mode/"  
[X Link](https://x.com/anyuser/status/1884328175960019103)  2025-01-28T19:50Z [----] followers, [---] engagements


"Notificationbot With notificationbot you can easily send notifications/messages to telegram from anywhere (terminal CI/CD pipeline IoT device etc.). This service is stateless and you can deploy it in your own instance. GitHub: #IOT https://github.com/cirebon-dev/notification_bot https://github.com/cirebon-dev/notification_bot"  
[X Link](https://x.com/anyuser/status/1927887099446927614)  2025-05-29T00:37Z [----] followers, [---] engagements


"Introducing the Evil Crow RF V2. A portable RF device that is fully compatible with Flipper Zero. It can even play pre-recorded Sub-GHz frequencies available for the unofficial Flipper Zero firmware. #Hacked #Flipper https://www.amazon.com/Evil-Crow-Penetration-ResearchTool-433MhzAluminumCase/dp/B0D9QFWHRG https://www.amazon.com/Evil-Crow-Penetration-ResearchTool-433MhzAluminumCase/dp/B0D9QFWHRG"  
[X Link](https://x.com/anyuser/status/1890839165438173651)  2025-02-15T19:02Z [----] followers, [---] engagements


"Hacking social media accounts Commands from the video: git clone cd zphisher bash Operating system used: Parrot Security OS #Hacked #CyberSecurity http://zphisher.sh https://github.com/htr-tech/zphisher.git http://zphisher.sh https://github.com/htr-tech/zphisher.git"  
[X Link](https://x.com/anyuser/status/1892010576194191447)  2025-02-19T00:37Z [----] followers, [---] engagements


"@RecklesUnicorn @Vaillando @eyes_on_01 @Blqck_jnr @offgrid_4_life @ShrwanMeghwal6 @happyx @Troymediax @Dud3rz @SecretCelebriti @AlphaKong100X @akmetax @ClickMediaX @louisedbegin @Catavina17 @raghave70161237 @Sunearthmoon_ Thank you"  
[X Link](https://x.com/anyuser/status/1902204113313517616)  2025-03-19T03:42Z [----] followers, [--] engagements


"Hacking SJCAM4000 via Wi-Fi This article is published for informational purposes #Hacked #camera #WiFi https://link.medium.com/fy4u8snoSQb https://link.medium.com/fy4u8snoSQb"  
[X Link](https://x.com/anyuser/status/1888968261418795235)  2025-02-10T15:08Z [----] followers, [---] engagements


"Draw2Img is a simple web interface for interactive image creation using sketches and text designed for all ages and skill levels. Features: 🗣Web interface interactive canvas with basic drawing tool and color picker. 🗣Real-time image creation with SDXL-Turbo (512 x [---] pixels). 🗣Editable hint seed step and strength parameters. 🗣Export button to save input and output images as PNG files as well as parameters as JSON. 🗣Multi-threaded server supports simultaneous work of several users. 🗣Local (no internet required) private and open source. GitHub: #web #image"  
[X Link](https://x.com/anyuser/status/1928217697759735932)  2025-05-29T22:31Z [----] followers, [---] engagements


"Anubis is a ransomware (based on EDA2) that infiltrates systems and encrypts files. During encryption Anubis appends the ".coded" extension to the name of each encrypted file. For example "sample.jpg" is renamed to "sample.jpg.coded". After successful encryption Anubis changes the desktop background and creates a text file ("Decryption Instructions.txt") placing it on the desktop. Anubis is used by many different cybercriminal gangs. These groups have access to a wide range of functionality and pose significant security threats to mobile devices. #block #tools"  
[X Link](https://x.com/anyuser/status/1888150475146441082)  2025-02-08T08:58Z [----] followers, [---] engagements


"Sploitus - search engine for fresh exploits. The site also has a collection of various utilities https://sploitus.com https://sploitus.com"  
[X Link](https://x.com/anyuser/status/1885781818550464730)  2025-02-01T20:06Z [----] followers, [---] engagements


"Sniffer network traffic analysis Information particularly confidential data is a prime target for malicious actors. To prevent leaks and mitigate targeted attacks on information systems organizations employ network traffic analysis. A modern terminal-based network traffic sniffer designed for troubleshooting network issues. It can be launched at any time to analyze processes or connections causing surges in network traffic without requiring the loading of any kernel modules. GitHub: #sniffer #traffic #Network #Networking https://github.com/chenjiandongx/sniffer"  
[X Link](https://x.com/anyuser/status/1904912086607491134)  2025-03-26T15:03Z [----] followers, [---] engagements


"StegCloak is a pure JavaScript steganography module built with a functional programming approach designed to hide text in plain sight. It employs techniques like compression encryption and invisible Unicode characters to embed concealed text enabling seamless steganography. ➖ Purpose: To securely conceal textual content and embed watermarks. GitHub: https://github.com/KuroLabs/stegcloak.git https://github.com/KuroLabs/stegcloak.git"  
[X Link](https://x.com/anyuser/status/1894798945974386699)  2025-02-26T17:17Z [----] followers, [---] engagements


"Terrapin Vulnerability Scanner is a small utility written in Go that can be used to determine the vulnerability of an SSH client or server against the Terrapin attack. Terrapin is a prefix truncation attack against the SSH protocol. The attack compromises the integrity of the secure SSH channel by changing sequence numbers during the handshake. The vulnerability scanner requires a single connection to the peer to collect all supported algorithms. However it does not perform a full SSH key exchange never attempts to authenticate to the server and does not actually perform the attack. Instead"  
[X Link](https://x.com/anyuser/status/1928214761138733131)  2025-05-29T22:19Z [----] followers, [---] engagements


"#Wireshark #traffic https://telegra.ph/How-to-intercept-traffic-using-Wireshark-02-06 https://telegra.ph/How-to-intercept-traffic-using-Wireshark-02-06"  
[X Link](https://x.com/anyuser/status/1887453391191744744)  2025-02-06T10:48Z [----] followers, [---] engagements


"@RecklesUnicorn Ok"  
[X Link](https://x.com/anyuser/status/1902196878105616844)  2025-03-19T03:14Z [----] followers, [--] engagements


"Telepathy Telegram's Swiss Army knife that lets you analyze and archive Telegram chats collect member lists find users by location analyze top posters in a chat map forwarded messages and more. GitHub: #Telegram #github #Network https://github.com/proseltd/Telepathy-Community.git https://github.com/proseltd/Telepathy-Community.git"  
[X Link](https://x.com/anyuser/status/1888665796420739435)  2025-02-09T19:06Z [----] followers, [---] engagements


"Bonus Pro Tips [--]. Enumerate Plugins and Themes. Use /wp-json/wp/v2/themes or /wp-json/wp/v2/plugins. Plugins often reveal active components and version info. [--]. Leverage Caching. Check for outdated cached versions of sensitive files. [--]. Server Misconfigurations Test for directory listing enabled on /wp-content/. [--]. Debugging Tools Use x-forwarded-for headers to bypass IP restrictions. - /wp-admin.php - /wp-config.php - /wp-content/uploads - /wp-load - /wp-signup. php - /wp-json - /wp-incLudes/ - /wp-Login.php - /wp-Links-opml.php - /wp-activate.php - /wp-blog-header.php - /wp-cron.php -"  
[X Link](https://x.com/anyuser/status/1889603130221867428)  2025-02-12T09:11Z [----] followers, [---] engagements


"GSM cracking A5 encryption and sms sniffing with RTL-SDR The video shows an attacker conducting an attack to intercept an SMS message. #GSM #cracking #RTL #SDR"  
[X Link](https://x.com/anyuser/status/1891627778270802243)  2025-02-17T23:16Z [----] followers, [---] engagements


"🐱 Awesome Sysadmin -        🐱 ➖: Backups Cloning Cloud Computing Cloud Orchestration Cloud Storage Collaborative Software Distributed Filesystems DNS VPN "  
[X Link](https://x.com/anyuser/status/1883956691307540839)  2025-01-27T19:14Z [----] followers, [---] engagements


"@Harmonyexplore1 Now you can write to me. You can also write in the comments"  
[X Link](https://x.com/anyuser/status/1899264808920178955)  2025-03-11T01:03Z [----] followers, [--] engagements


"Gaining unauthorized access to Windows [----] Server using TheFatRat https://youtu.be/iZ58I0Z_tBc https://youtu.be/iZ58I0Z_tBc"  
[X Link](https://x.com/anyuser/status/1885363264181145974)  2025-01-31T16:23Z [----] followers, [---] engagements


"CVE-2023-48788 is a vulnerability related to incorrect handling of user data in one of the popular software products. It may allow an attacker to execute arbitrary code or gain access to sensitive information on the vulnerable system. GitHub: https://github.com/horizon3ai/CVE-2023-48788 https://github.com/horizon3ai/CVE-2023-48788"  
[X Link](https://x.com/anyuser/status/1887093311682306271)  2025-02-05T10:58Z [----] followers, [---] engagements


"#sysadmin #devops #opensource #it https://github.com/awesome-foss/awesome-sysadmin https://github.com/awesome-foss/awesome-sysadmin"  
[X Link](https://x.com/anyuser/status/1883956694184779851)  2025-01-27T19:14Z [----] followers, [--] engagements


"CrossC2 Generate CobaltStrike's cross-platform payload: Windows Android iOS Linux MacOS Embedded Description: https://gloxec.github.io/CrossC2/en/ https://github.com/gloxec/CrossC2 https://gloxec.github.io/CrossC2/en/ https://github.com/gloxec/CrossC2"  
[X Link](https://x.com/anyuser/status/1883732570439102891)  2025-01-27T04:23Z [----] followers, [--] engagements


"CVE-2023-27372 is a privilege escalation vulnerability in Ivanti Avalanche an enterprise MDM (mobile device management) system. GitHub: #CVE #PHP #vulnerable https://github.com/nuts7/CVE-2023-27372 https://github.com/nuts7/CVE-2023-27372"  
[X Link](https://x.com/anyuser/status/1890475754657632340)  2025-02-14T18:58Z [----] followers, [---] engagements


"What version of Windows are you using in [----] Windows [--] Windows [--] Windows [--] Windows [--] Windows [--] Windows 7"  
[X Link](https://x.com/anyuser/status/1891975217968304466)  2025-02-18T22:16Z [----] followers, [---] engagements


"@RecklesUnicorn What do you mean"  
[X Link](https://x.com/anyuser/status/1902199266476474370)  2025-03-19T03:23Z [----] followers, [--] engagements

Limited data mode. Full metrics available with subscription: lunarcrush.com/pricing

@CyberPentestLab Avatar @CyberPentestLab Cyber ​​Library

Cyber ​​Library posts on X about tools, systems, windows, in the the most. They currently have [-----] followers and [--] posts still getting attention that total [---] engagements in the last [--] hours.

Engagements: [---] #

Engagements Line Chart

  • [--] Months [---] -98%
  • [--] Year [------] -11%

Mentions: [--] #

Mentions Line Chart

Followers: [-----] #

Followers Line Chart

  • [--] Months [-----] -15%

CreatorRank: [---------] #

CreatorRank Line Chart

Social Influence

Social category influence technology brands social networks stocks

Social topic influence tools, systems, windows, in the, ip, target, search, admin, create an, network

Top assets mentioned Alphabet Inc Class A (GOOGL)

Top Social Posts

Top posts by engagements in the last [--] hours

"Curated Tools for Building an Anonymous Environment 🟢 OnionShare Enables secure and anonymous file sharing and data exchange via Tor by generating temporary "onion" addresses for uploading and downloading. 🟢 SecureDrop A secure whistleblowing platform designed for anonymous communication between sources and journalists allowing confidential tip submissions. 🟢 CalyxOS A privacy and security-focused mobile operating system that prioritizes user anonymity offering built-in privacy-centric apps and enhanced data protection. 🟢 Cryptocat Facilitates real-time encrypted messaging securing both"
X Link 2025-03-02T19:12Z [----] followers, [---] engagements

"Tartufo 🟢 The Tartufo tool scans repositories for accidentally leaked tokens and credentials. It can inspect the entire commit history to detect secrets. 🟢 Documentation: 🟢 GitHub: #Tools #Red_Team #redteam https://github.com/godaddy/tartufo.git https://tartufo.readthedocs.io https://github.com/godaddy/tartufo.git https://tartufo.readthedocs.io"
X Link 2025-03-06T21:50Z [----] followers, [---] engagements

"CVE-2022-24500 RCE Exploit GitHub: Windows SMB Remote Code Execution Vulnerability Vulnerability: Windows [--] - Windows [----] #cve #smb #exploit #rce https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24500 https://github.com/0xZipp0/CVE-2022-24500 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24500 https://github.com/0xZipp0/CVE-2022-24500"
X Link 2025-03-10T00:49Z [----] followers, [---] engagements

"Critical Vulnerability in Jenkins: Arbitrary File Read Leading to Remote Code Execution (RCE) via CVE-2024-23897 A critical vulnerability has been identified in Jenkins enabling attackers to execute arbitrary code (RCE) on affected systems by exploiting a flaw in the vulnerable component of the args4j library. This functionality is enabled by default and remains active in Jenkins versions [-----] and earlier as well as Long-Term Support (LTS) versions 2.426.2 and earlier allowing unauthorized file reads and subsequent remote code execution. Jenkins: POC: args4j: Usage: python"
X Link 2025-03-22T22:02Z [----] followers, [---] engagements

"OPENSKY Open (free) air traffic data for research: - live data - historical data - tracking 264K+ aircrafts - scientific datasets - #Python library #osint #geoint http://opensky-network.org https://github.com/open-aviation/pyopensky http://opensky-network.org https://github.com/open-aviation/pyopensky"
X Link 2025-04-07T02:52Z [----] followers, [---] engagements

"CVE-2024-27199 TeamCity server CVE makes it easy to create an unauthorized admin account bypassing [---] errors on a domain. GitHub: usage: python -t --verbose #teamcity http://teamcity.com:8111 http://RCity.py https://github.com/Stuub/RCity-CVE-2024-27199 http://teamcity.com:8111 http://RCity.py https://github.com/Stuub/RCity-CVE-2024-27199"
X Link 2025-04-23T20:58Z [----] followers, [---] engagements

"Scan for security vulnerabilities in a web application WhatWeb is a scanner written in Ruby that can identify and recognize all web technologies available on a target website. ➖WhatWeb has over [---] plugins each of which recognizes something different. It also identifies version numbers email addresses account IDs web framework modules SQL errors and more. GitHub: https://github.com/urbanadventurer/WhatWeb https://github.com/urbanadventurer/WhatWeb"
X Link 2025-05-02T20:14Z [----] followers, [---] engagements

"SQLiv Massive SQL Injection Scanner SQL injection is one of the popular and highly effective attacks on web applications This tool is used to scan for SQL injection vulnerabilities based on Python which can also find vulnerable SQL websites via Google Dorks. GitHub: #SQLiv #SQL #Scan #Scanner https://github.com/the-robot/sqliv https://github.com/the-robot/sqliv"
X Link 2025-06-25T00:54Z [----] followers, [--] engagements

"Esp8266_deauther is a popular and well-known open source project that uses the ESP8266 Wi-Fi module to perform deauthentication attacks on Wi-Fi networks. ➖With its help the device can scan networks and access points perform attacks on networks and disconnect clients from them. GitHub: #WiFi #Attack #Deauth #Scanning https://github.com/SpacehuhnTech/esp8266_deauther.git https://github.com/SpacehuhnTech/esp8266_deauther.git"
X Link 2025-06-27T01:13Z [----] followers, [---] engagements

"This is an exploit for a zero-day vulnerability in the Linux kernel that allows arbitrary code execution in the kernel space with root privileges. The exploit uses a vulnerability in the Bluetooth A2MP protocol to take control of the system. BleedingTooth: Remote Code Execution in the Linux Bluetooth Stack Without User Interaction (Zero-Click) Compile: $ gcc -o exploit BleedingTooth.c -lbluetooth Run: $ sudo ./exploit MAC address of the target device In another terminal run: $ nc -lvp [----] If successfully exploited the following will be executed to run the calculator: $ export"
X Link 2025-07-04T20:57Z [----] followers, [--] engagements

"CVE-2025-49144 is a high-severity local privilege escalation vulnerability found in the Notepad++ v8.8.1 and prior version installers. This vulnerability stems from uncontrolled executable search path behavior during installation allowing a local attacker to gain SYSTEM-level privileges by placing malicious executables in the same directory as the installer. GitHub: #Exploits #Windows #Linux https://github.com/TheTorjanCaptain/CVE-2025-49144_PoC.git https://github.com/TheTorjanCaptain/CVE-2025-49144_PoC.git"
X Link 2025-07-13T21:58Z [----] followers, [--] engagements

"15 efficient commands for pentesting on Linux: nmap: nmap -p- target IP (Scan all ports on a target) netcat: nc -nv target IP port (Open a TCP connection to a target) tcpdump: tcpdump -i eth0 tcp port [--] (Capture network traffic on port 80) wireshark: wireshark (Start the Wireshark GUI) traceroute: traceroute target IP (Show the route that packets take to reach a target) dig: dig target domain (Query DNS information for a domain) whois: whois target domain (Lookup WHOIS information for a domain) ncat: ncat -lvp port (Listen on a specific port for incoming connections) snort: snort -c"
X Link 2025-07-16T21:54Z [----] followers, [---] engagements

"I translated a video by a YouTube blogger who analyzed three Russian social networks to determine whether they spy on their users. The Russian social networks reviewed: Telegram MAX VK Notably the Russian government is attempting to slow down and block Telegram within its territory as the platforms administration refuses to cooperate with Russian authorities or comply with their demands. #telegram #max #vk #spy https://twitter.com/i/web/status/2022445554848895471 https://twitter.com/i/web/status/2022445554848895471"
X Link 2026-02-13T22:59Z [----] followers, [---] engagements

"Subscribe to the channel https://www.youtube.com/@CyberPentestLab https://www.youtube.com/@CyberPentestLab"
X Link 2025-01-31T16:24Z [----] followers, 10.6K engagements

"LTE Sniffer with Full Functionality LTE Sniffer is an open source tool that passively intercepts wireless traffic of 4G base station subscribers. ➖ It exploits vulnerabilities in the LTE protocol to intercept and decrypt wireless traffic. #LTE https://github.com/SysSec-KAIST/LTESniffer.git https://github.com/SysSec-KAIST/LTESniffer.git"
X Link 2025-01-30T16:49Z [----] followers, [---] engagements

"Curated Tools for Building an Anonymous Environment 🟢 OnionShare Enables secure and anonymous file sharing and data exchange via Tor by generating temporary "onion" addresses for uploading and downloading. 🟢 SecureDrop A secure whistleblowing platform designed for anonymous communication between sources and journalists allowing confidential tip submissions. 🟢 CalyxOS A privacy and security-focused mobile operating system that prioritizes user anonymity offering built-in privacy-centric apps and enhanced data protection. 🟢 Cryptocat Facilitates real-time encrypted messaging securing both"
X Link 2025-03-02T19:12Z [----] followers, [---] engagements

"CVE-2022-24500 RCE Exploit GitHub: Windows SMB Remote Code Execution Vulnerability Vulnerability: Windows [--] - Windows [----] #cve #smb #exploit #rce https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24500 https://github.com/0xZipp0/CVE-2022-24500 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-24500 https://github.com/0xZipp0/CVE-2022-24500"
X Link 2025-03-10T00:49Z [----] followers, [---] engagements

"TheFatRat is a tool to use that compiles malware with a payload and then the compiled maware can be run on Linux Windows Mac and Android. sudo git clone cd TheFatRat sudo chmod +x sudo ./setup.sh sudo fatrat #Hacking #Linux #Windows http://setup.sh https://github.com/Screetsec/TheFatRat.git http://setup.sh https://github.com/Screetsec/TheFatRat.git"
X Link 2025-02-08T17:42Z [----] followers, [---] engagements

"Critical Vulnerability in Jenkins: Arbitrary File Read Leading to Remote Code Execution (RCE) via CVE-2024-23897 A critical vulnerability has been identified in Jenkins enabling attackers to execute arbitrary code (RCE) on affected systems by exploiting a flaw in the vulnerable component of the args4j library. This functionality is enabled by default and remains active in Jenkins versions [-----] and earlier as well as Long-Term Support (LTS) versions 2.426.2 and earlier allowing unauthorized file reads and subsequent remote code execution. Jenkins: POC: args4j: Usage: python"
X Link 2025-03-22T22:02Z [----] followers, [---] engagements

"Friends your engagement and support mean a lot to me. Thank you to everyone who follows me and interacts with my tweets 😁"
X Link 2025-04-07T03:01Z [----] followers, [---] engagements

"Face Search Library The simplest open-source library for people search. If you've been wanting to play with this device for a long time this is what you need. Instructions for use included #github https://github.com/ageitgey/face_recognition https://github.com/ageitgey/face_recognition"
X Link 2025-02-08T21:37Z [----] followers, [---] engagements

"Tartufo 🟢 The Tartufo tool scans repositories for accidentally leaked tokens and credentials. It can inspect the entire commit history to detect secrets. 🟢 Documentation: 🟢 GitHub: #Tools #Red_Team #redteam https://github.com/godaddy/tartufo.git https://tartufo.readthedocs.io https://github.com/godaddy/tartufo.git https://tartufo.readthedocs.io"
X Link 2025-03-06T21:50Z [----] followers, [---] engagements

"Securing AWS My-arsenal-of-aws-security-tools is a curated list of open source tools for AWS security auditing forensics and incident response. ➖It serves as a comprehensive resource for security professionals DevOps engineers and AWS administrators to improve cloud security and optimize security-related tasks on the AWS platform. GitHub: #Tool #AWS #Security #GitHub https://github.com/toniblyx/my-arsenal-of-aws-security-tools https://github.com/toniblyx/my-arsenal-of-aws-security-tools"
X Link 2025-04-20T19:21Z [----] followers, [---] engagements

"Raspberry Pi Operating Systems Review: From Cinema to Data Storage #Raspberry #System #OS https://medium.com/@cyberlabpentest/raspberry-pi-operating-systems-review-from-cinema-to-data-storage-88ae96cff9d1 https://medium.com/@cyberlabpentest/raspberry-pi-operating-systems-review-from-cinema-to-data-storage-88ae96cff9d1"
X Link 2025-03-04T00:44Z [----] followers, [---] engagements

"SSHwatch is a powerful yet easy-to-use platform designed to monitor analyze and secure your SSH access. With real-time threat monitoring and detection it keeps your systems secure while providing a clean user-friendly dashboard. ➖Instant access to key details like general logs high-risk events failed login attempts and unique IP addresses - all in one place. GitHub: #SSH #Scanning #Analysis https://github.com/marshyski/sshwatch https://github.com/marshyski/sshwatch"
X Link 2025-04-27T22:22Z [----] followers, [---] engagements

"Reverse Engineer's Toolkit A collection of tools you might find useful if youre interested in reverse engineering and/or malware analysis for **x86 and x64 Windows systems. #Windows #x86 #x64 https://github.com/mentebinaria/retoolkit https://github.com/mentebinaria/retoolkit"
X Link 2025-01-29T22:42Z [----] followers, [---] engagements

"VenomRAT HVNC is one of the most searched and popular RAT and the best in the market right now GitHub: #Venom #rat #CyberSecurity https://github.com/VenomRATHVNC/VenomRAT-HVNC-5.6.git https://github.com/VenomRATHVNC/VenomRAT-HVNC-5.6.git"
X Link 2025-03-23T03:52Z [----] followers, [---] engagements

"Search engine for hackers/pentesters == servers == dorks == wifi networks == code search https://app.binaryedge == threat intelligence == server == threat intelligence == server == email addresses == threat intelligence == threat intelligence == threat intelligence == OSINT == attack surface == code search == threat intelligence == code search == attack surface == threat intelligence ==attack surface == server == certificate search == vulnerabilities == threat intelligence #URL #service https://pulsedive.com https://vulners.com https://crt.sh https://ivre.rocks https://binaryedge.io"
X Link 2025-04-04T00:21Z [----] followers, [---] engagements

"New update on my GitHub dont miss out Follow updates on my GitHub: https://t.co/7fNZlPXM8A #redteam #git #github Follow updates on my GitHub: https://t.co/7fNZlPXM8A #redteam #git #github"
X Link 2025-03-16T21:46Z [----] followers, [---] engagements

"Follow updates on my GitHub: #redteam #git #github https://github.com/CyberPentestLab https://github.com/CyberPentestLab"
X Link 2025-03-08T03:53Z [----] followers, [----] engagements

"Tor Onion Site Scraper - crawler of .onion sites https://github.com/MikeMeliz/TorCrawl.py https://github.com/joelhagvall/tor-onion-site-scraper https://github.com/MikeMeliz/TorCrawl.py https://github.com/joelhagvall/tor-onion-site-scraper"
X Link 2025-03-30T03:40Z [----] followers, [---] engagements

"Scan for security vulnerabilities in a web application WhatWeb is a scanner written in Ruby that can identify and recognize all web technologies available on a target website. ➖WhatWeb has over [---] plugins each of which recognizes something different. It also identifies version numbers email addresses account IDs web framework modules SQL errors and more. GitHub: https://github.com/urbanadventurer/WhatWeb https://github.com/urbanadventurer/WhatWeb"
X Link 2025-05-02T20:14Z [----] followers, [---] engagements

"CrossC2 GitHub: Generate CobaltStrike's cross-platform payload: Windows Android iOS Linux MacOS Embedded Wiki: #cobalt #CrossC2 #C2 https://gloxec.github.io/CrossC2/en/ https://github.com/gloxec/CrossC2 https://gloxec.github.io/CrossC2/en/ https://github.com/gloxec/CrossC2"
X Link 2025-03-13T10:48Z [----] followers, [---] engagements

"Spoofing Timezone Geolocation Locale and User Agent Vytal is a browser extension that customizes your browser settings to mimic internet access from a different location locale or device. Key features of Vytal: 🔵 Timezone spoofing 🔵 Geolocation alteration 🔵 Locale customization With Vytal users can: Select a preset location from a list Adjust settings to match an IP address Add a custom location for precise control. GitHub: #tool #CyberSecurity https://github.com/vytal-io/vytal-extension.git https://github.com/vytal-io/vytal-extension.git"
X Link 2025-02-27T22:16Z [----] followers, [---] engagements

"🔖Top [--] JavaScript path files used to store sensitive information in Web Application [--]. /js/config.js [--]. /js/credentials.js [--]. /js/secrets.js [--]. /js/keys.js [--]. /js/password.js [--]. /js/api_keys.js [--]. /js/auth_tokens.js [--]. /js/access_tokens.js [--]. /js/sessions.js [--]. /js/authorization.js [--]. /js/encryption.js [--]. /js/certificates.js [--]. /js/ssl_keys.js [--]. /js/passphrases.js [--]. /js/policies.js [--]. /js/permissions.js [--]. /js/privileges.js [--]. /js/hashes.js [--]. /js/salts.js [--]. /js/nonces.js [--]. /js/signatures.js [--]. /js/digests.js [--]. /js/tokens.js [--]. /js/cookies.js 25."
X Link 2025-03-28T20:15Z [----] followers, [---] engagements

"❗ A new reverse shell called ReverseShell_2025_01.ps1 At the time of publication none of the scripts were flagged by antivirus systems. However typically within 2-3 weeks after publication some vendors begin to detect and flag the malicious files. GitHub: #GitHub #TOOLS https://github.com/tihanyin/PSSW100AVB/blob/main/ReverseShell_2025_01.ps1 https://github.com/tihanyin/PSSW100AVB/blob/main/ReverseShell_2025_01.ps1"
X Link 2025-04-12T01:14Z [----] followers, [---] engagements

"Fuzz Faster U Fool (FFUF) Ffuf is a powerful command line tool designed to brute force web application content. ➖It allows you to automate the fuzzing process thereby discovering hidden files and directories as well as checking various URL parameters and HTTP headers. GitHub: #Brute #Web https://github.com/ffuf/ffuf https://github.com/ffuf/ffuf"
X Link 2025-05-07T12:50Z [----] followers, [---] engagements

"Evil Crow Keylogger Cable 🔥 https://www.amazon.co.uk/KSEC-Evil-Crow-Cable-USB/dp/B0BKWF2R2F https://www.amazon.co.uk/KSEC-Evil-Crow-Cable-USB/dp/B0BKWF2R2F"
X Link 2025-02-08T11:02Z [----] followers, [---] engagements

"CVE-2024-27199 TeamCity server CVE makes it easy to create an unauthorized admin account bypassing [---] errors on a domain. GitHub: usage: python -t --verbose #teamcity http://teamcity.com:8111 http://RCity.py https://github.com/Stuub/RCity-CVE-2024-27199 http://teamcity.com:8111 http://RCity.py https://github.com/Stuub/RCity-CVE-2024-27199"
X Link 2025-04-23T20:58Z [----] followers, [---] engagements

"Hacked and Stolen Data Search Service DeHashed is a service for searching through a database of hacked and stolen personal data. You can search by IP addresses email addresses logins phone numbers VIN numbers home addresses etc. The service offers reverse search by passwords hash sums and other types of data. #database #search https://www.dehashed.com https://www.dehashed.com"
X Link 2025-02-19T01:55Z [----] followers, [---] engagements

"A Linux system called BountyOS This system is dedicated to the work of bug bounty contains all the tools you can use directly. The system is designed to be my personality and nothing else except the tools needed for bug bounty you can download and use for free here https://bountyos.github.io/ https://bountyos.github.io/"
X Link 2025-05-22T20:48Z [----] followers, [---] engagements

"Dear friends I have updated and added new features to my program. 😎 If anyone wants to thank the developer the details are at the bottom of the description.😅 GitHub: https://github.com/CyberPentestLab/TGkeylogger/ https://github.com/CyberPentestLab/TGkeylogger/"
X Link 2025-05-16T02:06Z [----] followers, [---] engagements

"HacknDroid: Automation of some MAPT activities and interaction with the mobile Android device Prerequisites: adb enabled ✅ device authorized ✅ GitHub: https://github.com/RaffaDNDM/HacknDroid https://github.com/RaffaDNDM/HacknDroid"
X Link 2025-05-19T09:37Z [----] followers, [---] engagements

"SIPVicious is a set of tools for auditing SIP (Session Initiation Protocol) based voice communication systems. ➖SIPVicious was used to hack VoIP servers to call expensive premium numbers or for voice phishing. GitHub: #VoIP #sip https://github.com/EnableSecurity/sipvicious https://github.com/EnableSecurity/sipvicious"
X Link 2025-05-12T21:29Z [----] followers, [---] engagements

"OPENSKY Open (free) air traffic data for research: - live data - historical data - tracking 264K+ aircrafts - scientific datasets - #Python library #osint #geoint http://opensky-network.org https://github.com/open-aviation/pyopensky http://opensky-network.org https://github.com/open-aviation/pyopensky"
X Link 2025-04-07T02:52Z [----] followers, [---] engagements

"⚡ New method for hacking Tranax MiniBank [----] series ATMs is being distributed https://attrition.org/misc/ee/atm_manuals/Tranax%20Mini-Bank%201500%20-%20Operator%20Manual.pdf https://attrition.org/misc/ee/atm_manuals/Tranax%20Mini-Bank%201500%20-%20Operator%20Manual.pdf"
X Link 2025-02-22T01:50Z [----] followers, [---] engagements

"👩💻 Nagios XI RCE Nagios XI 2024R1.01 has a vulnerability in the monitoringwizard.php component allowing authenticated SQL injection (CVE-2024-24401) that lets attackers create an admin account and remote code execution. 🔗 Source: #nagios #sqlinjection #rce #privesc #poc #exploit https://github.com/MAWK0235/CVE-2024-24401 https://github.com/MAWK0235/CVE-2024-24401"
X Link 2025-04-16T02:33Z [----] followers, [---] engagements

"https://www.mobile-hacker.com/2024/06/26/rfid-hacking-with-proxmark3-cloning-emulating-and-standalone-mode/ https://www.mobile-hacker.com/2024/06/26/rfid-hacking-with-proxmark3-cloning-emulating-and-standalone-mode/"
X Link 2025-01-28T19:50Z [----] followers, [---] engagements

"Notificationbot With notificationbot you can easily send notifications/messages to telegram from anywhere (terminal CI/CD pipeline IoT device etc.). This service is stateless and you can deploy it in your own instance. GitHub: #IOT https://github.com/cirebon-dev/notification_bot https://github.com/cirebon-dev/notification_bot"
X Link 2025-05-29T00:37Z [----] followers, [---] engagements

"Introducing the Evil Crow RF V2. A portable RF device that is fully compatible with Flipper Zero. It can even play pre-recorded Sub-GHz frequencies available for the unofficial Flipper Zero firmware. #Hacked #Flipper https://www.amazon.com/Evil-Crow-Penetration-ResearchTool-433MhzAluminumCase/dp/B0D9QFWHRG https://www.amazon.com/Evil-Crow-Penetration-ResearchTool-433MhzAluminumCase/dp/B0D9QFWHRG"
X Link 2025-02-15T19:02Z [----] followers, [---] engagements

"Hacking social media accounts Commands from the video: git clone cd zphisher bash Operating system used: Parrot Security OS #Hacked #CyberSecurity http://zphisher.sh https://github.com/htr-tech/zphisher.git http://zphisher.sh https://github.com/htr-tech/zphisher.git"
X Link 2025-02-19T00:37Z [----] followers, [---] engagements

"@RecklesUnicorn @Vaillando @eyes_on_01 @Blqck_jnr @offgrid_4_life @ShrwanMeghwal6 @happyx @Troymediax @Dud3rz @SecretCelebriti @AlphaKong100X @akmetax @ClickMediaX @louisedbegin @Catavina17 @raghave70161237 @Sunearthmoon_ Thank you"
X Link 2025-03-19T03:42Z [----] followers, [--] engagements

"Hacking SJCAM4000 via Wi-Fi This article is published for informational purposes #Hacked #camera #WiFi https://link.medium.com/fy4u8snoSQb https://link.medium.com/fy4u8snoSQb"
X Link 2025-02-10T15:08Z [----] followers, [---] engagements

"Draw2Img is a simple web interface for interactive image creation using sketches and text designed for all ages and skill levels. Features: 🗣Web interface interactive canvas with basic drawing tool and color picker. 🗣Real-time image creation with SDXL-Turbo (512 x [---] pixels). 🗣Editable hint seed step and strength parameters. 🗣Export button to save input and output images as PNG files as well as parameters as JSON. 🗣Multi-threaded server supports simultaneous work of several users. 🗣Local (no internet required) private and open source. GitHub: #web #image"
X Link 2025-05-29T22:31Z [----] followers, [---] engagements

"Anubis is a ransomware (based on EDA2) that infiltrates systems and encrypts files. During encryption Anubis appends the ".coded" extension to the name of each encrypted file. For example "sample.jpg" is renamed to "sample.jpg.coded". After successful encryption Anubis changes the desktop background and creates a text file ("Decryption Instructions.txt") placing it on the desktop. Anubis is used by many different cybercriminal gangs. These groups have access to a wide range of functionality and pose significant security threats to mobile devices. #block #tools"
X Link 2025-02-08T08:58Z [----] followers, [---] engagements

"Sploitus - search engine for fresh exploits. The site also has a collection of various utilities https://sploitus.com https://sploitus.com"
X Link 2025-02-01T20:06Z [----] followers, [---] engagements

"Sniffer network traffic analysis Information particularly confidential data is a prime target for malicious actors. To prevent leaks and mitigate targeted attacks on information systems organizations employ network traffic analysis. A modern terminal-based network traffic sniffer designed for troubleshooting network issues. It can be launched at any time to analyze processes or connections causing surges in network traffic without requiring the loading of any kernel modules. GitHub: #sniffer #traffic #Network #Networking https://github.com/chenjiandongx/sniffer"
X Link 2025-03-26T15:03Z [----] followers, [---] engagements

"StegCloak is a pure JavaScript steganography module built with a functional programming approach designed to hide text in plain sight. It employs techniques like compression encryption and invisible Unicode characters to embed concealed text enabling seamless steganography. ➖ Purpose: To securely conceal textual content and embed watermarks. GitHub: https://github.com/KuroLabs/stegcloak.git https://github.com/KuroLabs/stegcloak.git"
X Link 2025-02-26T17:17Z [----] followers, [---] engagements

"Terrapin Vulnerability Scanner is a small utility written in Go that can be used to determine the vulnerability of an SSH client or server against the Terrapin attack. Terrapin is a prefix truncation attack against the SSH protocol. The attack compromises the integrity of the secure SSH channel by changing sequence numbers during the handshake. The vulnerability scanner requires a single connection to the peer to collect all supported algorithms. However it does not perform a full SSH key exchange never attempts to authenticate to the server and does not actually perform the attack. Instead"
X Link 2025-05-29T22:19Z [----] followers, [---] engagements

"#Wireshark #traffic https://telegra.ph/How-to-intercept-traffic-using-Wireshark-02-06 https://telegra.ph/How-to-intercept-traffic-using-Wireshark-02-06"
X Link 2025-02-06T10:48Z [----] followers, [---] engagements

"@RecklesUnicorn Ok"
X Link 2025-03-19T03:14Z [----] followers, [--] engagements

"Telepathy Telegram's Swiss Army knife that lets you analyze and archive Telegram chats collect member lists find users by location analyze top posters in a chat map forwarded messages and more. GitHub: #Telegram #github #Network https://github.com/proseltd/Telepathy-Community.git https://github.com/proseltd/Telepathy-Community.git"
X Link 2025-02-09T19:06Z [----] followers, [---] engagements

"Bonus Pro Tips [--]. Enumerate Plugins and Themes. Use /wp-json/wp/v2/themes or /wp-json/wp/v2/plugins. Plugins often reveal active components and version info. [--]. Leverage Caching. Check for outdated cached versions of sensitive files. [--]. Server Misconfigurations Test for directory listing enabled on /wp-content/. [--]. Debugging Tools Use x-forwarded-for headers to bypass IP restrictions. - /wp-admin.php - /wp-config.php - /wp-content/uploads - /wp-load - /wp-signup. php - /wp-json - /wp-incLudes/ - /wp-Login.php - /wp-Links-opml.php - /wp-activate.php - /wp-blog-header.php - /wp-cron.php -"
X Link 2025-02-12T09:11Z [----] followers, [---] engagements

"GSM cracking A5 encryption and sms sniffing with RTL-SDR The video shows an attacker conducting an attack to intercept an SMS message. #GSM #cracking #RTL #SDR"
X Link 2025-02-17T23:16Z [----] followers, [---] engagements

"🐱 Awesome Sysadmin - 🐱 ➖: Backups Cloning Cloud Computing Cloud Orchestration Cloud Storage Collaborative Software Distributed Filesystems DNS VPN "
X Link 2025-01-27T19:14Z [----] followers, [---] engagements

"@Harmonyexplore1 Now you can write to me. You can also write in the comments"
X Link 2025-03-11T01:03Z [----] followers, [--] engagements

"Gaining unauthorized access to Windows [----] Server using TheFatRat https://youtu.be/iZ58I0Z_tBc https://youtu.be/iZ58I0Z_tBc"
X Link 2025-01-31T16:23Z [----] followers, [---] engagements

"CVE-2023-48788 is a vulnerability related to incorrect handling of user data in one of the popular software products. It may allow an attacker to execute arbitrary code or gain access to sensitive information on the vulnerable system. GitHub: https://github.com/horizon3ai/CVE-2023-48788 https://github.com/horizon3ai/CVE-2023-48788"
X Link 2025-02-05T10:58Z [----] followers, [---] engagements

"#sysadmin #devops #opensource #it https://github.com/awesome-foss/awesome-sysadmin https://github.com/awesome-foss/awesome-sysadmin"
X Link 2025-01-27T19:14Z [----] followers, [--] engagements

"CrossC2 Generate CobaltStrike's cross-platform payload: Windows Android iOS Linux MacOS Embedded Description: https://gloxec.github.io/CrossC2/en/ https://github.com/gloxec/CrossC2 https://gloxec.github.io/CrossC2/en/ https://github.com/gloxec/CrossC2"
X Link 2025-01-27T04:23Z [----] followers, [--] engagements

"CVE-2023-27372 is a privilege escalation vulnerability in Ivanti Avalanche an enterprise MDM (mobile device management) system. GitHub: #CVE #PHP #vulnerable https://github.com/nuts7/CVE-2023-27372 https://github.com/nuts7/CVE-2023-27372"
X Link 2025-02-14T18:58Z [----] followers, [---] engagements

"What version of Windows are you using in [----] Windows [--] Windows [--] Windows [--] Windows [--] Windows [--] Windows 7"
X Link 2025-02-18T22:16Z [----] followers, [---] engagements

"@RecklesUnicorn What do you mean"
X Link 2025-03-19T03:23Z [----] followers, [--] engagements

Limited data mode. Full metrics available with subscription: lunarcrush.com/pricing

@CyberPentestLab
/creator/twitter::CyberPentestLab