Dark | Light
# ![@cyber_razz Avatar](https://lunarcrush.com/gi/w:26/cr:twitter::1850589024416886784.png) @cyber_razz Abdulkadir | Cybersecurity

Abdulkadir | Cybersecurity posts on X about how to, ip, linux, tools the most. They currently have [------] followers and [---] posts still getting attention that total [-------] engagements in the last [--] hours.

### Engagements: [-------] [#](/creator/twitter::1850589024416886784/interactions)
![Engagements Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::1850589024416886784/c:line/m:interactions.svg)

- [--] Week [---------] +8.30%
- [--] Month [----------] +411%
- [--] Months [----------] +1,081%
- [--] Year [----------] +2,089%

### Mentions: [---] [#](/creator/twitter::1850589024416886784/posts_active)
![Mentions Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::1850589024416886784/c:line/m:posts_active.svg)

- [--] Week [---] +104%
- [--] Month [---] +157%
- [--] Months [-----] +38%
- [--] Year [-----] +393%

### Followers: [------] [#](/creator/twitter::1850589024416886784/followers)
![Followers Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::1850589024416886784/c:line/m:followers.svg)

- [--] Week [------] +6%
- [--] Month [------] +23%
- [--] Months [------] +195%
- [--] Year [------] +609%

### CreatorRank: [------] [#](/creator/twitter::1850589024416886784/influencer_rank)
![CreatorRank Line Chart](https://lunarcrush.com/gi/w:600/cr:twitter::1850589024416886784/c:line/m:influencer_rank.svg)

### Social Influence

**Social category influence**
[technology brands](/list/technology-brands)  4.67% [social networks](/list/social-networks)  2.67% [finance](/list/finance)  2% [stocks](/list/stocks)  1.67% [products](/list/products)  1.33% [celebrities](/list/celebrities)  1% [countries](/list/countries)  0.33%

**Social topic influence**
[how to](/topic/how-to) 4%, [ip](/topic/ip) #594, [linux](/topic/linux) #5, [tools](/topic/tools) 3.67%, [command](/topic/command) #728, [if you](/topic/if-you) 2.33%, [in the](/topic/in-the) 1.67%, [link](/topic/link) 1.67%, [systems](/topic/systems) 1.67%, [level](/topic/level) #1617

**Top accounts mentioned or mentioned by**
[@grok](/creator/undefined) [@timetherington](/creator/undefined) [@tj18011800](/creator/undefined) [@tanmoy_og](/creator/undefined) [@pawel_lasek](/creator/undefined) [@iamibnsanusi10](/creator/undefined) [@dangitman50](/creator/undefined) [@david_abasi](/creator/undefined) [@paul_nets](/creator/undefined) [@abaways](/creator/undefined) [@stanislawweston](/creator/undefined) [@cyberrazz](/creator/undefined) [@segoslavia](/creator/undefined) [@sebp888](/creator/undefined) [@aitrendzz](/creator/undefined) [@digitalvagrant](/creator/undefined) [@pablodelared](/creator/undefined) [@ark_aegis](/creator/undefined) [@likhontamim](/creator/undefined) [@dingbangfook](/creator/undefined)

**Top assets mentioned**
[Alphabet Inc Class A (GOOGL)](/topic/$googl) [Microsoft Corp. (MSFT)](/topic/microsoft)
### Top Social Posts
Top posts by engagements in the last [--] hours

"Cybersecurity Roadmap: Step-by-Step Guide for Aspiring Professionals Embarking on a cybersecurity journey can be challenging but with the right plan you can progress steadily and achieve your goals. Based on my personal journey as a penetration tester in training heres a roadmap tailored to aspiring cybersecurity professionals infused with my insights and practical experiences. A thread πŸ“·"  
[X Link](https://x.com/anyuser/status/1876545832847065231)  2025-01-07T08:26Z 37.9K followers, 278.3K engagements


"NETWORKING KNOWLEDGE CHECKPOINT Can these two IP addresses communicate with each other directly (Without a router ) 192.168.10.1 & 192.168.2.1 YES or NO"  
[X Link](https://x.com/anyuser/status/1881022559908700331)  2025-01-19T16:55Z 37.9K followers, 247.6K engagements


"NETWORKING KNOWLEDGE CHECKPOINT We have 220.50.35.0/25 ip address. In the company we have [--] FLOORS for each floor we will use a different subnet. What is the THIRD FLOORS NETWORK ADDRESS ) 220.50.35.8 b) 220.50.35.32 c) 220.50.35.0 d) 220.50.35.64 e) 220.50.35.128"  
[X Link](https://x.com/anyuser/status/1882000328301887695)  2025-01-22T09:40Z 37.9K followers, 158.3K engagements


"MUST KNOW LINUX BASIC COMMANDS"  
[X Link](https://x.com/anyuser/status/1908134329504403740)  2025-04-04T12:27Z 37.9K followers, 142.7K engagements


"I setup a honeypot on the cloud and in less than [--] hours Ive had over 52k+ attacks on it crrraaaazzzzyyyy hackers are really out there trying to access everything and anything accessible Ill qoute this and talk about the project in full soon"  
[X Link](https://x.com/anyuser/status/1926644090533294484)  2025-05-25T14:18Z 37.9K followers, 110.6K engagements


"HOW I SETUP A HONEYPOT ON CLOUD AND RECORDED 75K+ BRUTE-FORCE ATACKS IN [--] HOURS & HOW I MAPPED EVERYONE OF THEM WITH MICROSOFT SENTINEL (A thread 🧡) I exposed a Windows VM to the internet. Waited. Thousands of brute-force attacks came flooding in. So I built a custom attack map in Microsoft Sentinel. Heres the exact process step-by-step I setup a honeypot on the cloud and in less than [--] hours Ive had over 52k+ attacks on it crrraaaazzzzyyyy hackers are really out there trying to access everything and anything accessible Ill qoute this and talk about the project in full soon I setup a"  
[X Link](https://x.com/anyuser/status/1927005069209153947)  2025-05-26T14:13Z 37.9K followers, 103.8K engagements


"AI tools for learning 1.cybersecurity [--]. programming [--]. Networking"  
[X Link](https://x.com/anyuser/status/1960754159042617696)  2025-08-27T17:19Z 37.9K followers, 81.2K engagements


"Cybersecurity as a service (CSaaS)"  
[X Link](https://x.com/anyuser/status/1962156952995111264)  2025-08-31T14:14Z 37.9K followers, 78.2K engagements


"Networking Physical Tools"  
[X Link](https://x.com/anyuser/status/1962220457848881386)  2025-08-31T18:26Z 37.9K followers, 29.2K engagements


"GITHUB CHEAT SHEET"  
[X Link](https://x.com/anyuser/status/1964695721552294274)  2025-09-07T14:22Z 37.9K followers, 118.3K engagements


"Computer Networking Note This helped me when I was learning too Bookmark and use ❀"  
[X Link](https://x.com/anyuser/status/1965052056542331319)  2025-09-08T13:58Z 37.9K followers, 149.9K engagements


"The chart is a side-by-side comparison showing that for every paid Al tool there is a free alternative that can perform a similar job. This helps people save money while still getting work done with Al tools. #copied"  
[X Link](https://x.com/anyuser/status/1966824448558031020)  2025-09-13T11:21Z 37.9K followers, 83.8K engagements


"ROUTING VS SWITCHING"  
[X Link](https://x.com/anyuser/status/1967559494571000037)  2025-09-15T12:01Z 37.9K followers, 23K engagements


"15 free Cybersecurity Tools"  
[X Link](https://x.com/anyuser/status/1967938112015028463)  2025-09-16T13:06Z 37.9K followers, 42.1K engagements


"LINUX PATH CHEATSHEET"  
[X Link](https://x.com/anyuser/status/1968274045910303157)  2025-09-17T11:21Z 37.9K followers, 51.6K engagements


"Computer Networking Notes Computer Networking Note This helped me when I was learning too Bookmark and use ❀ https://t.co/Gv8PoVEr4u Computer Networking Note This helped me when I was learning too Bookmark and use ❀ https://t.co/Gv8PoVEr4u"  
[X Link](https://x.com/anyuser/status/1968328000409416182)  2025-09-17T14:55Z 37.9K followers, 50.8K engagements


"πŸ‘€ Im dropping something BIG for my followers soon watch my page"  
[X Link](https://x.com/anyuser/status/1969104301952843849)  2025-09-19T18:20Z 37.9K followers, 124.7K engagements


"TYPES OF APIs AND THEIR USE CASES"  
[X Link](https://x.com/anyuser/status/1969114223545303389)  2025-09-19T18:59Z 37.9K followers, 66.2K engagements


"TOP [--] CYBERSECURITY TOOLS IN 2025"  
[X Link](https://x.com/anyuser/status/1969114248493011203)  2025-09-19T18:59Z 37.9K followers, 33.8K engagements


"HELLO CYBER FRIENDS We are giving away FREE access to a Cisco DevOps course πŸŽ‰ Only [----] people will get in Youll learn: Cisco DevOps fundamentals CI/CD pipelines Automation & Infrastructure as Code Hands-on labs to sharpen your skills To grab your spot: βœ… Follow me βœ… Turn on post notifications βœ… Comment DevOps βœ… Retweet this post An update will follow in the next [--] hours πŸ‘€ Im dropping something BIG for my followers soon watch my page πŸ‘€ Im dropping something BIG for my followers soon watch my page"  
[X Link](https://x.com/anyuser/status/1969126629738709394)  2025-09-19T19:49Z 37.9K followers, 148.8K engagements


"6 TYPES OF API TESTING"  
[X Link](https://x.com/anyuser/status/1970497079811194986)  2025-09-23T14:34Z 37.9K followers, 46.7K engagements


"LINUX SYSADMIN TOOLS"  
[X Link](https://x.com/anyuser/status/1971912820498616671)  2025-09-27T12:20Z 37.9K followers, 46.4K engagements


"Networking Cheat sheet"  
[X Link](https://x.com/anyuser/status/1972628597568606543)  2025-09-29T11:44Z 37.9K followers, 30.4K engagements


"Windows Shortcut Key"  
[X Link](https://x.com/anyuser/status/1972985031976259669)  2025-09-30T11:21Z 37.9K followers, 43.9K engagements


"All Listed SOC Free certificates"  
[X Link](https://x.com/anyuser/status/1973023059356557815)  2025-09-30T13:52Z 37.9K followers, 62.2K engagements


"Ill qoute with the link within [--] hours"  
[X Link](https://x.com/anyuser/status/1974217737917321490)  2025-10-03T20:59Z 37.9K followers, 58.4K engagements


"IP command sheet"  
[X Link](https://x.com/anyuser/status/1974507408895746431)  2025-10-04T16:10Z 37.9K followers, 43.2K engagements


"🚨 FREE Bug Bounty Course Drop From Zero Hero in Bug Bounty Hunting πŸžπŸ’» Im dropping the FULL course link [--] hours from now and as always itll be 100% FREE 🎁 Want early access when it goes live πŸ” Heres how to lock in your spot [--] Follow me [--] Turn on post notifications πŸ”” [--] Retweet this post 4Comment LOCKED IN Lets build the next wave of bug bounty hunters πŸ‘Š @cyber_razz"  
[X Link](https://x.com/anyuser/status/1975976406124200066)  2025-10-08T17:27Z 37.9K followers, 88.5K engagements


"As promised heres the link πŸ”—: Bug bounty course from zero to hero Enjoy 🫢 https://drive.google.com/drive/u/0/folders/1t-hTqg0-02t0cnc5SypHnb8t3CfE3bXU 🚨 FREE Bug Bounty Course Drop From Zero Hero in Bug Bounty Hunting πŸžπŸ’» Im dropping the FULL course link [--] hours from now and as always itll be 100% FREE 🎁 Want early access when it goes live πŸ” Heres how to lock in your spot [--] Follow me [--] Turn on post https://t.co/vY5TUdT4mV https://drive.google.com/drive/u/0/folders/1t-hTqg0-02t0cnc5SypHnb8t3CfE3bXU 🚨 FREE Bug Bounty Course Drop From Zero Hero in Bug Bounty Hunting πŸžπŸ’» Im dropping the"  
[X Link](https://x.com/anyuser/status/1976371103967924563)  2025-10-09T19:36Z 37.9K followers, 83.3K engagements


"Useful Wireshark Filters"  
[X Link](https://x.com/anyuser/status/1977058968770900161)  2025-10-11T17:09Z 37.9K followers, 68.7K engagements


"ETHICAL HACKING BASIC FUNDAMENTAL"  
[X Link](https://x.com/anyuser/status/1977689951862169821)  2025-10-13T10:56Z 37.9K followers, 26.4K engagements


"OS : Linux systems Which is your fav"  
[X Link](https://x.com/anyuser/status/1977693447772344423)  2025-10-13T11:10Z 37.9K followers, 160.3K engagements


"AWS in Plain English"  
[X Link](https://x.com/anyuser/status/1977739119506702839)  2025-10-13T14:12Z 37.9K followers, 221.4K engagements


"Red Team tools"  
[X Link](https://x.com/anyuser/status/1977739166398951610)  2025-10-13T14:12Z 37.9K followers, 26.4K engagements


"How DNS works"  
[X Link](https://x.com/anyuser/status/1978815282526216680)  2025-10-16T13:28Z 37.9K followers, 47.3K engagements


"Look at that everyone A LOCAL BUS"  
[X Link](https://x.com/anyuser/status/1978927357214793826)  2025-10-16T20:53Z 37.9K followers, 1.2M engagements


"AWS Roadmap"  
[X Link](https://x.com/anyuser/status/1979563070495375774)  2025-10-18T14:59Z 37.9K followers, 137.2K engagements


"Lets revamp this roadmap [--]. Cybersecurity fundamentals 2.Networking Basics [--]. Specialize [--]. projects Want a more detailed cybersecurity roadmap Just take a look at my pinned tweet and good luck"  
[X Link](https://x.com/anyuser/status/1982114648246587651)  2025-10-25T15:58Z 37.9K followers, 49.6K engagements


"Important windows batch scripts"  
[X Link](https://x.com/anyuser/status/1982118833096724813)  2025-10-25T16:15Z 37.9K followers, 32.9K engagements


"LEARN FOR FREE"  
[X Link](https://x.com/anyuser/status/1982486733485961331)  2025-10-26T16:37Z 37.9K followers, 257.1K engagements


"Anyways heres me configuring a switch live in class Executive mode privilege Mode Global mode Line  line console interface vlan . line vty Enable secret https://t.co/ekOglaDPi8 Executive mode privilege Mode Global mode Line  line console interface vlan . line vty Enable secret https://t.co/ekOglaDPi8"  
[X Link](https://x.com/anyuser/status/1983946257283359220)  2025-10-30T17:17Z 37.9K followers, 50.5K engagements


"Unpopular cybersecurity opinions that would get you in this position"  
[X Link](https://x.com/anyuser/status/1986460149934928086)  2025-11-06T15:46Z 37.9K followers, 649.2K engagements


"IP Addresses"  
[X Link](https://x.com/anyuser/status/1986498977886310700)  2025-11-06T18:20Z 37.9K followers, 42K engagements


"Apple Pay be Google Pay security"  
[X Link](https://x.com/anyuser/status/1987205453818822876)  2025-11-08T17:07Z 37.9K followers, 681.1K engagements


"Top [--] Platforms to Practice Ethical Hacking"  
[X Link](https://x.com/anyuser/status/1988302277791436929)  2025-11-11T17:46Z 37.9K followers, 35.1K engagements


"Ethernet Cable Categories (cat [--] exists too)"  
[X Link](https://x.com/anyuser/status/1988651792465555486)  2025-11-12T16:55Z 37.9K followers, 41.1K engagements


"HOW TO ACCESS THE DARK-WEB- a full breakdown. Understand the risks first. Its not a game. You can encounter illegal material malware scams and surveillance. In some countries even accessing it can land you in legal trouble. Step 1: Download Tor Browser. Only from the official site. This is a modified Firefox that routes your connection through multiple encrypted nodes to hide your location. Step 2: Consider a VPN. This is debated. Some use a trusted VPN before opening Tor for an extra layer but its not mandatory. Research "Tor over VPN" to decide. Step 3: Launch Tor and connect. It might take"  
[X Link](https://x.com/cyber_razz/status/1996912089768571192)  2025-12-05T11:58Z 37.9K followers, 1.5M engagements


"Linux users be like"  
[X Link](https://x.com/cyber_razz/status/2018663743752999145)  2026-02-03T12:31Z 37.9K followers, 51.1K engagements


"Rouge DHCP SERVER ATTACK FOR DUMMIES"  
[X Link](https://x.com/cyber_razz/status/2018791938124857794)  2026-02-03T21:01Z 37.9K followers, 56.5K engagements


"Cybersecurity interview prep DONT FAIL THESE BEGINNER LEVEL QUESTIONS"  
[X Link](https://x.com/cyber_razz/status/2019475383280624098)  2026-02-05T18:17Z 37.9K followers, 24.7K engagements


"How a WiFi router works"  
[X Link](https://x.com/cyber_razz/status/2019478449157447724)  2026-02-05T18:29Z 37.9K followers, 231.5K engagements


"Apple Pay vs Google pay"  
[X Link](https://x.com/cyber_razz/status/2019696234483904545)  2026-02-06T08:54Z 37.9K followers, 4.5M engagements


"Chat.what device is this"  
[X Link](https://x.com/cyber_razz/status/2021859777869959452)  2026-02-12T08:11Z 37.9K followers, 29.6K engagements


"How to enter BIOS on your windows PC without pressing any key"  
[X Link](https://x.com/cyber_razz/status/2015336525320331309)  2026-01-25T08:10Z 36.4K followers, 74.1K engagements


"As the saying goes The more you delve into the world of tech the more you would want to retreat into the wilderness and never touch a computer again"  
[X Link](https://x.com/cyber_razz/status/2015346616568259027)  2026-01-25T08:50Z 35.9K followers, 101.2K engagements


"How to hack into any website"  
[X Link](https://x.com/cyber_razz/status/2015441614030684368)  2026-01-25T15:08Z 35.7K followers, 21.8K engagements


"Cant argue with this representation"  
[X Link](https://x.com/cyber_razz/status/2015472870198063255)  2026-01-25T17:12Z 36.6K followers, 207.4K engagements


"Accurate asf illustration"  
[X Link](https://x.com/cyber_razz/status/2015739704159641608)  2026-01-26T10:52Z 35.7K followers, 71.7K engagements


"Notice anything"  
[X Link](https://x.com/cyber_razz/status/2015787573080142093)  2026-01-26T14:03Z 36.1K followers, 266.5K engagements


"You might have noticed the photo of Netanyahus phone camera covered with tape. This isnt just a quirky habit; its a simple security measure. Phones can be hacked and cameras can be remotely activated without your knowledge. For someone in politics every device is a potential spy tool. Covering your camera with tape may seem low-tech but its surprisingly effective. Its a small step for privacy that can make a big difference. Even experts and cybersecurity professionals do it. In a world where your phone essentially serves as a window into your life a little tape can go a long way in protecting"  
[X Link](https://x.com/cyber_razz/status/2016081969096929594)  2026-01-27T09:32Z 36.1K followers, 670.1K engagements


"A cybersecurity beginner trying to choose a career path"  
[X Link](https://x.com/cyber_razz/status/2016118651552694371)  2026-01-27T11:58Z 36K followers, 30K engagements


"Can someone explain why operating systems like Mac or Linux are rarely infected by ransomware attacks"  
[X Link](https://x.com/cyber_razz/status/2016162643862602019)  2026-01-27T14:53Z 37K followers, 389.2K engagements


"You wont see a more perfect illustration"  
[X Link](https://x.com/cyber_razz/status/2016194021446557880)  2026-01-27T16:58Z 36.3K followers, 91K engagements


"Facts no cap"  
[X Link](https://x.com/cyber_razz/status/2016219313200328883)  2026-01-27T18:38Z 35.8K followers, 255.3K engagements


"How I love Linux jokes"  
[X Link](https://x.com/cyber_razz/status/2016514647898141143)  2026-01-28T14:12Z 37.5K followers, 139.3K engagements


"12 pillars of Network security"  
[X Link](https://x.com/cyber_razz/status/2016804602159481165)  2026-01-29T09:24Z 37K followers, 15.2K engagements


"What is a DDoS attack and how does it work"  
[X Link](https://x.com/cyber_razz/status/2016804746082881725)  2026-01-29T09:24Z 35.7K followers, [----] engagements


"Linux distributions if they were students"  
[X Link](https://x.com/cyber_razz/status/2016837791129174351)  2026-01-29T11:36Z 36.8K followers, 52.3K engagements


"And then your Linux machine breaks"  
[X Link](https://x.com/cyber_razz/status/2016886516069372259)  2026-01-29T14:49Z 36.9K followers, 65.1K engagements


"Chown vs chmod I think this illustration does justice wbu"  
[X Link](https://x.com/cyber_razz/status/2016886676191076725)  2026-01-29T14:50Z 36.9K followers, [----] engagements


"Do you know hackers can replace the sudo command with a fake one that steals your password"  
[X Link](https://x.com/cyber_razz/status/2016921669730713991)  2026-01-29T17:09Z 35.9K followers, 42.9K engagements


"Yes that actually checks out. Google Maps doesnt see traffic; it infers it. If a large number of smartphones are: - in the same area - moving slowly - with location services enabled Googles algorithm assumes congestion. So when he pulled a wagon loaded with approximately [--] phones down an empty street Maps interpreted it as: Wow a lot of people are stuck here. There were no hacks or access to Googles systems involved. It was simply feeding the algorithm fake signals. Thats why your last line is spot on: Google essentially tracks you. Not individually in a creepy way but collectively. Your"  
[X Link](https://x.com/cyber_razz/status/2016940157962756515)  2026-01-29T18:23Z 35.7K followers, [----] engagements


"Ill stick to Kali tbh"  
[X Link](https://x.com/cyber_razz/status/2017178501929988430)  2026-01-30T10:10Z 36.7K followers, [----] engagements


"How DNS works"  
[X Link](https://x.com/cyber_razz/status/2017179919105622516)  2026-01-30T10:15Z 37.1K followers, [----] engagements


"Do you know hackers dont need to stay logged in to keep control of a Linux server Once they leave behind access keys they can come back anytime silently"  
[X Link](https://x.com/cyber_razz/status/2017233065576182119)  2026-01-30T13:46Z 37.6K followers, 86.7K engagements


"More jobs to cybersecurity professionals"  
[X Link](https://x.com/cyber_razz/status/2017244664961569123)  2026-01-30T14:33Z 37.5K followers, [----] engagements


"Learn Linux first"  
[X Link](https://x.com/cyber_razz/status/2017250886481756591)  2026-01-30T14:57Z 37.5K followers, 20.8K engagements


"Types of Malwares"  
[X Link](https://x.com/cyber_razz/status/2017309858840629399)  2026-01-30T18:52Z 37.5K followers, [----] engagements


"A Linux administrator wants to schedule a script to run every day at 2:00 AM. Which tool should be used A. at B. cron C. systemctl D. nohup"  
[X Link](https://x.com/cyber_razz/status/2017311330076606726)  2026-01-30T18:57Z 36.8K followers, 55.4K engagements


"Legendary command Its been rumored to this day that no one knows what this command does Especially if you add sudo before running it"  
[X Link](https://x.com/cyber_razz/status/2017331912063254608)  2026-01-30T20:19Z 36.2K followers, 11.5K engagements


"That device on his back isnt a weapon; its electronic security gear. The antennas are used for RF control essentially managing wireless signals around high-risk events. The primary reasons for its use are: - Blocking phone calls mobile data Wi-Fi and Bluetooth. - Preventing remote-triggered threats. - Stopping unauthorized recordings or live streams. - Limiting coordination between hostile actors. Each antenna targets a different frequency band providing wider coverage. Youll typically see this device at: - VIP movements. - Political or religious gatherings. - High-security public events."  
[X Link](https://x.com/cyber_razz/status/2017487498293719171)  2026-01-31T06:37Z 37.1K followers, 23.2K engagements


"Types of Networks"  
[X Link](https://x.com/cyber_razz/status/2017513821930201093)  2026-01-31T08:22Z 37.5K followers, [----] engagements


"Hmmmm.I see"  
[X Link](https://x.com/cyber_razz/status/2017527474104467863)  2026-01-31T09:16Z 36.7K followers, 45.9K engagements


"The Pros = Cons"  
[X Link](https://x.com/cyber_razz/status/2017548156813131784)  2026-01-31T10:38Z 37.2K followers, 49.4K engagements


"Wait a minute"  
[X Link](https://x.com/cyber_razz/status/2017582677872763295)  2026-01-31T12:56Z 37.5K followers, 21.3K engagements


"Internet explorer isnt that bad anymore Right Guess the imposter 😭 https://t.co/eblkLfQLZq Guess the imposter 😭 https://t.co/eblkLfQLZq"  
[X Link](https://x.com/cyber_razz/status/2017583534668423668)  2026-01-31T12:59Z 37.5K followers, [----] engagements


"I wonder what cat9 Ethernet cables would look like"  
[X Link](https://x.com/cyber_razz/status/2017588515257639368)  2026-01-31T13:19Z 36.7K followers, [----] engagements


"A static IP address is one that doesnt change. Once its given to a device it stays the same every time the device connects to the network unless someone changes it themselves. So to put it simply: Static IP = a fixed permanent address Dynamic IP = a temporary address that can change Why we use static IPs: Hosting servers or websites Remote access (SSH VPN CCTV home labs) Network devices like printers routers firewalls Basically anything that needs to be consistently reachable The downside: *It costs more (from ISPs) *Its a bit easier to target if its exposed to the internet *It needs manual"  
[X Link](https://x.com/cyber_razz/status/2017590435326181461)  2026-01-31T13:26Z 37.5K followers, [----] engagements


"Good old days I see this now and wonder how much vulnerable was Facebook in its early post-production days"  
[X Link](https://x.com/cyber_razz/status/2017635879439757373)  2026-01-31T16:27Z 36.7K followers, [----] engagements


"Privilege escalation using Linux capabilities"  
[X Link](https://x.com/cyber_razz/status/2017659146846249018)  2026-01-31T18:00Z 37.7K followers, 26.4K engagements


"A network administrator needs to allow private IP addresses inside a network to access the internet using a single public IP address. Which technology BEST accomplishes this A. Static routing B. NAT C. VLAN D. ARP"  
[X Link](https://x.com/cyber_razz/status/2017682902142661100)  2026-01-31T19:34Z 37.5K followers, 20.1K engagements


"Its a new month already 1/12 Hope yall are working on crushing those goals you set out to achieve"  
[X Link](https://x.com/cyber_razz/status/2017827837680460174)  2026-02-01T05:10Z 37.4K followers, [----] engagements


"Were the Epstein files finally released"  
[X Link](https://x.com/cyber_razz/status/2017841684520882321)  2026-02-01T06:05Z 37.4K followers, [----] engagements


"Time to make the change πŸ™‚"  
[X Link](https://x.com/cyber_razz/status/2017900050421015007)  2026-02-01T09:57Z 37.5K followers, [----] engagements


"IPv4 Classes & Subnet Mask"  
[X Link](https://x.com/cyber_razz/status/2017921516768227660)  2026-02-01T11:22Z 37.6K followers, [----] engagements


"Windows has a memory and it never forgets. Every USB device youve ever plugged into a Windows PC gets logged including flash drives phones keyboards and even after you remove them. Unplugging doesnt erase the data; Windows keeps a record of drivers stability and forensics. Your system remembers the device type vendor serial number and the first and last time it was connected. So if you think youve removed a device Windows still has the receipts. Windows keeps a permanent record of every USB device youve ever plugged in even after its removed. Windows keeps a permanent record of every USB"  
[X Link](https://x.com/cyber_razz/status/2017922393180713417)  2026-02-01T11:26Z 37.5K followers, [----] engagements


"What is Kali Linux to you"  
[X Link](https://x.com/cyber_razz/status/2017960604951044458)  2026-02-01T13:57Z 37.5K followers, 12K engagements


"What did you achieve in January"  
[X Link](https://x.com/cyber_razz/status/2017983317300162750)  2026-02-01T15:28Z 37.5K followers, [----] engagements


"Tbh just felt like making this"  
[X Link](https://x.com/cyber_razz/status/2018013164323905559)  2026-02-01T17:26Z 37.5K followers, [----] engagements


"Linux will prolly run on the static electricity from socks"  
[X Link](https://x.com/cyber_razz/status/2018039202886152632)  2026-02-01T19:10Z 37.5K followers, 25.5K engagements


"Good post overall but a few important clarifications on SSD vs HDD storage πŸ‘‡ While the risk of data decay in SSDs is indeed a concern its often exaggerated. The [--] year unpowered figure is based on JEDECs worst-case specifications which consider high wear and operating temperatures of around 30C. In reality many consumer SSDs can retain data for several years especially if they are lightly used and stored in a cool environment. Data loss in SSDs is not typically sudden or complete. The degradation process is gradual and robust ECC (Error Correction Code) and controller safeguards often"  
[X Link](https://x.com/cyber_razz/status/2018068613186367634)  2026-02-01T21:07Z 36.1K followers, [----] engagements


"The best of tools are open source"  
[X Link](https://x.com/cyber_razz/status/2018225981551476776)  2026-02-02T07:32Z 37.8K followers, 13.7K engagements


"Ever wondered why iPhone screenshots never reveal your password πŸ‘€ Apple doesnt simply blur it after the fact. Its a much more sophisticated approach. When you type a password on iOS its entered into a secure text field. The actual characters are never displayed on the screen. Only dots () are visually present. Therefore when you take a screenshot: iOS can only capture whats rendered And the password is not present to be captured Additionally iOS designates sensitive UI elements (passwords OTPs Apple Pay Face ID) as non-capturable. Even screen recordings and screen sharing cannot detect them."  
[X Link](https://x.com/cyber_razz/status/2018231323047886992)  2026-02-02T07:53Z 37.7K followers, 461.7K engagements


"Who can tell me what this is"  
[X Link](https://x.com/cyber_razz/status/2018252893376184709)  2026-02-02T09:19Z 37.4K followers, 27.2K engagements


"Lisanil-gaib"  
[X Link](https://x.com/cyber_razz/status/2018255802968973560)  2026-02-02T09:30Z 37.4K followers, [----] engagements


"It really be like this"  
[X Link](https://x.com/cyber_razz/status/2018282040991351228)  2026-02-02T11:15Z 37.5K followers, [----] engagements


"Realest meme youd see today"  
[X Link](https://x.com/cyber_razz/status/2018282164354265153)  2026-02-02T11:15Z 37.5K followers, 20.2K engagements


"@segoslavia 😭I did without a sandbox Seems safe shaa Scanned it later and didnt download a thing from there"  
[X Link](https://x.com/cyber_razz/status/2018302552001941745)  2026-02-02T12:36Z 37.7K followers, [---] engagements


"A PC that was advertised with 32GB RAM arrived with 48GB and everyone immediately assumed it was a mistake. However theres a possibility that this isnt the case. Many prebuilt systems are marketed with a base configuration of 32GB RAM but sellers often add extra RAM discreetly for various reasons: - Leftover stock - Small performance upgrades - Mixed DIMMs (216 + [--] = 48GB) - Bundles that arent reflected in the listing Its important to note that marketing pages often lag behind actual builds. As long as the system boots properly runs smoothly and the RAM is compatible in terms of speed and"  
[X Link](https://x.com/cyber_razz/status/2018550517949964499)  2026-02-03T05:02Z 37.5K followers, 370.4K engagements


"Ive answered this before but it wouldnt hurt to go again So why do most hackers and unauthorized groups use Tor Its not because it makes them invisible. Instead it raises the cost of tracking them. Tor routes your traffic through multiple relays across different countries so the destination doesnt see your real IP address. This alone disrupts the easiest way for defenders to attribute your actions: quick attribution. Consider a real-life scenario: Imagine accessing a misconfigured API or admin panel from your home IP address. A single log entry later your ISP city and approximate location are"  
[X Link](https://x.com/cyber_razz/status/2018565427375313146)  2026-02-03T06:01Z 37.5K followers, 15.8K engagements


"I hate both types"  
[X Link](https://x.com/cyber_razz/status/2018600452796158088)  2026-02-03T08:20Z 37.5K followers, [----] engagements


"You see a .jpg file in the URL and you click Save Image. Your PC responds with WEBP file. Why Because what you see in the address bar isnt always what you receive. Heres what happens: - Your browser requests the image from the server. - The server checks your browser. - Then it decides to send you a WEBP file instead. Why WEBP - It has a smaller file size. - It loads faster. - It maintains the same (or even better) quality. - It reduces the bandwidth cost for the website. So even if the URL ends in .jpg the server can silently convert it to .webp before sending it. Heres a simple networking"  
[X Link](https://x.com/cyber_razz/status/2018634301881844060)  2026-02-03T10:34Z 35.7K followers, 10.3K engagements


"Money can't buy you time but it can buy you an SSD. And that's basically the same thing right"  
[X Link](https://x.com/cyber_razz/status/2018651777420369967)  2026-02-03T11:44Z 37.7K followers, [----] engagements


"Do you get it"  
[X Link](https://x.com/cyber_razz/status/2018663519722627523)  2026-02-03T12:31Z 37.5K followers, 70.8K engagements


"Someone built a website to avoid black people 😭😭😭 http://peaceandquiet.io http://peaceandquiet.io"  
[X Link](https://x.com/cyber_razz/status/2018693063657275722)  2026-02-03T14:28Z 37.5K followers, [----] engagements


"Is it even possible Short answer: No. Long answer (simple physics πŸ‘‡): Wi-Fi operates on radio waves (2.4GHz or 5GHz). The human body is primarily composed of water which can absorb some of this radio energy. Therefore yes a person can slightly weaken a Wi-Fi signal if they are: - Positioned directly next to the router - Standing between the router and their device - The signal is already weak However heres the crucial point people often overlook: Wi-Fi doesnt travel in a straight line. It spreads bounces reflects and reaches your device from multiple paths. Therefore one person cannot block"  
[X Link](https://x.com/cyber_razz/status/2018730258636087803)  2026-02-03T16:56Z 37.7K followers, [----] engagements


"Annoying everytime 😭"  
[X Link](https://x.com/cyber_razz/status/2018747015975649445)  2026-02-03T18:02Z 37.5K followers, [----] engagements


"TeamViewer got me hacked ❌ Heres what actually happened: - I installed TeamViewer. - I reused the same old password. - That password had leaked from another website. - The attacker tried it on TeamViewer. - The login worked. Thats not hacking to be precise. Thats credential stuffing. There was no exploit. There was no breach. It was just logging in with a stolen key. Remote access tools are often blamed because when theyre abused its noticeable cursor movement files disappearing and panic everywhere. But its like this: Leaving your house key under the mat. A robber uses it. Then you say the"  
[X Link](https://x.com/cyber_razz/status/2018779137260106013)  2026-02-03T20:10Z 37.5K followers, [----] engagements


"You know what I respect this"  
[X Link](https://x.com/cyber_razz/status/2018809568202207584)  2026-02-03T22:11Z 37.5K followers, [----] engagements


"@app_settings If you just added spacex to your tweet the like changes Test it out on my reply"  
[X Link](https://x.com/cyber_razz/status/2018928765171015981)  2026-02-04T06:05Z 35.7K followers, [---] engagements


"Linux says Disk Space Low but the math aint mathing. You check: df -h 100% full du -sh / 20GB used on a 100GB disk So where did the other 80GB go πŸ‘€ Deleted files Nope. Hidden mounts Nada. Then you run: df -i 100% And violla there it is You ran out of inodes. So what actually happened To understand the root cause lets delve into the mechanics of inodes. Each file regardless of its size requires an inode to be stored on the disk. When the inode table reaches its capacity the filesystem becomes unable to allocate new files even if there are ample free disk blocks available. Common applications"  
[X Link](https://x.com/cyber_razz/status/2018961074700067201)  2026-02-04T08:13Z 36.7K followers, 19K engagements


"Is learning a programming language necessary for someone trying to break into cybersecurity"  
[X Link](https://x.com/cyber_razz/status/2018964674390179888)  2026-02-04T08:27Z 37.5K followers, [----] engagements


"How Botnet works for Dummies"  
[X Link](https://x.com/cyber_razz/status/2018986102166847605)  2026-02-04T09:52Z 37.5K followers, 19.3K engagements


"There are levels to this sh*t"  
[X Link](https://x.com/cyber_razz/status/2019016991353266642)  2026-02-04T11:55Z 37.6K followers, 30.5K engagements


"A network administrator wants to reduce broadcast traffic and improve performance within a large Layer [--] network. Which solution BEST accomplishes this A. Implement VLANs B. Increase link bandwidth C. Enable port mirroring D. Use static IP addressing"  
[X Link](https://x.com/cyber_razz/status/2019142052886482948)  2026-02-04T20:12Z 37.5K followers, [----] engagements


":wq 😭 Every Vim user has this character arc. https://t.co/iaF2uzNjfm Every Vim user has this character arc. https://t.co/iaF2uzNjfm"  
[X Link](https://x.com/cyber_razz/status/2019142919970779259)  2026-02-04T20:16Z 37.4K followers, [----] engagements


"My DMs are flooded with messages like I want to start my cybersecurity journey. How can I begin Answer: Start from my pinned tweet on my profile. Good luck ❀"  
[X Link](https://x.com/cyber_razz/status/2019169700974854306)  2026-02-04T22:02Z 37.5K followers, [----] engagements


"What did I do wrong"  
[X Link](https://x.com/cyber_razz/status/2019202956071989273)  2026-02-05T00:14Z 37.6K followers, [----] engagements


"Tell me What are you learning today"  
[X Link](https://x.com/cyber_razz/status/2019338398662816140)  2026-02-05T09:12Z 37.5K followers, [----] engagements


"😭witnessed this on my TL"  
[X Link](https://x.com/cyber_razz/status/2019344039913615690)  2026-02-05T09:35Z 37.5K followers, [----] engagements


"Types of Servers"  
[X Link](https://x.com/cyber_razz/status/2019353386211242060)  2026-02-05T10:12Z 37.7K followers, 10.1K engagements


"Learnt the basics Worked on labs Documented some Then start applying pookie πŸ˜—"  
[X Link](https://x.com/cyber_razz/status/2019371921629196695)  2026-02-05T11:25Z 37.5K followers, [----] engagements


"Just [---] years left"  
[X Link](https://x.com/cyber_razz/status/2019383743950077992)  2026-02-05T12:12Z 37.5K followers, [----] engagements


"The 3-2-1 Rule Effective against ransomware attacks"  
[X Link](https://x.com/cyber_razz/status/2019384547234968042)  2026-02-05T12:16Z 37.6K followers, [----] engagements


"@sebp888 @TutaPrivacy Can they"  
[X Link](https://x.com/cyber_razz/status/2019429444071641404)  2026-02-05T15:14Z 36.4K followers, [----] engagements


"I know someone that is surviving off energy drinks"  
[X Link](https://x.com/cyber_razz/status/2019434246629478410)  2026-02-05T15:33Z 37.5K followers, 37.1K engagements


"@helayxv Lmao you speak and type in English Is that the language of your ancestors"  
[X Link](https://x.com/cyber_razz/status/2019661332598124611)  2026-02-06T06:35Z 36.8K followers, [----] engagements


"Wanna see which of your LinkedIn connections appear in the Epstein files πŸ‘‰ http://github.com/cfinke/EpsteIn http://github.com/cfinke/EpsteIn"  
[X Link](https://x.com/cyber_razz/status/2019661772903661603)  2026-02-06T06:37Z 36.7K followers, [----] engagements


"Fun fact: The interview is tougher than the actual job"  
[X Link](https://x.com/cyber_razz/status/2019693812134867293)  2026-02-06T08:45Z 36.6K followers, [----] engagements


"You might be wondering how Ans: tailor different resumes to your different skills"  
[X Link](https://x.com/cyber_razz/status/2019696604530549079)  2026-02-06T08:56Z 37.1K followers, [----] engagements


"Dont lie will you install"  
[X Link](https://x.com/cyber_razz/status/2019704718772306251)  2026-02-06T09:28Z 37.5K followers, [----] engagements


"Can someone explain how this is possible"  
[X Link](https://x.com/cyber_razz/status/2019760385302126624)  2026-02-06T13:09Z 37.6K followers, 23.8K engagements


"Just give me the flipper zero"  
[X Link](https://x.com/cyber_razz/status/2019785890084610510)  2026-02-06T14:50Z 37.7K followers, 30.1K engagements


"Lets not forget the OG notepad VS code is still the best. https://t.co/e1wjDZNIHf VS code is still the best. https://t.co/e1wjDZNIHf"  
[X Link](https://x.com/cyber_razz/status/2019798333489869134)  2026-02-06T15:40Z 37.4K followers, [----] engagements


"Thats all it is to that"  
[X Link](https://x.com/cyber_razz/status/2019844759624511875)  2026-02-06T18:44Z 37.5K followers, [----] engagements


"A Linux administrator wants to change the ownership of a file named report.txt to user alice and group finance. Which command BEST accomplishes this A. chmod alice:finance report.txt B. chown alice:finance report.txt C. usermod alice finance report.txt D. groupadd finance report.txt"  
[X Link](https://x.com/cyber_razz/status/2019862318402724202)  2026-02-06T19:54Z 37.6K followers, 12.3K engagements


"In master ugwes voice it is time"  
[X Link](https://x.com/cyber_razz/status/2020109751141437506)  2026-02-07T12:17Z 37.7K followers, 26.6K engagements


"Humans will forever be the weakest and easiest link"  
[X Link](https://x.com/cyber_razz/status/2020110043060854938)  2026-02-07T12:19Z 37.7K followers, [----] engagements


"Has anyone here experienced visiting a data center That place was the most beautiful place in existence (atleast to me) we sadly werent allowed to record anything due to security reasons though. One of my many dreams is to work in one. https://t.co/3wpl6emgvb https://t.co/3wpl6emgvb"  
[X Link](https://x.com/cyber_razz/status/2020219915286802910)  2026-02-07T19:35Z 37K followers, [----] engagements


"Running cipher /w on an SSD is essentially self-sabotage. Heres why: cipher /w was designed for older hard disk drives (HDDs). Its purpose is to overwrite free space multiple times rendering deleted files unrecoverable. However this logic doesnt apply to SSDs. SSDs have several limitations: - Limited write cycles - Wear leveling (they strategically rearrange writes) - Hidden flash blocks that are inaccessible directly When you execute cipher /w on an SSD youre not actually cleaning anything. Instead youre forcing the SSD to perform unnecessary and excessive writes. The consequences of this"  
[X Link](https://x.com/cyber_razz/status/2020423318487138363)  2026-02-08T09:03Z 37.5K followers, [----] engagements


"Why cant data centers just use dirty water Why does it have to be clean drinking water Short answer: Servers arent rice so they dont need water. Long answer: Most data centers dont dump water onto servers. Instead they use it for cooling systems like chillers cooling towers and heat exchangers. However those systems hate dirty water. Dirty or untreated water contains: - Minerals that cause scale buildup - Dirt and sand that clog pipes - Microbes that lead to corrosion and biofouling These issues reduce heat transfer damage equipment and cause downtime which is the worst thing that can happen"  
[X Link](https://x.com/cyber_razz/status/2020426550647165357)  2026-02-08T09:16Z 37.5K followers, 28.4K engagements


"There was a time when everything functioned flawlessly on localhost. However production laughed and ignited a firestorm. The same code the same logic yet the outcome was drastically different. Why Because localhost is a deceptive illusion. On your machine you have the right operating system the correct library versions the appropriate ports and the ideal environment variables. You have the energy to believe that your code works perfectly. But production is a different beast altogether. It operates on a different operating system relies on different dependencies has different configurations"  
[X Link](https://x.com/cyber_razz/status/2020436966534201562)  2026-02-08T09:58Z 37.7K followers, 50.8K engagements


"@paul_nets Ding ding ding πŸ›Ž"  
[X Link](https://x.com/cyber_razz/status/2020440490168971505)  2026-02-08T10:12Z 37.2K followers, [---] engagements


"Were you this old"  
[X Link](https://x.com/cyber_razz/status/2020451611563131026)  2026-02-08T10:56Z 37.6K followers, [----] engagements


"The 2g days"  
[X Link](https://x.com/cyber_razz/status/2020469389934334315)  2026-02-08T12:06Z 37.4K followers, [----] engagements


"Is there an option to permanently turn this sh*t off You can be using your phone normally and mistakenly accept this thing"  
[X Link](https://x.com/cyber_razz/status/2020470827095839126)  2026-02-08T12:12Z 37.7K followers, [----] engagements


"In recent news πŸ˜‚"  
[X Link](https://x.com/cyber_razz/status/2020475597630095481)  2026-02-08T12:31Z 37.7K followers, 19.5K engagements


"Facts no cap"  
[X Link](https://x.com/cyber_razz/status/2020486512979083314)  2026-02-08T13:14Z 37.5K followers, [----] engagements


"@z_alijonov iPhone X (10)"  
[X Link](https://x.com/cyber_razz/status/2020499171112022111)  2026-02-08T14:05Z 37.2K followers, [--] engagements


"The Linux Police"  
[X Link](https://x.com/cyber_razz/status/2020553213041058091)  2026-02-08T17:40Z 37.7K followers, 13.6K engagements


"RAM-only VPN servers mean no logs right Well Not exactly. RAM-only (diskless) servers reduce whats stored long-term but theyre not forensics-proof. Heres why: RAM is not invisible; its volatile. Even while the server is running it retains: active VPN sessions temporary encryption keys connection states network buffers If access occurs before a reboot memory can be dumped and analyzed. The phrase no disk does not prevent live memory forensics. Most VPNs operate on cloud or hosted infrastructure. This means: hypervisors can take snapshots of VM memory providers can log network metadata traffic"  
[X Link](https://x.com/cyber_razz/status/2020723024224219323)  2026-02-09T04:54Z 37.7K followers, 36.8K engagements


"@chidirolex Mark my words Im gonna qoute this someday"  
[X Link](https://x.com/cyber_razz/status/2020732682783608945)  2026-02-09T05:33Z 37.5K followers, [---] engagements


"Windscribe ended up mostly fine because the data on those seized servers wasnt actionable: the timestamps they kept had no source IPs destinations or traffic logs so retroactive correlation was technically possible but practically useless without perfect ISP and exit visibility. They took the hit reputationally owned the mistake and fixed the underlying issue by moving to diskless infrastructure. https://twitter.com/i/web/status/2020774050071486528 https://twitter.com/i/web/status/2020774050071486528"  
[X Link](https://x.com/cyber_razz/status/2020774050071486528)  2026-02-09T08:17Z 37.6K followers, [----] engagements


"@DigitalVagrant @PabloDeLaRed ❀thanks fam"  
[X Link](https://x.com/cyber_razz/status/2020779430235582651)  2026-02-09T08:38Z 37.5K followers, [---] engagements


"Every termux user used tool this then"  
[X Link](https://x.com/cyber_razz/status/2020801501581480359)  2026-02-09T10:06Z 37.7K followers, [----] engagements


"Not really. Cold boot mitigations only help against physical powered off attacks where RAM decay is the limiting factor. They do nothing against live memory dumps or hypervisor level snapshots where RAM is captured intact with keys sessions and buffers still valid. If the host or cloud provider controls the hypervisor the guest OS loses by default At best short lived keys and minimal in RAM state reduce impact but they dont prevent the actual extraction. https://twitter.com/i/web/status/2020809781494096233 https://twitter.com/i/web/status/2020809781494096233"  
[X Link](https://x.com/cyber_razz/status/2020809781494096233)  2026-02-09T10:39Z 37.7K followers, [----] engagements


"Even if you arent intending on becoming something as sophisticated as a network engineer Learn NETWORKING Just for the fun of it You wont ever regret that decision"  
[X Link](https://x.com/cyber_razz/status/2020974661828477215)  2026-02-09T21:34Z 37.7K followers, [----] engagements


"When calculators were introduced people panicked. Teachers predicted that students would cease to think. Consequently schools banned calculators which I recall was a significant challenge for our school to adapt to even at the high school level. Real math was believed to be performed manually. So what really happened Calculators did not replace mathematicians. Instead they replaced individuals whose sole purpose was to perform arithmetic calculations. The skill evolved from calculation to thinking from execution to judgment. Fast forward to the era of artificial intelligence. Security"  
[X Link](https://x.com/cyber_razz/status/2021124432018759785)  2026-02-10T07:29Z 37.7K followers, [----] engagements


"Been a real one since birth"  
[X Link](https://x.com/cyber_razz/status/2021214163226255602)  2026-02-10T13:26Z 37.7K followers, [----] engagements


"@elormkdaniel πŸ˜”Make I paste aza"  
[X Link](https://x.com/cyber_razz/status/2021240618647711878)  2026-02-10T15:11Z 37.7K followers, [--] engagements


"Non-arguable fact: PYTHON SOLOS"  
[X Link](https://x.com/cyber_razz/status/2021295047090581638)  2026-02-10T18:47Z 37.8K followers, [----] engagements


"@grok @micheal_ws18 @remarks How much does X lose from paying our creators out of that revenue"  
[X Link](https://x.com/cyber_razz/status/2021742106914529553)  2026-02-12T00:24Z 37.7K followers, [--] engagements


"How to install Linux as a virtual machine locally on your iPad or iPhone Who here wants to learn how to install a fully functional Linux machine(any distro) on their iPad or iPhones Who here wants to learn how to install a fully functional Linux machine(any distro) on their iPad or iPhones"  
[X Link](https://x.com/cyber_razz/status/2017629041365319707)  2026-01-31T16:00Z 37.9K followers, 256.7K engagements


"SOC level [--] Tools & Technologies"  
[X Link](https://x.com/cyber_razz/status/2019843910961623202)  2026-02-06T18:41Z 37.9K followers, 18.2K engagements


"Due to Linux case sensitivity I create different directories with same names eg : Downloads DownloadSDOwnloadsdownloadsdoWnloads dowNloads etc"  
[X Link](https://x.com/cyber_razz/status/2020197986740105639)  2026-02-07T18:08Z 37.9K followers, 38.5K engagements


"Visual representation of how virtual machines work"  
[X Link](https://x.com/cyber_razz/status/2020198183947874366)  2026-02-07T18:09Z 37.9K followers, 155.3K engagements


"Why cybersecurity"  
[X Link](https://x.com/cyber_razz/status/2021200639997640775)  2026-02-10T12:32Z 37.9K followers, [----] engagements


"Forever living these illustrations 😭"  
[X Link](https://x.com/cyber_razz/status/2021239125806862651)  2026-02-10T15:05Z 37.9K followers, 118.6K engagements


"Which protocol is responsible for automatically assigning IP addresses to devices on a network A. DNS B. DHCP C. ARP D. ICMP"  
[X Link](https://x.com/cyber_razz/status/2021335857781932300)  2026-02-10T21:29Z 37.9K followers, 62.6K engagements


"A company wants to prevent attackers from reusing captured authentication traffic to gain unauthorized access to a system. Which security mechanism BEST protects against this type of attack A. Encryption B. Salting C. Nonce D. Hashing"  
[X Link](https://x.com/cyber_razz/status/2021667753166614877)  2026-02-11T19:28Z 37.9K followers, 11K engagements


"Caption this"  
[X Link](https://x.com/cyber_razz/status/2021874253260333401)  2026-02-12T09:09Z 37.9K followers, [----] engagements


"What kind of a Linux user are you"  
[X Link](https://x.com/cyber_razz/status/2022204392783720671)  2026-02-13T07:01Z 37.9K followers, 42.9K engagements

Limited data mode. Full metrics available with subscription: lunarcrush.com/pricing

@cyber_razz Avatar @cyber_razz Abdulkadir | Cybersecurity

Abdulkadir | Cybersecurity posts on X about how to, ip, linux, tools the most. They currently have [------] followers and [---] posts still getting attention that total [-------] engagements in the last [--] hours.

Engagements: [-------] #

Engagements Line Chart

  • [--] Week [---------] +8.30%
  • [--] Month [----------] +411%
  • [--] Months [----------] +1,081%
  • [--] Year [----------] +2,089%

Mentions: [---] #

Mentions Line Chart

  • [--] Week [---] +104%
  • [--] Month [---] +157%
  • [--] Months [-----] +38%
  • [--] Year [-----] +393%

Followers: [------] #

Followers Line Chart

  • [--] Week [------] +6%
  • [--] Month [------] +23%
  • [--] Months [------] +195%
  • [--] Year [------] +609%

CreatorRank: [------] #

CreatorRank Line Chart

Social Influence

Social category influence technology brands 4.67% social networks 2.67% finance 2% stocks 1.67% products 1.33% celebrities 1% countries 0.33%

Social topic influence how to 4%, ip #594, linux #5, tools 3.67%, command #728, if you 2.33%, in the 1.67%, link 1.67%, systems 1.67%, level #1617

Top accounts mentioned or mentioned by @grok @timetherington @tj18011800 @tanmoy_og @pawel_lasek @iamibnsanusi10 @dangitman50 @david_abasi @paul_nets @abaways @stanislawweston @cyberrazz @segoslavia @sebp888 @aitrendzz @digitalvagrant @pablodelared @ark_aegis @likhontamim @dingbangfook

Top assets mentioned Alphabet Inc Class A (GOOGL) Microsoft Corp. (MSFT)

Top Social Posts

Top posts by engagements in the last [--] hours

"Cybersecurity Roadmap: Step-by-Step Guide for Aspiring Professionals Embarking on a cybersecurity journey can be challenging but with the right plan you can progress steadily and achieve your goals. Based on my personal journey as a penetration tester in training heres a roadmap tailored to aspiring cybersecurity professionals infused with my insights and practical experiences. A thread πŸ“·"
X Link 2025-01-07T08:26Z 37.9K followers, 278.3K engagements

"NETWORKING KNOWLEDGE CHECKPOINT Can these two IP addresses communicate with each other directly (Without a router ) 192.168.10.1 & 192.168.2.1 YES or NO"
X Link 2025-01-19T16:55Z 37.9K followers, 247.6K engagements

"NETWORKING KNOWLEDGE CHECKPOINT We have 220.50.35.0/25 ip address. In the company we have [--] FLOORS for each floor we will use a different subnet. What is the THIRD FLOORS NETWORK ADDRESS ) 220.50.35.8 b) 220.50.35.32 c) 220.50.35.0 d) 220.50.35.64 e) 220.50.35.128"
X Link 2025-01-22T09:40Z 37.9K followers, 158.3K engagements

"MUST KNOW LINUX BASIC COMMANDS"
X Link 2025-04-04T12:27Z 37.9K followers, 142.7K engagements

"I setup a honeypot on the cloud and in less than [--] hours Ive had over 52k+ attacks on it crrraaaazzzzyyyy hackers are really out there trying to access everything and anything accessible Ill qoute this and talk about the project in full soon"
X Link 2025-05-25T14:18Z 37.9K followers, 110.6K engagements

"HOW I SETUP A HONEYPOT ON CLOUD AND RECORDED 75K+ BRUTE-FORCE ATACKS IN [--] HOURS & HOW I MAPPED EVERYONE OF THEM WITH MICROSOFT SENTINEL (A thread 🧡) I exposed a Windows VM to the internet. Waited. Thousands of brute-force attacks came flooding in. So I built a custom attack map in Microsoft Sentinel. Heres the exact process step-by-step I setup a honeypot on the cloud and in less than [--] hours Ive had over 52k+ attacks on it crrraaaazzzzyyyy hackers are really out there trying to access everything and anything accessible Ill qoute this and talk about the project in full soon I setup a"
X Link 2025-05-26T14:13Z 37.9K followers, 103.8K engagements

"AI tools for learning 1.cybersecurity [--]. programming [--]. Networking"
X Link 2025-08-27T17:19Z 37.9K followers, 81.2K engagements

"Cybersecurity as a service (CSaaS)"
X Link 2025-08-31T14:14Z 37.9K followers, 78.2K engagements

"Networking Physical Tools"
X Link 2025-08-31T18:26Z 37.9K followers, 29.2K engagements

"GITHUB CHEAT SHEET"
X Link 2025-09-07T14:22Z 37.9K followers, 118.3K engagements

"Computer Networking Note This helped me when I was learning too Bookmark and use ❀"
X Link 2025-09-08T13:58Z 37.9K followers, 149.9K engagements

"The chart is a side-by-side comparison showing that for every paid Al tool there is a free alternative that can perform a similar job. This helps people save money while still getting work done with Al tools. #copied"
X Link 2025-09-13T11:21Z 37.9K followers, 83.8K engagements

"ROUTING VS SWITCHING"
X Link 2025-09-15T12:01Z 37.9K followers, 23K engagements

"15 free Cybersecurity Tools"
X Link 2025-09-16T13:06Z 37.9K followers, 42.1K engagements

"LINUX PATH CHEATSHEET"
X Link 2025-09-17T11:21Z 37.9K followers, 51.6K engagements

"Computer Networking Notes Computer Networking Note This helped me when I was learning too Bookmark and use ❀ https://t.co/Gv8PoVEr4u Computer Networking Note This helped me when I was learning too Bookmark and use ❀ https://t.co/Gv8PoVEr4u"
X Link 2025-09-17T14:55Z 37.9K followers, 50.8K engagements

"πŸ‘€ Im dropping something BIG for my followers soon watch my page"
X Link 2025-09-19T18:20Z 37.9K followers, 124.7K engagements

"TYPES OF APIs AND THEIR USE CASES"
X Link 2025-09-19T18:59Z 37.9K followers, 66.2K engagements

"TOP [--] CYBERSECURITY TOOLS IN 2025"
X Link 2025-09-19T18:59Z 37.9K followers, 33.8K engagements

"HELLO CYBER FRIENDS We are giving away FREE access to a Cisco DevOps course πŸŽ‰ Only [----] people will get in Youll learn: Cisco DevOps fundamentals CI/CD pipelines Automation & Infrastructure as Code Hands-on labs to sharpen your skills To grab your spot: βœ… Follow me βœ… Turn on post notifications βœ… Comment DevOps βœ… Retweet this post An update will follow in the next [--] hours πŸ‘€ Im dropping something BIG for my followers soon watch my page πŸ‘€ Im dropping something BIG for my followers soon watch my page"
X Link 2025-09-19T19:49Z 37.9K followers, 148.8K engagements

"6 TYPES OF API TESTING"
X Link 2025-09-23T14:34Z 37.9K followers, 46.7K engagements

"LINUX SYSADMIN TOOLS"
X Link 2025-09-27T12:20Z 37.9K followers, 46.4K engagements

"Networking Cheat sheet"
X Link 2025-09-29T11:44Z 37.9K followers, 30.4K engagements

"Windows Shortcut Key"
X Link 2025-09-30T11:21Z 37.9K followers, 43.9K engagements

"All Listed SOC Free certificates"
X Link 2025-09-30T13:52Z 37.9K followers, 62.2K engagements

"Ill qoute with the link within [--] hours"
X Link 2025-10-03T20:59Z 37.9K followers, 58.4K engagements

"IP command sheet"
X Link 2025-10-04T16:10Z 37.9K followers, 43.2K engagements

"🚨 FREE Bug Bounty Course Drop From Zero Hero in Bug Bounty Hunting πŸžπŸ’» Im dropping the FULL course link [--] hours from now and as always itll be 100% FREE 🎁 Want early access when it goes live πŸ” Heres how to lock in your spot [--] Follow me [--] Turn on post notifications πŸ”” [--] Retweet this post 4Comment LOCKED IN Lets build the next wave of bug bounty hunters πŸ‘Š @cyber_razz"
X Link 2025-10-08T17:27Z 37.9K followers, 88.5K engagements

"As promised heres the link πŸ”—: Bug bounty course from zero to hero Enjoy 🫢 https://drive.google.com/drive/u/0/folders/1t-hTqg0-02t0cnc5SypHnb8t3CfE3bXU 🚨 FREE Bug Bounty Course Drop From Zero Hero in Bug Bounty Hunting πŸžπŸ’» Im dropping the FULL course link [--] hours from now and as always itll be 100% FREE 🎁 Want early access when it goes live πŸ” Heres how to lock in your spot [--] Follow me [--] Turn on post https://t.co/vY5TUdT4mV https://drive.google.com/drive/u/0/folders/1t-hTqg0-02t0cnc5SypHnb8t3CfE3bXU 🚨 FREE Bug Bounty Course Drop From Zero Hero in Bug Bounty Hunting πŸžπŸ’» Im dropping the"
X Link 2025-10-09T19:36Z 37.9K followers, 83.3K engagements

"Useful Wireshark Filters"
X Link 2025-10-11T17:09Z 37.9K followers, 68.7K engagements

"ETHICAL HACKING BASIC FUNDAMENTAL"
X Link 2025-10-13T10:56Z 37.9K followers, 26.4K engagements

"OS : Linux systems Which is your fav"
X Link 2025-10-13T11:10Z 37.9K followers, 160.3K engagements

"AWS in Plain English"
X Link 2025-10-13T14:12Z 37.9K followers, 221.4K engagements

"Red Team tools"
X Link 2025-10-13T14:12Z 37.9K followers, 26.4K engagements

"How DNS works"
X Link 2025-10-16T13:28Z 37.9K followers, 47.3K engagements

"Look at that everyone A LOCAL BUS"
X Link 2025-10-16T20:53Z 37.9K followers, 1.2M engagements

"AWS Roadmap"
X Link 2025-10-18T14:59Z 37.9K followers, 137.2K engagements

"Lets revamp this roadmap [--]. Cybersecurity fundamentals 2.Networking Basics [--]. Specialize [--]. projects Want a more detailed cybersecurity roadmap Just take a look at my pinned tweet and good luck"
X Link 2025-10-25T15:58Z 37.9K followers, 49.6K engagements

"Important windows batch scripts"
X Link 2025-10-25T16:15Z 37.9K followers, 32.9K engagements

"LEARN FOR FREE"
X Link 2025-10-26T16:37Z 37.9K followers, 257.1K engagements

"Anyways heres me configuring a switch live in class Executive mode privilege Mode Global mode Line line console interface vlan . line vty Enable secret https://t.co/ekOglaDPi8 Executive mode privilege Mode Global mode Line line console interface vlan . line vty Enable secret https://t.co/ekOglaDPi8"
X Link 2025-10-30T17:17Z 37.9K followers, 50.5K engagements

"Unpopular cybersecurity opinions that would get you in this position"
X Link 2025-11-06T15:46Z 37.9K followers, 649.2K engagements

"IP Addresses"
X Link 2025-11-06T18:20Z 37.9K followers, 42K engagements

"Apple Pay be Google Pay security"
X Link 2025-11-08T17:07Z 37.9K followers, 681.1K engagements

"Top [--] Platforms to Practice Ethical Hacking"
X Link 2025-11-11T17:46Z 37.9K followers, 35.1K engagements

"Ethernet Cable Categories (cat [--] exists too)"
X Link 2025-11-12T16:55Z 37.9K followers, 41.1K engagements

"HOW TO ACCESS THE DARK-WEB- a full breakdown. Understand the risks first. Its not a game. You can encounter illegal material malware scams and surveillance. In some countries even accessing it can land you in legal trouble. Step 1: Download Tor Browser. Only from the official site. This is a modified Firefox that routes your connection through multiple encrypted nodes to hide your location. Step 2: Consider a VPN. This is debated. Some use a trusted VPN before opening Tor for an extra layer but its not mandatory. Research "Tor over VPN" to decide. Step 3: Launch Tor and connect. It might take"
X Link 2025-12-05T11:58Z 37.9K followers, 1.5M engagements

"Linux users be like"
X Link 2026-02-03T12:31Z 37.9K followers, 51.1K engagements

"Rouge DHCP SERVER ATTACK FOR DUMMIES"
X Link 2026-02-03T21:01Z 37.9K followers, 56.5K engagements

"Cybersecurity interview prep DONT FAIL THESE BEGINNER LEVEL QUESTIONS"
X Link 2026-02-05T18:17Z 37.9K followers, 24.7K engagements

"How a WiFi router works"
X Link 2026-02-05T18:29Z 37.9K followers, 231.5K engagements

"Apple Pay vs Google pay"
X Link 2026-02-06T08:54Z 37.9K followers, 4.5M engagements

"Chat.what device is this"
X Link 2026-02-12T08:11Z 37.9K followers, 29.6K engagements

"How to enter BIOS on your windows PC without pressing any key"
X Link 2026-01-25T08:10Z 36.4K followers, 74.1K engagements

"As the saying goes The more you delve into the world of tech the more you would want to retreat into the wilderness and never touch a computer again"
X Link 2026-01-25T08:50Z 35.9K followers, 101.2K engagements

"How to hack into any website"
X Link 2026-01-25T15:08Z 35.7K followers, 21.8K engagements

"Cant argue with this representation"
X Link 2026-01-25T17:12Z 36.6K followers, 207.4K engagements

"Accurate asf illustration"
X Link 2026-01-26T10:52Z 35.7K followers, 71.7K engagements

"Notice anything"
X Link 2026-01-26T14:03Z 36.1K followers, 266.5K engagements

"You might have noticed the photo of Netanyahus phone camera covered with tape. This isnt just a quirky habit; its a simple security measure. Phones can be hacked and cameras can be remotely activated without your knowledge. For someone in politics every device is a potential spy tool. Covering your camera with tape may seem low-tech but its surprisingly effective. Its a small step for privacy that can make a big difference. Even experts and cybersecurity professionals do it. In a world where your phone essentially serves as a window into your life a little tape can go a long way in protecting"
X Link 2026-01-27T09:32Z 36.1K followers, 670.1K engagements

"A cybersecurity beginner trying to choose a career path"
X Link 2026-01-27T11:58Z 36K followers, 30K engagements

"Can someone explain why operating systems like Mac or Linux are rarely infected by ransomware attacks"
X Link 2026-01-27T14:53Z 37K followers, 389.2K engagements

"You wont see a more perfect illustration"
X Link 2026-01-27T16:58Z 36.3K followers, 91K engagements

"Facts no cap"
X Link 2026-01-27T18:38Z 35.8K followers, 255.3K engagements

"How I love Linux jokes"
X Link 2026-01-28T14:12Z 37.5K followers, 139.3K engagements

"12 pillars of Network security"
X Link 2026-01-29T09:24Z 37K followers, 15.2K engagements

"What is a DDoS attack and how does it work"
X Link 2026-01-29T09:24Z 35.7K followers, [----] engagements

"Linux distributions if they were students"
X Link 2026-01-29T11:36Z 36.8K followers, 52.3K engagements

"And then your Linux machine breaks"
X Link 2026-01-29T14:49Z 36.9K followers, 65.1K engagements

"Chown vs chmod I think this illustration does justice wbu"
X Link 2026-01-29T14:50Z 36.9K followers, [----] engagements

"Do you know hackers can replace the sudo command with a fake one that steals your password"
X Link 2026-01-29T17:09Z 35.9K followers, 42.9K engagements

"Yes that actually checks out. Google Maps doesnt see traffic; it infers it. If a large number of smartphones are: - in the same area - moving slowly - with location services enabled Googles algorithm assumes congestion. So when he pulled a wagon loaded with approximately [--] phones down an empty street Maps interpreted it as: Wow a lot of people are stuck here. There were no hacks or access to Googles systems involved. It was simply feeding the algorithm fake signals. Thats why your last line is spot on: Google essentially tracks you. Not individually in a creepy way but collectively. Your"
X Link 2026-01-29T18:23Z 35.7K followers, [----] engagements

"Ill stick to Kali tbh"
X Link 2026-01-30T10:10Z 36.7K followers, [----] engagements

"How DNS works"
X Link 2026-01-30T10:15Z 37.1K followers, [----] engagements

"Do you know hackers dont need to stay logged in to keep control of a Linux server Once they leave behind access keys they can come back anytime silently"
X Link 2026-01-30T13:46Z 37.6K followers, 86.7K engagements

"More jobs to cybersecurity professionals"
X Link 2026-01-30T14:33Z 37.5K followers, [----] engagements

"Learn Linux first"
X Link 2026-01-30T14:57Z 37.5K followers, 20.8K engagements

"Types of Malwares"
X Link 2026-01-30T18:52Z 37.5K followers, [----] engagements

"A Linux administrator wants to schedule a script to run every day at 2:00 AM. Which tool should be used A. at B. cron C. systemctl D. nohup"
X Link 2026-01-30T18:57Z 36.8K followers, 55.4K engagements

"Legendary command Its been rumored to this day that no one knows what this command does Especially if you add sudo before running it"
X Link 2026-01-30T20:19Z 36.2K followers, 11.5K engagements

"That device on his back isnt a weapon; its electronic security gear. The antennas are used for RF control essentially managing wireless signals around high-risk events. The primary reasons for its use are: - Blocking phone calls mobile data Wi-Fi and Bluetooth. - Preventing remote-triggered threats. - Stopping unauthorized recordings or live streams. - Limiting coordination between hostile actors. Each antenna targets a different frequency band providing wider coverage. Youll typically see this device at: - VIP movements. - Political or religious gatherings. - High-security public events."
X Link 2026-01-31T06:37Z 37.1K followers, 23.2K engagements

"Types of Networks"
X Link 2026-01-31T08:22Z 37.5K followers, [----] engagements

"Hmmmm.I see"
X Link 2026-01-31T09:16Z 36.7K followers, 45.9K engagements

"The Pros = Cons"
X Link 2026-01-31T10:38Z 37.2K followers, 49.4K engagements

"Wait a minute"
X Link 2026-01-31T12:56Z 37.5K followers, 21.3K engagements

"Internet explorer isnt that bad anymore Right Guess the imposter 😭 https://t.co/eblkLfQLZq Guess the imposter 😭 https://t.co/eblkLfQLZq"
X Link 2026-01-31T12:59Z 37.5K followers, [----] engagements

"I wonder what cat9 Ethernet cables would look like"
X Link 2026-01-31T13:19Z 36.7K followers, [----] engagements

"A static IP address is one that doesnt change. Once its given to a device it stays the same every time the device connects to the network unless someone changes it themselves. So to put it simply: Static IP = a fixed permanent address Dynamic IP = a temporary address that can change Why we use static IPs: Hosting servers or websites Remote access (SSH VPN CCTV home labs) Network devices like printers routers firewalls Basically anything that needs to be consistently reachable The downside: *It costs more (from ISPs) *Its a bit easier to target if its exposed to the internet *It needs manual"
X Link 2026-01-31T13:26Z 37.5K followers, [----] engagements

"Good old days I see this now and wonder how much vulnerable was Facebook in its early post-production days"
X Link 2026-01-31T16:27Z 36.7K followers, [----] engagements

"Privilege escalation using Linux capabilities"
X Link 2026-01-31T18:00Z 37.7K followers, 26.4K engagements

"A network administrator needs to allow private IP addresses inside a network to access the internet using a single public IP address. Which technology BEST accomplishes this A. Static routing B. NAT C. VLAN D. ARP"
X Link 2026-01-31T19:34Z 37.5K followers, 20.1K engagements

"Its a new month already 1/12 Hope yall are working on crushing those goals you set out to achieve"
X Link 2026-02-01T05:10Z 37.4K followers, [----] engagements

"Were the Epstein files finally released"
X Link 2026-02-01T06:05Z 37.4K followers, [----] engagements

"Time to make the change πŸ™‚"
X Link 2026-02-01T09:57Z 37.5K followers, [----] engagements

"IPv4 Classes & Subnet Mask"
X Link 2026-02-01T11:22Z 37.6K followers, [----] engagements

"Windows has a memory and it never forgets. Every USB device youve ever plugged into a Windows PC gets logged including flash drives phones keyboards and even after you remove them. Unplugging doesnt erase the data; Windows keeps a record of drivers stability and forensics. Your system remembers the device type vendor serial number and the first and last time it was connected. So if you think youve removed a device Windows still has the receipts. Windows keeps a permanent record of every USB device youve ever plugged in even after its removed. Windows keeps a permanent record of every USB"
X Link 2026-02-01T11:26Z 37.5K followers, [----] engagements

"What is Kali Linux to you"
X Link 2026-02-01T13:57Z 37.5K followers, 12K engagements

"What did you achieve in January"
X Link 2026-02-01T15:28Z 37.5K followers, [----] engagements

"Tbh just felt like making this"
X Link 2026-02-01T17:26Z 37.5K followers, [----] engagements

"Linux will prolly run on the static electricity from socks"
X Link 2026-02-01T19:10Z 37.5K followers, 25.5K engagements

"Good post overall but a few important clarifications on SSD vs HDD storage πŸ‘‡ While the risk of data decay in SSDs is indeed a concern its often exaggerated. The [--] year unpowered figure is based on JEDECs worst-case specifications which consider high wear and operating temperatures of around 30C. In reality many consumer SSDs can retain data for several years especially if they are lightly used and stored in a cool environment. Data loss in SSDs is not typically sudden or complete. The degradation process is gradual and robust ECC (Error Correction Code) and controller safeguards often"
X Link 2026-02-01T21:07Z 36.1K followers, [----] engagements

"The best of tools are open source"
X Link 2026-02-02T07:32Z 37.8K followers, 13.7K engagements

"Ever wondered why iPhone screenshots never reveal your password πŸ‘€ Apple doesnt simply blur it after the fact. Its a much more sophisticated approach. When you type a password on iOS its entered into a secure text field. The actual characters are never displayed on the screen. Only dots () are visually present. Therefore when you take a screenshot: iOS can only capture whats rendered And the password is not present to be captured Additionally iOS designates sensitive UI elements (passwords OTPs Apple Pay Face ID) as non-capturable. Even screen recordings and screen sharing cannot detect them."
X Link 2026-02-02T07:53Z 37.7K followers, 461.7K engagements

"Who can tell me what this is"
X Link 2026-02-02T09:19Z 37.4K followers, 27.2K engagements

"Lisanil-gaib"
X Link 2026-02-02T09:30Z 37.4K followers, [----] engagements

"It really be like this"
X Link 2026-02-02T11:15Z 37.5K followers, [----] engagements

"Realest meme youd see today"
X Link 2026-02-02T11:15Z 37.5K followers, 20.2K engagements

"@segoslavia 😭I did without a sandbox Seems safe shaa Scanned it later and didnt download a thing from there"
X Link 2026-02-02T12:36Z 37.7K followers, [---] engagements

"A PC that was advertised with 32GB RAM arrived with 48GB and everyone immediately assumed it was a mistake. However theres a possibility that this isnt the case. Many prebuilt systems are marketed with a base configuration of 32GB RAM but sellers often add extra RAM discreetly for various reasons: - Leftover stock - Small performance upgrades - Mixed DIMMs (216 + [--] = 48GB) - Bundles that arent reflected in the listing Its important to note that marketing pages often lag behind actual builds. As long as the system boots properly runs smoothly and the RAM is compatible in terms of speed and"
X Link 2026-02-03T05:02Z 37.5K followers, 370.4K engagements

"Ive answered this before but it wouldnt hurt to go again So why do most hackers and unauthorized groups use Tor Its not because it makes them invisible. Instead it raises the cost of tracking them. Tor routes your traffic through multiple relays across different countries so the destination doesnt see your real IP address. This alone disrupts the easiest way for defenders to attribute your actions: quick attribution. Consider a real-life scenario: Imagine accessing a misconfigured API or admin panel from your home IP address. A single log entry later your ISP city and approximate location are"
X Link 2026-02-03T06:01Z 37.5K followers, 15.8K engagements

"I hate both types"
X Link 2026-02-03T08:20Z 37.5K followers, [----] engagements

"You see a .jpg file in the URL and you click Save Image. Your PC responds with WEBP file. Why Because what you see in the address bar isnt always what you receive. Heres what happens: - Your browser requests the image from the server. - The server checks your browser. - Then it decides to send you a WEBP file instead. Why WEBP - It has a smaller file size. - It loads faster. - It maintains the same (or even better) quality. - It reduces the bandwidth cost for the website. So even if the URL ends in .jpg the server can silently convert it to .webp before sending it. Heres a simple networking"
X Link 2026-02-03T10:34Z 35.7K followers, 10.3K engagements

"Money can't buy you time but it can buy you an SSD. And that's basically the same thing right"
X Link 2026-02-03T11:44Z 37.7K followers, [----] engagements

"Do you get it"
X Link 2026-02-03T12:31Z 37.5K followers, 70.8K engagements

"Someone built a website to avoid black people 😭😭😭 http://peaceandquiet.io http://peaceandquiet.io"
X Link 2026-02-03T14:28Z 37.5K followers, [----] engagements

"Is it even possible Short answer: No. Long answer (simple physics πŸ‘‡): Wi-Fi operates on radio waves (2.4GHz or 5GHz). The human body is primarily composed of water which can absorb some of this radio energy. Therefore yes a person can slightly weaken a Wi-Fi signal if they are: - Positioned directly next to the router - Standing between the router and their device - The signal is already weak However heres the crucial point people often overlook: Wi-Fi doesnt travel in a straight line. It spreads bounces reflects and reaches your device from multiple paths. Therefore one person cannot block"
X Link 2026-02-03T16:56Z 37.7K followers, [----] engagements

"Annoying everytime 😭"
X Link 2026-02-03T18:02Z 37.5K followers, [----] engagements

"TeamViewer got me hacked ❌ Heres what actually happened: - I installed TeamViewer. - I reused the same old password. - That password had leaked from another website. - The attacker tried it on TeamViewer. - The login worked. Thats not hacking to be precise. Thats credential stuffing. There was no exploit. There was no breach. It was just logging in with a stolen key. Remote access tools are often blamed because when theyre abused its noticeable cursor movement files disappearing and panic everywhere. But its like this: Leaving your house key under the mat. A robber uses it. Then you say the"
X Link 2026-02-03T20:10Z 37.5K followers, [----] engagements

"You know what I respect this"
X Link 2026-02-03T22:11Z 37.5K followers, [----] engagements

"@app_settings If you just added spacex to your tweet the like changes Test it out on my reply"
X Link 2026-02-04T06:05Z 35.7K followers, [---] engagements

"Linux says Disk Space Low but the math aint mathing. You check: df -h 100% full du -sh / 20GB used on a 100GB disk So where did the other 80GB go πŸ‘€ Deleted files Nope. Hidden mounts Nada. Then you run: df -i 100% And violla there it is You ran out of inodes. So what actually happened To understand the root cause lets delve into the mechanics of inodes. Each file regardless of its size requires an inode to be stored on the disk. When the inode table reaches its capacity the filesystem becomes unable to allocate new files even if there are ample free disk blocks available. Common applications"
X Link 2026-02-04T08:13Z 36.7K followers, 19K engagements

"Is learning a programming language necessary for someone trying to break into cybersecurity"
X Link 2026-02-04T08:27Z 37.5K followers, [----] engagements

"How Botnet works for Dummies"
X Link 2026-02-04T09:52Z 37.5K followers, 19.3K engagements

"There are levels to this sh*t"
X Link 2026-02-04T11:55Z 37.6K followers, 30.5K engagements

"A network administrator wants to reduce broadcast traffic and improve performance within a large Layer [--] network. Which solution BEST accomplishes this A. Implement VLANs B. Increase link bandwidth C. Enable port mirroring D. Use static IP addressing"
X Link 2026-02-04T20:12Z 37.5K followers, [----] engagements

":wq 😭 Every Vim user has this character arc. https://t.co/iaF2uzNjfm Every Vim user has this character arc. https://t.co/iaF2uzNjfm"
X Link 2026-02-04T20:16Z 37.4K followers, [----] engagements

"My DMs are flooded with messages like I want to start my cybersecurity journey. How can I begin Answer: Start from my pinned tweet on my profile. Good luck ❀"
X Link 2026-02-04T22:02Z 37.5K followers, [----] engagements

"What did I do wrong"
X Link 2026-02-05T00:14Z 37.6K followers, [----] engagements

"Tell me What are you learning today"
X Link 2026-02-05T09:12Z 37.5K followers, [----] engagements

"😭witnessed this on my TL"
X Link 2026-02-05T09:35Z 37.5K followers, [----] engagements

"Types of Servers"
X Link 2026-02-05T10:12Z 37.7K followers, 10.1K engagements

"Learnt the basics Worked on labs Documented some Then start applying pookie πŸ˜—"
X Link 2026-02-05T11:25Z 37.5K followers, [----] engagements

"Just [---] years left"
X Link 2026-02-05T12:12Z 37.5K followers, [----] engagements

"The 3-2-1 Rule Effective against ransomware attacks"
X Link 2026-02-05T12:16Z 37.6K followers, [----] engagements

"@sebp888 @TutaPrivacy Can they"
X Link 2026-02-05T15:14Z 36.4K followers, [----] engagements

"I know someone that is surviving off energy drinks"
X Link 2026-02-05T15:33Z 37.5K followers, 37.1K engagements

"@helayxv Lmao you speak and type in English Is that the language of your ancestors"
X Link 2026-02-06T06:35Z 36.8K followers, [----] engagements

"Wanna see which of your LinkedIn connections appear in the Epstein files πŸ‘‰ http://github.com/cfinke/EpsteIn http://github.com/cfinke/EpsteIn"
X Link 2026-02-06T06:37Z 36.7K followers, [----] engagements

"Fun fact: The interview is tougher than the actual job"
X Link 2026-02-06T08:45Z 36.6K followers, [----] engagements

"You might be wondering how Ans: tailor different resumes to your different skills"
X Link 2026-02-06T08:56Z 37.1K followers, [----] engagements

"Dont lie will you install"
X Link 2026-02-06T09:28Z 37.5K followers, [----] engagements

"Can someone explain how this is possible"
X Link 2026-02-06T13:09Z 37.6K followers, 23.8K engagements

"Just give me the flipper zero"
X Link 2026-02-06T14:50Z 37.7K followers, 30.1K engagements

"Lets not forget the OG notepad VS code is still the best. https://t.co/e1wjDZNIHf VS code is still the best. https://t.co/e1wjDZNIHf"
X Link 2026-02-06T15:40Z 37.4K followers, [----] engagements

"Thats all it is to that"
X Link 2026-02-06T18:44Z 37.5K followers, [----] engagements

"A Linux administrator wants to change the ownership of a file named report.txt to user alice and group finance. Which command BEST accomplishes this A. chmod alice:finance report.txt B. chown alice:finance report.txt C. usermod alice finance report.txt D. groupadd finance report.txt"
X Link 2026-02-06T19:54Z 37.6K followers, 12.3K engagements

"In master ugwes voice it is time"
X Link 2026-02-07T12:17Z 37.7K followers, 26.6K engagements

"Humans will forever be the weakest and easiest link"
X Link 2026-02-07T12:19Z 37.7K followers, [----] engagements

"Has anyone here experienced visiting a data center That place was the most beautiful place in existence (atleast to me) we sadly werent allowed to record anything due to security reasons though. One of my many dreams is to work in one. https://t.co/3wpl6emgvb https://t.co/3wpl6emgvb"
X Link 2026-02-07T19:35Z 37K followers, [----] engagements

"Running cipher /w on an SSD is essentially self-sabotage. Heres why: cipher /w was designed for older hard disk drives (HDDs). Its purpose is to overwrite free space multiple times rendering deleted files unrecoverable. However this logic doesnt apply to SSDs. SSDs have several limitations: - Limited write cycles - Wear leveling (they strategically rearrange writes) - Hidden flash blocks that are inaccessible directly When you execute cipher /w on an SSD youre not actually cleaning anything. Instead youre forcing the SSD to perform unnecessary and excessive writes. The consequences of this"
X Link 2026-02-08T09:03Z 37.5K followers, [----] engagements

"Why cant data centers just use dirty water Why does it have to be clean drinking water Short answer: Servers arent rice so they dont need water. Long answer: Most data centers dont dump water onto servers. Instead they use it for cooling systems like chillers cooling towers and heat exchangers. However those systems hate dirty water. Dirty or untreated water contains: - Minerals that cause scale buildup - Dirt and sand that clog pipes - Microbes that lead to corrosion and biofouling These issues reduce heat transfer damage equipment and cause downtime which is the worst thing that can happen"
X Link 2026-02-08T09:16Z 37.5K followers, 28.4K engagements

"There was a time when everything functioned flawlessly on localhost. However production laughed and ignited a firestorm. The same code the same logic yet the outcome was drastically different. Why Because localhost is a deceptive illusion. On your machine you have the right operating system the correct library versions the appropriate ports and the ideal environment variables. You have the energy to believe that your code works perfectly. But production is a different beast altogether. It operates on a different operating system relies on different dependencies has different configurations"
X Link 2026-02-08T09:58Z 37.7K followers, 50.8K engagements

"@paul_nets Ding ding ding πŸ›Ž"
X Link 2026-02-08T10:12Z 37.2K followers, [---] engagements

"Were you this old"
X Link 2026-02-08T10:56Z 37.6K followers, [----] engagements

"The 2g days"
X Link 2026-02-08T12:06Z 37.4K followers, [----] engagements

"Is there an option to permanently turn this sh*t off You can be using your phone normally and mistakenly accept this thing"
X Link 2026-02-08T12:12Z 37.7K followers, [----] engagements

"In recent news πŸ˜‚"
X Link 2026-02-08T12:31Z 37.7K followers, 19.5K engagements

"Facts no cap"
X Link 2026-02-08T13:14Z 37.5K followers, [----] engagements

"@z_alijonov iPhone X (10)"
X Link 2026-02-08T14:05Z 37.2K followers, [--] engagements

"The Linux Police"
X Link 2026-02-08T17:40Z 37.7K followers, 13.6K engagements

"RAM-only VPN servers mean no logs right Well Not exactly. RAM-only (diskless) servers reduce whats stored long-term but theyre not forensics-proof. Heres why: RAM is not invisible; its volatile. Even while the server is running it retains: active VPN sessions temporary encryption keys connection states network buffers If access occurs before a reboot memory can be dumped and analyzed. The phrase no disk does not prevent live memory forensics. Most VPNs operate on cloud or hosted infrastructure. This means: hypervisors can take snapshots of VM memory providers can log network metadata traffic"
X Link 2026-02-09T04:54Z 37.7K followers, 36.8K engagements

"@chidirolex Mark my words Im gonna qoute this someday"
X Link 2026-02-09T05:33Z 37.5K followers, [---] engagements

"Windscribe ended up mostly fine because the data on those seized servers wasnt actionable: the timestamps they kept had no source IPs destinations or traffic logs so retroactive correlation was technically possible but practically useless without perfect ISP and exit visibility. They took the hit reputationally owned the mistake and fixed the underlying issue by moving to diskless infrastructure. https://twitter.com/i/web/status/2020774050071486528 https://twitter.com/i/web/status/2020774050071486528"
X Link 2026-02-09T08:17Z 37.6K followers, [----] engagements

"@DigitalVagrant @PabloDeLaRed ❀thanks fam"
X Link 2026-02-09T08:38Z 37.5K followers, [---] engagements

"Every termux user used tool this then"
X Link 2026-02-09T10:06Z 37.7K followers, [----] engagements

"Not really. Cold boot mitigations only help against physical powered off attacks where RAM decay is the limiting factor. They do nothing against live memory dumps or hypervisor level snapshots where RAM is captured intact with keys sessions and buffers still valid. If the host or cloud provider controls the hypervisor the guest OS loses by default At best short lived keys and minimal in RAM state reduce impact but they dont prevent the actual extraction. https://twitter.com/i/web/status/2020809781494096233 https://twitter.com/i/web/status/2020809781494096233"
X Link 2026-02-09T10:39Z 37.7K followers, [----] engagements

"Even if you arent intending on becoming something as sophisticated as a network engineer Learn NETWORKING Just for the fun of it You wont ever regret that decision"
X Link 2026-02-09T21:34Z 37.7K followers, [----] engagements

"When calculators were introduced people panicked. Teachers predicted that students would cease to think. Consequently schools banned calculators which I recall was a significant challenge for our school to adapt to even at the high school level. Real math was believed to be performed manually. So what really happened Calculators did not replace mathematicians. Instead they replaced individuals whose sole purpose was to perform arithmetic calculations. The skill evolved from calculation to thinking from execution to judgment. Fast forward to the era of artificial intelligence. Security"
X Link 2026-02-10T07:29Z 37.7K followers, [----] engagements

"Been a real one since birth"
X Link 2026-02-10T13:26Z 37.7K followers, [----] engagements

"@elormkdaniel πŸ˜”Make I paste aza"
X Link 2026-02-10T15:11Z 37.7K followers, [--] engagements

"Non-arguable fact: PYTHON SOLOS"
X Link 2026-02-10T18:47Z 37.8K followers, [----] engagements

"@grok @micheal_ws18 @remarks How much does X lose from paying our creators out of that revenue"
X Link 2026-02-12T00:24Z 37.7K followers, [--] engagements

"How to install Linux as a virtual machine locally on your iPad or iPhone Who here wants to learn how to install a fully functional Linux machine(any distro) on their iPad or iPhones Who here wants to learn how to install a fully functional Linux machine(any distro) on their iPad or iPhones"
X Link 2026-01-31T16:00Z 37.9K followers, 256.7K engagements

"SOC level [--] Tools & Technologies"
X Link 2026-02-06T18:41Z 37.9K followers, 18.2K engagements

"Due to Linux case sensitivity I create different directories with same names eg : Downloads DownloadSDOwnloadsdownloadsdoWnloads dowNloads etc"
X Link 2026-02-07T18:08Z 37.9K followers, 38.5K engagements

"Visual representation of how virtual machines work"
X Link 2026-02-07T18:09Z 37.9K followers, 155.3K engagements

"Why cybersecurity"
X Link 2026-02-10T12:32Z 37.9K followers, [----] engagements

"Forever living these illustrations 😭"
X Link 2026-02-10T15:05Z 37.9K followers, 118.6K engagements

"Which protocol is responsible for automatically assigning IP addresses to devices on a network A. DNS B. DHCP C. ARP D. ICMP"
X Link 2026-02-10T21:29Z 37.9K followers, 62.6K engagements

"A company wants to prevent attackers from reusing captured authentication traffic to gain unauthorized access to a system. Which security mechanism BEST protects against this type of attack A. Encryption B. Salting C. Nonce D. Hashing"
X Link 2026-02-11T19:28Z 37.9K followers, 11K engagements

"Caption this"
X Link 2026-02-12T09:09Z 37.9K followers, [----] engagements

"What kind of a Linux user are you"
X Link 2026-02-13T07:01Z 37.9K followers, 42.9K engagements

Limited data mode. Full metrics available with subscription: lunarcrush.com/pricing

@cyber_razz
/creator/twitter::cyber_razz