[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.] [@FACT0RN](/creator/twitter/FACT0RN) "@MalwareTechBlog 2/ Streaming tonight Factor a 512bit key live via IFaaS show viewers how easy it is collect FACT and tally reused keys in C2 clusters. Entertainment + education + bounty"  [@FACT0RN](/creator/x/FACT0RN) on [X](/post/tweet/1946567894373998661) 2025-07-19 13:48:46 UTC 9519 followers, XXX engagements "@grok @Djura7777 @workhard638507 @malwrhunterteam @elonmusk Given the factorization of 1024-bit and 2048-bit keys as described on this article. How would you reasses the situation @grok"  [@FACT0RN](/creator/x/FACT0RN) on [X](/post/tweet/1946706171311579475) 2025-07-19 22:58:13 UTC 9520 followers, XX engagements "๐จ 6386 RSA certs still limp along with 512bit keys. #FACT0RN is putting every single modulus onchainopen bounties for integer factorization. Stress test at Crack it earn FACT. Upgrade before the crowd breaks it. #IFaaS #RSA512"  [@FACT0RN](/creator/x/FACT0RN) on [X](/post/tweet/1946547155696570798) 2025-07-19 12:26:21 UTC 9520 followers, 1146 engagements "@troyhunt Change your password is good; rotate your 512bit cert or it will be factored is better. Were proving it one modulus at a time. FACT rewards on for every crackcrypto hygiene meets crowd math"  [@FACT0RN](/creator/x/FACT0RN) on [X](/post/tweet/1946568106798690372) 2025-07-19 13:49:36 UTC 9519 followers, XXX engagements "Audit before you trust. BelPIC history proves key sizes change. @Belgium Ready to stresstest Launch an integer bounty at global compute hunts factors. No crypto knowhow needed. #IFaaS #RSA"  [@FACT0RN](/creator/x/FACT0RN) on [X](/post/tweet/1945836684513280223) 2025-07-17 13:23:12 UTC 9519 followers, 1306 engagements "5/ ๐ Remember when a centralbank payment portal ( Bank Negara) ran a 512bit TLS cert Dont repeat history. FACT0RN IFaaS lets any agency run a live stresstest before the headlines hit. stress-test at #GovTech #CyberResilience #RSA512"  [@FACT0RN](/creator/x/FACT0RN) on [X](/post/tweet/1946204747175792739) 2025-07-18 13:45:45 UTC 9518 followers, XXX engagements "4/ ๐ณ Some JavaCard tokens (Aventra MyEID) still allow 512bit keys. Factor one on FACT0RN in minutes walk into the next compliance meeting with mathbacked proof. #PKI #SmartCard #CryptoHygiene"  [@FACT0RN](/creator/x/FACT0RN) on [X](/post/tweet/1946204580594786403) 2025-07-18 13:45:05 UTC 9518 followers, XXX engagements "6386 RSA certs around the ๐ still cling to 512bit keyseasy prey for modern laptops. #FACT0RN is listing every one onchain as an open bounty. Crack a modulus claim FACT upgrade the web. Join the hunt โ #IFaaS #RSA512 #CyberSecurity"  [@FACT0RN](/creator/x/FACT0RN) on [X](/post/tweet/1946547455358652548) 2025-07-19 12:27:33 UTC 9517 followers, 1071 engagements "Hey @troyhunt want a new signal for pwned Were releasing weak 512bit moduli onto #FACT0RN; if a sites cert is in the list its basically already compromised. Integrate the feed warn users earlier"  [@FACT0RN](/creator/x/FACT0RN) on [X](/post/tweet/1946567999114051920) 2025-07-19 13:49:11 UTC 9517 followers, XXX engagements "Phasebyphase were rolling out thousands of 512bit RSA certs to the #FACT0RN bounty board @malwrhunterteam this is your lab in the wild: verify key reuse break malware certs & earn FACT for every crack. Research meets rewardminus the malware mess. ๐งช๐ฐ"  [@FACT0RN](/creator/x/FACT0RN) on [X](/post/tweet/1946564153373557031) 2025-07-19 13:33:54 UTC 9519 followers, XXX engagements "๐จ XXX Allegro RomPager servers still use 512bit RSA141 in Italy ๐ Spin up a bounty on #FACT0RN: Integer FactorizationasaService cracks these weak keys for just X $FACT each. Audit stresstest secure. #IFaaS #CyberSecurity"  [@FACT0RN](/creator/x/FACT0RN) on [X](/post/tweet/1946418068743229691) 2025-07-19 03:53:24 UTC 9519 followers, 1021 engagements "@SwiftOnSecurity Morning ritual: brew coffee scroll errors nuke 512bit certs. โ๐ Were shipping them to #FACT0RN in wavesopen bounties at Your cat memes can wait; math is about to roast weak crypto"  [@FACT0RN](/creator/x/FACT0RN) on [X](/post/tweet/1946566838617292979) 2025-07-19 13:44:34 UTC 9518 followers, XX engagements "Interview with Fausto Adames the director of ACENTO. A well known and respected figure in the Dominican Republic. Thank you for the opportunity. @acentodiario $fact #FACT0RN"  [@FACT0RN](/creator/x/FACT0RN) on [X](/post/tweet/1944996057168966098) 2025-07-15 05:42:50 UTC 9516 followers, 3610 engagements "Yo @MalwareTechBlog Turning static disassembly into dynamic pwnage: every 512bit RSA cert enters #FACT0RN as an open bounty. Spin up IFaaS on pop the key fingerprint reused moduli across botnetsmath meets malware mapping"  [@FACT0RN](/creator/x/FACT0RN) on [X](/post/tweet/1946567772198031710) 2025-07-19 13:48:17 UTC 9517 followers, XXX engagements "The biggest integer our on-chain service has factored has XXX binary digits. A bounty of XXX FACT was offered. $fact #IFaaS Check it out here:"  [@FACT0RN](/creator/x/FACT0RN) on [X](/post/tweet/1946198792107180437) 2025-07-18 13:22:05 UTC 9517 followers, 1077 engagements "@briankrebs 2/ Want to see ransom crews pivot when their C2 TLS certs crumble Factor a modulus via earn FACT watch the infrastructure shuffle"  [@FACT0RN](/creator/x/FACT0RN) on [X](/post/tweet/1946567632909439383) 2025-07-19 13:47:43 UTC 9518 followers, XXX engagements "Calling the whole blueteam & math crew Soon every 512bit RSA left on the internet (6386 and counting) will hit #FACT0RN as staged bounties. Factor a key via #IFaaS on score FACT help @malwrhunterteam spotlight insecure infrastructure. Lets make weak crypto extinct. ๐๐"  [@FACT0RN](/creator/x/FACT0RN) on [X](/post/tweet/1946563915929821402) 2025-07-19 13:32:57 UTC 9518 followers, 1050 engagements "Hi @briankrebstracking breach breadcrumbs Were publishing 6386 global 512bit RSA certs in phases as bounties on #FACT0RN. #IFaaS at lets anyone place bounties and confirm exposure timelinesfull transparency cryptographic receipts included"  [@FACT0RN](/creator/x/FACT0RN) on [X](/post/tweet/1946567156017107224) 2025-07-19 13:45:50 UTC 9520 followers, XXX engagements
[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]
@FACT0RN
"@MalwareTechBlog 2/ Streaming tonight Factor a 512bit key live via IFaaS show viewers how easy it is collect FACT and tally reused keys in C2 clusters. Entertainment + education + bounty" @FACT0RN on X 2025-07-19 13:48:46 UTC 9519 followers, XXX engagements
"@grok @Djura7777 @workhard638507 @malwrhunterteam @elonmusk Given the factorization of 1024-bit and 2048-bit keys as described on this article. How would you reasses the situation @grok" @FACT0RN on X 2025-07-19 22:58:13 UTC 9520 followers, XX engagements
"๐จ 6386 RSA certs still limp along with 512bit keys. #FACT0RN is putting every single modulus onchainopen bounties for integer factorization. Stress test at Crack it earn FACT. Upgrade before the crowd breaks it. #IFaaS #RSA512" @FACT0RN on X 2025-07-19 12:26:21 UTC 9520 followers, 1146 engagements
"@troyhunt Change your password is good; rotate your 512bit cert or it will be factored is better. Were proving it one modulus at a time. FACT rewards on for every crackcrypto hygiene meets crowd math" @FACT0RN on X 2025-07-19 13:49:36 UTC 9519 followers, XXX engagements
"Audit before you trust. BelPIC history proves key sizes change. @Belgium Ready to stresstest Launch an integer bounty at global compute hunts factors. No crypto knowhow needed. #IFaaS #RSA" @FACT0RN on X 2025-07-17 13:23:12 UTC 9519 followers, 1306 engagements
"5/ ๐ Remember when a centralbank payment portal ( Bank Negara) ran a 512bit TLS cert Dont repeat history. FACT0RN IFaaS lets any agency run a live stresstest before the headlines hit. stress-test at #GovTech #CyberResilience #RSA512" @FACT0RN on X 2025-07-18 13:45:45 UTC 9518 followers, XXX engagements
"4/ ๐ณ Some JavaCard tokens (Aventra MyEID) still allow 512bit keys. Factor one on FACT0RN in minutes walk into the next compliance meeting with mathbacked proof. #PKI #SmartCard #CryptoHygiene" @FACT0RN on X 2025-07-18 13:45:05 UTC 9518 followers, XXX engagements
"6386 RSA certs around the ๐ still cling to 512bit keyseasy prey for modern laptops. #FACT0RN is listing every one onchain as an open bounty. Crack a modulus claim FACT upgrade the web. Join the hunt โ #IFaaS #RSA512 #CyberSecurity" @FACT0RN on X 2025-07-19 12:27:33 UTC 9517 followers, 1071 engagements
"Hey @troyhunt want a new signal for pwned Were releasing weak 512bit moduli onto #FACT0RN; if a sites cert is in the list its basically already compromised. Integrate the feed warn users earlier" @FACT0RN on X 2025-07-19 13:49:11 UTC 9517 followers, XXX engagements
"Phasebyphase were rolling out thousands of 512bit RSA certs to the #FACT0RN bounty board @malwrhunterteam this is your lab in the wild: verify key reuse break malware certs & earn FACT for every crack. Research meets rewardminus the malware mess. ๐งช๐ฐ" @FACT0RN on X 2025-07-19 13:33:54 UTC 9519 followers, XXX engagements
"๐จ XXX Allegro RomPager servers still use 512bit RSA141 in Italy ๐ Spin up a bounty on #FACT0RN: Integer FactorizationasaService cracks these weak keys for just X $FACT each. Audit stresstest secure. #IFaaS #CyberSecurity" @FACT0RN on X 2025-07-19 03:53:24 UTC 9519 followers, 1021 engagements
"@SwiftOnSecurity Morning ritual: brew coffee scroll errors nuke 512bit certs. โ๐ Were shipping them to #FACT0RN in wavesopen bounties at Your cat memes can wait; math is about to roast weak crypto" @FACT0RN on X 2025-07-19 13:44:34 UTC 9518 followers, XX engagements
"Interview with Fausto Adames the director of ACENTO. A well known and respected figure in the Dominican Republic. Thank you for the opportunity. @acentodiario $fact #FACT0RN" @FACT0RN on X 2025-07-15 05:42:50 UTC 9516 followers, 3610 engagements
"Yo @MalwareTechBlog Turning static disassembly into dynamic pwnage: every 512bit RSA cert enters #FACT0RN as an open bounty. Spin up IFaaS on pop the key fingerprint reused moduli across botnetsmath meets malware mapping" @FACT0RN on X 2025-07-19 13:48:17 UTC 9517 followers, XXX engagements
"The biggest integer our on-chain service has factored has XXX binary digits. A bounty of XXX FACT was offered. $fact #IFaaS Check it out here:" @FACT0RN on X 2025-07-18 13:22:05 UTC 9517 followers, 1077 engagements
"@briankrebs 2/ Want to see ransom crews pivot when their C2 TLS certs crumble Factor a modulus via earn FACT watch the infrastructure shuffle" @FACT0RN on X 2025-07-19 13:47:43 UTC 9518 followers, XXX engagements
"Calling the whole blueteam & math crew Soon every 512bit RSA left on the internet (6386 and counting) will hit #FACT0RN as staged bounties. Factor a key via #IFaaS on score FACT help @malwrhunterteam spotlight insecure infrastructure. Lets make weak crypto extinct. ๐๐" @FACT0RN on X 2025-07-19 13:32:57 UTC 9518 followers, 1050 engagements
"Hi @briankrebstracking breach breadcrumbs Were publishing 6386 global 512bit RSA certs in phases as bounties on #FACT0RN. #IFaaS at lets anyone place bounties and confirm exposure timelinesfull transparency cryptographic receipts included" @FACT0RN on X 2025-07-19 13:45:50 UTC 9520 followers, XXX engagements
/creator/twitter::1494773939154956293/posts