[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.] #  @b1ack0wl b1ack0wl b1ack0wl posts on X about the most. They currently have XXXXXX followers and X posts still getting attention that total XX engagements in the last XX hours. ### Engagements: XX [#](/creator/twitter::3855190469/interactions)  - X Week XXXXX -XX% - X Month XXXXXX +69% - X Months XXXXXX -XX% - X Year XXXXXXX +42% ### Mentions: X [#](/creator/twitter::3855190469/posts_active)  - X Week X +75% - X Month X +33% - X Months XX +2.40% - X Year XX +118% ### Followers: XXXXXX [#](/creator/twitter::3855190469/followers)  - X Week XXXXXX +0.17% - X Month XXXXXX +0.92% - X Months XXXXXX +3.10% - X Year XXXXXX +9% ### CreatorRank: undefined [#](/creator/twitter::3855190469/influencer_rank)  ### Social Influence [#](/creator/twitter::3855190469/influence) --- **Top accounts mentioned or mentioned by** [@thegrandpew](/creator/undefined) [@davepl1968](/creator/undefined) [@zackkorman](/creator/undefined) [@steventseeley](/creator/undefined) [@ovx_off](/creator/undefined) [@planedrop](/creator/undefined) ### Top Social Posts [#](/creator/twitter::3855190469/posts) --- Top posts by engagements in the last XX hours "@davepl1968 well duh but your original post basically asserts that your "old code" is "safe" but in 2002 (and most likely sooner) it was proven that it wasn't safe. it's one thing to be like "lol some of my old code is still in the zip stack" but instead you wanted to flex on 7z 🫠" [X Link](https://x.com/b1ack0wl/status/1978154805206925655) [@b1ack0wl](/creator/x/b1ack0wl) 2025-10-14T17:43Z 13.8K followers, XXX engagements "@TheGrandPew @steventseeley the CVE is for the PUT method and not POST. This "PoC" is just an object deserializer with a premade object that prints "pwned" when deserialized via readObject();" [X Link](https://x.com/b1ack0wl/status/1980228162295644655) [@b1ack0wl](/creator/x/b1ack0wl) 2025-10-20T11:02Z 13.8K followers, XXX engagements "@TheGrandPew @steventseeley Read the writeup and then compare it to the "PoC"" [X Link](https://x.com/b1ack0wl/status/1980230203118100811) [@b1ack0wl](/creator/x/b1ack0wl) 2025-10-20T11:10Z 13.8K followers, XXX engagements
[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]
@b1ack0wl b1ack0wlb1ack0wl posts on X about the most. They currently have XXXXXX followers and X posts still getting attention that total XX engagements in the last XX hours.
Top accounts mentioned or mentioned by @thegrandpew @davepl1968 @zackkorman @steventseeley @ovx_off @planedrop
Top posts by engagements in the last XX hours
"@davepl1968 well duh but your original post basically asserts that your "old code" is "safe" but in 2002 (and most likely sooner) it was proven that it wasn't safe. it's one thing to be like "lol some of my old code is still in the zip stack" but instead you wanted to flex on 7z 🫠"
X Link @b1ack0wl 2025-10-14T17:43Z 13.8K followers, XXX engagements
"@TheGrandPew @steventseeley the CVE is for the PUT method and not POST. This "PoC" is just an object deserializer with a premade object that prints "pwned" when deserialized via readObject();"
X Link @b1ack0wl 2025-10-20T11:02Z 13.8K followers, XXX engagements
"@TheGrandPew @steventseeley Read the writeup and then compare it to the "PoC""
X Link @b1ack0wl 2025-10-20T11:10Z 13.8K followers, XXX engagements
/creator/x::b1ack0wl