Discover and read the best of Twitter Threads about #hacking

Most recents (24)


via #TrumpRussiaMatrix Files

via #TrumpRussiaMatrix Files

via #TrumpRussiaMatrix Files
Read 26 tweets
Now that many of William Gibson’s ardent fans will have read his latest novel "Agency", here are
few thoughts about it (spoilers ahead). [1/81]
Having been involved in the "new form of literary criticism" Node Magazine… review of "Spook Country" in 2007, it seems appropriate to publish these initial thoughts about "Agency" as a Twitter thread which can then branch or be added to by others [2/81]
and (later) as a Tor .onion hidden service [3/81]
Read 82 tweets
Daily Bookmarks to GAVNet 08/12/2020…
How FiveThirtyEight’s 2020 Presidential Forecast Works — And What’s Different Because Of COVID-19…

#elections #forecasting #COVID19
Tracking the Real Coronavirus Death Toll in the United States…

#COVID19 #DeathToll #tracking #usa
Read 7 tweets
1. NY just passed #AVR Automatic Voter Registration. @StandUpAmerica estimates this will add over 1Mill voters to the #NY rolls. Wouldn't it be great to know that those votes were going to be counted correctly? But w/new #VotingMachines being certified we will not know.
2. #Security experts like @rad_atl & @kskoglund & auditing expert @philipbstark say that the hybrid #VotingMachines are not secure and "No form of audit can confirm they functioned correctly." (Quote from Dr. Stark). Read a paper he co-authored.…
3. One #Hybrid #VotingMachine is already certified in #NY. It's the Dominion ICE & is in at least 15 counties including #Westchester County where they're trying to buy 100s more. In the Westchester #primary the ICE hybrid voting machines created 4 hour lines. via @IndivisWstchr
Read 29 tweets


Elon Musk,Bill Gates,Apple,Uber,Michael Bloomberg, Apple, Uber,Joe Biden,Warren Buffett,Obama v.s gibi hesaplar #Bitcoin dolandırıcıları tarafından hacklendi #ElonMusk #hacking
2️⃣Mağdurlar tarafından binlerce dolar ödeme yapıldığı söyleniyor.Bu güvenlik açığı nedeniyle Twitter'a mağdurların dava açması halinde,Twitter'ın çok ciddi tazminatlar ödemekle karşı karşıya kalması sözkonusu.
3️⃣Sadece mağdurların uğradığı zararı ödemek değil,kişisel bilgilerin ele geçirilmesi üstelik topluma malum kişiler üzerinden dolandırcılık yapılması konuyu daha da vahim hale getiriyor.
Read 4 tweets
“The greatest long term threat to our nation’s information & intellectual property & to our economic vitality is the #counterintelligence & economic espionage threat from China.” —Christopher Wray, #FBI Dir on the significance of China’s threat to the US (& its allies) #IPTheft
“If you think this is just an intel issue, govt prob or nuisance just for big corps—you couldn’t be more wrong. It’s the [Americans] who’re the victims of what amounts to Chinese theft on a scale so massive—it reps one of the largest transfers of wealth in history.”—#FBI Dir Wray
“We’ve now reached the point where the FBI is now opening up a China-related counterintelligence case—about every 10hrs. Of the nearly 5,000 active CI cases in the US—50% are related to China.”—Christopher Wray, FBI Director on China #IPTheft #Surveillance #ChinaModel #中国模式
Read 26 tweets
#Trade ideologues (who 💕 graduate trade theory) don't even understand the meaning of "China treatment" (in trade, tourism, FDI, technology)🧐🤔
2/trd #FreeTrdIdeologues You will surely object to this violation of free trade? Graduate Trade theory textbooks don't mention slave labor? prison labor? 🧐🤔
Read 32 tweets
So why not make a video like everyone else.
but I got this interesting idea.
so you/someone else collaborate with each other to learn something new or just you learning something new. and make a video of it or maybe live stream it.

So point is not to just teach/learn because resources are available in bulk. but i feel the process or the approach in one learn makes people understand something better rather than making a video which you already know. like you will miss on lot of micro detail
Those micro details are very important when learning.
These videos doesn't have to be perfect. Can be tweaked with communities help to help them and etc. I think this is not something new, rather i want to get it started.
Read 4 tweets
Found a Gitlab instance on a penetration test or red teaming engagement? If the version is <12.9.1, chances are you can get (unauthenticated) RCE by chaining some under-the-radar vulnerabilities! Info in thread 👇
#infosec #redteam #bugbountytips #hacking #gitlab Image
The initial exploit is CVE-2020-10535, which allows you to register an account without verification on Gitlab instances with an email domain whitelist in place ( You can then confirm the account after changing the email to an address of your choosing 😎
The second exploit is CVE-2020-10977, an arbitrary file read vulnerability when moving issues. The vulnerability is disclosed here: Using this vulnerability, you can read the server's 'secret_key_base', required for Vuln #3. Image
Read 5 tweets
1/ As you plan to relocate to Canada as a permanent resident, “settlement funds” and other “monies” are required for processing (e.g. IELTS, PNP EOI, Police Report, ICA, etc).

If you are like me and don’t have rich parents, you will have to hack our way through.

A Thread Image
2/ I know these are tough times and exchange rate is not smiling. Therefore, your plan to save up may be looking bleaky. So, hacking your savings through remote work or freelancing opportunities around the world to help you save up, should be considered as a plan. #RoadToCanada
Due to Covid-19 lockdown, digital skills and remote jobs opportunities are rising in areas such as Content Writing and Editing, Graphics Design, Web And App Development, Project Management, Digital Marketing, Online Course Development, Social Media Management and so on. #Hacking
Read 9 tweets
1/ Go through this tweets thread👇(especially don’t miss 11/ in this thread) to understand how persons like @fs0c131y are running #propaganda against our govt apps.
It will explain how for famous govt apps claims of #hacking or security issues are made while hiding the #reality
2/ First thing is you have to look like a pro hacker like those you see in movies or web series
—> yes you thought it right! You can even use name of a famous fictional character from web series or movies say #ElliotAlderson in #MrRobot web series. How cool that is! Isn’t it?🤔
3/ To look more cool 😎 hacker
—> You need some fancy terminal and fancy font. Powerline font and Oh-my-zsh with the Agnoster theme would be cool.
—> use curl for making requests to app server (you can even avoid posting the response in case you did not get desired response 😂)
Read 13 tweets
[Thread] Certifications

A non-comprehensive, non-linear summary of Dr. Craig Wright’s professional certifications.

National Security Training Academy
Security Industry Course and Firearm Certificate of Achievement - Granted in 1992

Brisbane YMCA Youth Club
Best Military Tactics - Granted in 1988

International Systems Security Professional Certification Scheme - Granted in 2005

Read 60 tweets
1) Q3931
2) One must "only look" to see. That sounds easy enough.
I search Classified 1-99 (BTW: When you "hover" your pointer on CLASS, you'll see "classified"). This is the first entry.
written by Lt. Gen. Michael Hayden in July of 99
Read 24 tweets
HTB: Kryptos.pdf…
HTB: Helpline.pdf…
HTB: Unattended.pdf…
HTB_ Hackback.pdf…
Keep Calm and Hack The Box - Devel.pdf…
#Hacking #BugBountytips
Hack The Box Write-up - Access.pdf…
Hack The Box Write-up - Active.pdf…
Hack The Box Write-up - Carrier.pdf…
Hack The Box Write-up - DevOops.pdf…
Read 7 tweets
my own ebook library contain hundreds (661) of hacking books and computer science books,i love reading and reading again and again.feel free to ask me about the best hacking books
#Hacking #Pentesting #redteam #bugbountytip #Malware #CyberSecurity
The Best Hacking Books in 2020 part )1(:
-Rootkits and Bootkits
-Gray Hat Hacking the Ethical Hacker's Handbook 5
-Black Hat Go
-Practical Binary Analysis
-Hacking Exposed Industrial Control Systems
-Windows Forensics
-Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information
-Hunting Cyber Criminals
-Guide to Computer Forensics and Investigations-Processing Digital Evidence
-Mobile Forensic Investigations: A Guide to Evidence Collection
Read 6 tweets
@AmbJohnBolton Dec 11, 2016 John Bolton #Traitor
Aggressively Gaslighting Russian #Hacking
Even before Trump took office, Bolton was supporting Russia. Gave away Pompeo would be appointed to help cover up. Devil in the details @TheDemocrats @HouseDemocrats @SenateDems
@AmbJohnBolton @TheDemocrats @HouseDemocrats @SenateDems JOHN BOLTON & Russia since 2013 #Traitor
With Russian SPY: Maria Butina & NRA
Part of TRAITOR BOLTON's NRA speech to RUSSIA 2013
@AmbJohnBolton @TheDemocrats @HouseDemocrats @SenateDems Full Dec interview, exposing Trump, Bolton, and Pompeo, before he took office. Bolton REFUSED to accept Russia was involved in hacking and worked hard to deceive the public. I noticed it when it happened.
Read 4 tweets
Stoked to share these free resources to expand your #infosec and technical skill set.

Each is a career path in its own right, the rabbit hole goes down as far as you follow.

Check these out and make 2020 count! 🎊

#30DaysOfThreads #BlackTechTwitter
Begin your road into #pentesting with this staple book and free VM to practice hacking into 💻

Metasploit The Penetration Testers Guide :… via @internetarchive…
A requirement for all in #dfir is being able to read and understand network traffic. It’s how our systems communicate!

Practical packet analysis: using Wireshark to solve real-world network problems : Sanders, Chris…
Read 9 tweets
Vamos a usar este tweet para publicar #Dorks de todo tipo, empecemos con este:

inurl:wp-config.php intext:DB_PASSWORD -stackoverflow -wpbeginner -foro -forum -topic -blog -about -docs -articles

#CyberSecurity #dork #BugBounty
intext:"pass" ! "usuario" | "user" | "contraseña" filetype:sql -github
Este es muy bueno, nos permite hacer uploads, ha sido probado con imágenes .jpeg

intitle:"FCKeditor - Uploaders Tests"
Read 18 tweets
Beware #Android Users!

A new unpatched #vulnerability — dubbed Strandhogg — in Android could let malicious apps take extensive control over your device & steal your login credentials.


Dozens of apps are already exploiting this flaw in the wild.
@Swati_THN 1) #Phishing Attacks:

#Strandhogg task hijacking vulnerability can be exploited to display a fake user interface (UI) while tricking users into thinking they are using a legitimate app, making it easy for the malware to steal their credentials using spoofed login interfaces.
@Swati_THN 2) Fraudulently Requesting Permissions:

A malicious app can also escalate its capabilities significantly by tricking users into granting sensitive device permissions while posing as a legitimate app.

Read more:…

#infosec #hacking #cybersecurity
Read 4 tweets
I did this one before. But since we're making #30daysofthreads a great opportunity for folks to learn gems going into 2020, I figured I bring this one back!

With that being said, I will list 10 books to get started you in #hacking & #penetrationtesting
#CyberSecurity #infosec
“Penetration Testing" by
- 1 of the top books you must read if you're new to hacking or reviewing. Some material is dated but it is still a great book (Georgia is working on a new version. Don't bother her about it!) -
@georgiaweidman “Linux Basics for Hackers” by OccupyTheWeb

This book is great for those learning or working w/ Linux. It explains how to install Kali & what services are installed & what they're used for. This book also explains how to create scripts in BASH & Python
Read 10 tweets

Related hashtags

Did Thread Reader help you today?

Support us! We are indie developers!

This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3.00/month or $30.00/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!