Ciphar 1337 🇵🇸 Profile picture
Bad Boys,AI technologies and Aced cyber warfare, data science,arms,food,memes
Apr 2, 2023 9 tweets 5 min read
#Thread
#Balochistan Diesel Mafia⚠️
(How it works)
Diesel smuggling continues to undermine legitimate business activities, evade taxes, and fuel organized crime in Balochistan among law enforcement agencies and the lack of effective border control measures.
(1/n) Image The main source of smugglers is using the sea route of Jiwani via Dasht River using the speed boats (all the way from Sistan,Iran) to transport the diesel in cans and daily millions of worth Diesel,petrol, weapon and drugs smuggled Pakistan with nearly thousands of boats
(2/n) twitter.com/i/web/status/1… Image
Mar 31, 2023 4 tweets 2 min read
Despite the flaws in the system, the political elite and military leadership have failed to learn from their mistakes and continue to make decisions that are detrimental to the country's progress.
(1/n)
#PakistanEconomicCrisis #PakistanArmy #Pakistan There is still time to rectify the situation and steer the country towards a better future, but failure to do so will have serious consequences for the entire nation. otherwise incase breakdown of law (which we all fear) and order in Pakistan would have
(2/n)
Oct 31, 2022 18 tweets 3 min read
#Thread
How_To_Became a Great #hacker

1. Learn TCP/IP, Basic Information
gathering, Proxies, Socks, SSL, VPN, VPS, RDP,
FTP, POP3, SMTP, Telnet, SSH.
2. Learn Linux, Unix, Windows - You can do
this using vmware or any virtual desktop
utility.
#CybersecurityAwarenessMonth 3. Learn a programming language that's
compatible with all OS - Perl, Python, C, ASM
4. Learn HTML, PHP, Javascript, ASP, XML, SQL,
XSS, SQLI, RFI, LFI
5. Learn Reverse engineering and crack
some programs for serials easy ones like
mirc, winzip, winrar or old games.
Oct 10, 2022 20 tweets 4 min read
#Thread
Kali Linux Sections Explained

Information Gathering

These are Reconnaissance tools used to gather data on your target network and devices. Tools range from identifying devices to
protocols used.

(1/n)
#KaliLinux #CyberSecurity #Hacking Vulnerability Analysis

Tools from this section focus on evaluating systems for vulnerabilities. Typically, these are run against systems found using the
Information Gathering Reconnaissance tools.

(2/n)
Jul 23, 2020 13 tweets 7 min read
#PTMExposed ...! (Thread)
So we finally uncovering the social media cells of so called parties.. we have honey trapped one of social media handle responsible for trending hashtags,viral videos, anti state ,anti government content .
Worked on him from Month ..
#PTMBehindTerrorism To gain his trust .he is from #PTM_QUETTA International relations student working with various political parties including #PTM ,#PPP #PMLN and some #PTI Minsters . He claims takes 100s of thousands of from them to make #Propaganda I also got his number from one of