Alex Farias (@alexfariasec) 's Twitter Profile
Alex Farias

@alexfariasec

Cybersecurity Enthusiastic

ID: 1143709883872751616

calendar_today26-06-2019 02:37:40

11,11K Tweet

149 Takipçi

1,1K Takip Edilen

Dark Web Intelligence (@dailydarkweb) 's Twitter Profile Photo

🎥 NetStrike Claims Access to 100+ Private Cameras Across US & Israel A threat actor group operating under the name NetStrike claims to have obtained access to over 100 private surveillance cameras across the United States and Israel. The group shared alleged login data via

Termsheetinator (@termsheetinator) 's Twitter Profile Photo

If you want to get on the Claude + Obsidian train. Good place to start so you can enrich your vault at scale fast with extremely relevant info from your meetings. Game changer, you'll save countless hours and tokens.

Mario Nawfal’s Roundtable (@roundtablespace) 's Twitter Profile Photo

THIS NOTEBOOKLM + GEMINI + OBSIDIAN STACK IS GETTING FRAMED AS A WAY TO LEPLACE LEARNING BY 10X. The idea is simple: turn AI into your personal study system instead of just a chatbot.

Mario Nawfal’s Roundtable (@roundtablespace) 's Twitter Profile Photo

THIS MIGHT BE THE CRAZIEST OPEN SOURCE WAR MONITORING SYSTEM OUT RIGHT NOW. It pulls aircraft, fleets, OSINT, signals, narratives, and live intel into one public dashboard.

Rectifyq (@_rectifyq) 's Twitter Profile Photo

[Threat][MY]🔴The Proliferation of DarkSword: iOS Exploit Chain Adopted by Multiple Threat Actors Type: Targeted Date: 19 Mar 2026 Refer:cloud.google.com/blog/topics/th… #rectifyq #cti #threatintel #threatintelligence #malaysia #infosec

[Threat][MY]🔴The Proliferation of DarkSword: iOS Exploit Chain Adopted by Multiple Threat Actors
Type: Targeted
Date: 19 Mar 2026
Refer:cloud.google.com/blog/topics/th…

#rectifyq #cti #threatintel #threatintelligence #malaysia #infosec
Hacking Articles (@hackinarticles) 's Twitter Profile Photo

Hydra Brute Force Tool Guide 🔥 Telegram: t.me/hackinarticles ✴ Twitter: x.com/hackinarticles Hydra is a fast and powerful login brute-force tool widely used by penetration testers to test authentication mechanisms across multiple services. It automates credential

Hydra Brute Force Tool Guide

🔥 Telegram: t.me/hackinarticles
✴ Twitter: x.com/hackinarticles

Hydra is a fast and powerful login brute-force tool widely used by penetration testers to test authentication mechanisms across multiple services. It automates credential
Hacking Articles (@hackinarticles) 's Twitter Profile Photo

A Detailed Guide on Medusa 🔥 Telegram: t.me/hackinarticles ✴ Twitter: x.com/hackinarticles Medusa is a fast, parallel, and modular login brute-forcer used by penetration testers to test authentication security across multiple protocols and services. 📚 What You’ll

A Detailed Guide on Medusa

🔥 Telegram: t.me/hackinarticles
✴ Twitter: x.com/hackinarticles

Medusa is a fast, parallel, and modular login brute-forcer used by penetration testers to test authentication security across multiple protocols and services.

📚 What You’ll
UI/UX Savior (@uisavior) 's Twitter Profile Photo

Sites on the internet for design inspiration. Web Design → curated.design Landing Pages → landing.love Saas Websites → saaspo.com Navbar → navbar.gallery CTA Sections → cta.gallery Animation → appmotion.design

Sites on the internet for design inspiration.

Web Design → curated.design
Landing Pages → landing.love
Saas Websites → saaspo.com
Navbar → navbar.gallery
CTA Sections → cta.gallery
Animation → appmotion.design
Bounty Security (@bountysecurity) 's Twitter Profile Photo

Burp Bounty Pro v3.1.0 is out. New: AI Scanner. Sends each request to an LLM with structured context extracted from the response. The AI decides which profiles to launch automatically. A new option alongside Active Scan and Smart Scan, not a replacement.

Burp Bounty Pro v3.1.0 is out.

New: AI Scanner. Sends each request to an LLM with structured context extracted from the response. The AI decides which profiles to launch automatically.

A new option alongside Active Scan and Smart Scan, not a replacement.
CyberSudo (@cyber_sudo) 's Twitter Profile Photo

How to Turn 𝐎𝐧𝐞 𝐄𝐦𝐚𝐢𝐥 into a Full Digital Footprint 🧠 Most people think an email is just an address, but in OSINT, an email can unlock a 𝑡𝑟𝑎𝑖𝑙 of connected profiles and history ⚡ When I’m investigating, one tool I like using is 𝐈𝐧𝐭𝐞𝐥𝐁𝐚𝐬𝐞 it takes an

Nagli (@galnagli) 's Twitter Profile Photo

We believe AI should augment your security continuously across your entire attack surface -- not replace manual pentests for compliance checkboxes. Combined with our unmatched context across cloud environments, this is just the beginning with a lot more to come. ✨

We believe AI should augment your security continuously across your entire attack surface -- not replace manual pentests for compliance checkboxes. 

Combined with our unmatched context across cloud environments, this is just the beginning with a lot more to come. ✨