an0nbil ๐Ÿ‡ต๐Ÿ‡ธ (@an0nbil) 's Twitter Profile
an0nbil ๐Ÿ‡ต๐Ÿ‡ธ

@an0nbil

NASA Hall of Fame Hacker ๐Ÿš€๐Ÿ›ธ
๐Ÿž Bug Bounty Hunter | ๐Ÿ’ป Python Programmer
๐Ÿ“ Editor @OsintTeamBlog | โœ๏ธ Writer @InfoSecComm
๐Ÿ“ˆ 1.1k+ Medium Followers (he/him)

ID: 1759577924985036800

linkhttps://linktr.ee/an0nbil calendar_today19-02-2024 13:57:38

280 Tweet

381 Followers

1,1K Following

an0nbil ๐Ÿ‡ต๐Ÿ‡ธ (@an0nbil) 's Twitter Profile Photo

Can AI turn into a criminal tool? This article explores how scammers use AI for deepfakes, fake voices, and online fraud, and how you can stay protected. Have a nice read! netlas.io/blog/ai_turns_โ€ฆ

Altered Security (@alteredsecurity) 's Twitter Profile Photo

Altered Security Black Friday Giveaway + Mega Sale! Win free access to two of our most popular certifications: โ€ข 1 CRTP seat โ€ข 1 CARTP seat How to participate: โ€ข Like this post โ€ข Comment which course youโ€™re interested in and why โ€ข Repost Winners will be selected randomly

Altered Security Black Friday Giveaway + Mega Sale!

Win free access to two of our most popular certifications:
โ€ข 1 CRTP seat
โ€ข 1 CARTP seat

How to participate:
โ€ข Like this post
โ€ข Comment which course youโ€™re interested in and why
โ€ข Repost

Winners will be selected randomly
CyberWarFare Labs (@cyberwarfarelab) 's Twitter Profile Photo

๐Ÿ›‘ Weโ€™re giving away ๐—™๐—ฅ๐—˜๐—˜ ๐—ฎ๐—ฐ๐—ฐ๐—ฒ๐˜€๐˜€ to one of our most popular ๐Œ๐‚๐‘๐“๐€ Certification! Just follow these 4 ๐˜ด๐˜ช๐˜ฎ๐˜ฑ๐˜ญ๐˜ฆ ๐˜ด๐˜ต๐˜ฆ๐˜ฑ๐˜ด: โœ… Follow Our Page. โœ… ๐—Ÿ๐—œ๐—ž๐—˜ ๐Ÿ‘ and ๐—ฅ๐—˜POST. โœ… ๐—ง๐—ฎ๐—ด ๐—ฎ ๐—ณ๐—ฟ๐—ถ๐—ฒ๐—ป๐—ฑ ๐Ÿท๏ธ โœ… Fill the Google Form: forms.gle/FWjfj7FPi3ZRKNโ€ฆ

๐Ÿ›‘ Weโ€™re giving away ๐—™๐—ฅ๐—˜๐—˜ ๐—ฎ๐—ฐ๐—ฐ๐—ฒ๐˜€๐˜€ to one of our most popular ๐Œ๐‚๐‘๐“๐€ Certification!

Just follow these 4 ๐˜ด๐˜ช๐˜ฎ๐˜ฑ๐˜ญ๐˜ฆ ๐˜ด๐˜ต๐˜ฆ๐˜ฑ๐˜ด:
โœ… Follow Our Page.
โœ… ๐—Ÿ๐—œ๐—ž๐—˜ ๐Ÿ‘ and ๐—ฅ๐—˜POST.
โœ… ๐—ง๐—ฎ๐—ด ๐—ฎ ๐—ณ๐—ฟ๐—ถ๐—ฒ๐—ป๐—ฑ ๐Ÿท๏ธ
โœ… Fill the Google Form: forms.gle/FWjfj7FPi3ZRKNโ€ฆ
an0nbil ๐Ÿ‡ต๐Ÿ‡ธ (@an0nbil) 's Twitter Profile Photo

N8N ร— Cybersecurity. I am building an advanced AI DRIVEN SECURITY NEWS system on n8n that cuts noise and delivers real signal. Deduplicated stories, clean extraction, and short summaries in one place. ๐Ÿ‘‰Starting today, I'll be posting daily updates on it! #CyberSecurity #n8n

N8N ร— Cybersecurity.

I am building an advanced AI DRIVEN SECURITY NEWS system on n8n that cuts noise and delivers real signal.

Deduplicated stories, clean extraction, and short summaries in one place.

๐Ÿ‘‰Starting today, I'll be posting daily updates on it!

#CyberSecurity #n8n
an0nbil ๐Ÿ‡ต๐Ÿ‡ธ (@an0nbil) 's Twitter Profile Photo

Day 2 (n8n cybersecurity news feed) - Simple duplicate logic failed when volume increased - Rebuilt using OpenAI embeddings + cosine similarity - Tested halfway, real load testing next ๐Ÿ‘‰Follow for more updates :)

Day 2 (n8n cybersecurity news feed)
- Simple duplicate logic failed when volume increased  
- Rebuilt using OpenAI embeddings + cosine similarity  
- Tested halfway, real load testing next  

๐Ÿ‘‰Follow for more updates :)
an0nbil ๐Ÿ‡ต๐Ÿ‡ธ (@an0nbil) 's Twitter Profile Photo

Cybersecurity turned into Data Science. Day 3 building my n8n pipeline: โ†’ RSS feeds don't track uniqueness โ†’ Added OpenAI embeddings + cosine similarity to catch them โ†’ RSS schemas break everywhere, switching to vector store

Cybersecurity turned into Data Science.

Day 3 building my n8n pipeline:

โ†’ RSS feeds don't track uniqueness
โ†’ Added OpenAI embeddings + cosine similarity to catch them
โ†’ RSS schemas break everywhere, switching to vector store
HackingHub (@hackinghub_io) 's Twitter Profile Photo

Want a faster way to find subdomains without scanning? ๐Ÿ‘€ Project Discoveryโ€™s Chaos is one of the best passive ways to get subdomains. It actively monitors public bug bounty programs and VDPs.

an0nbil ๐Ÿ‡ต๐Ÿ‡ธ (@an0nbil) 's Twitter Profile Photo

I waste an hour DAILY reading tech NEWS. (although I hate it) So I built an AI agent that does it for me: โ†’ Pulls major RSS feeds โ†’ Filters junk โ†’ Sends summaries to Discord/email Cuts my news time by 80%. P.S: got so much to improve yet, RT if it sounds useful.

I waste an hour DAILY reading tech NEWS. (although I hate it)

So I built an AI agent that does it for me:
โ†’ Pulls major RSS feeds
โ†’ Filters junk
โ†’ Sends summaries to Discord/email

Cuts my news time by 80%.

P.S: got so much to improve yet, RT if it sounds useful.
Nagli (@galnagli) 's Twitter Profile Photo

Introducing my Bug Bounty Masterclass. 100% free. I've made $2,000,000+ finding security bugs. I spent the last year turning my methodology into a complete blueprint. 4 hours of video - foundations, reconnaissance, web proxies, hands-on challenges, and certification. Finish it

an0nbil ๐Ÿ‡ต๐Ÿ‡ธ (@an0nbil) 's Twitter Profile Photo

Looks like some of the commands are still running on 'clawdbot', not moltbot, like: moltbot uninstall โ†’ moltbot: command not found clawdbot uninstall โ†’ works. SOURCE: docs.molt.bot/cli/uninstall Peter Steinberger ๐Ÿฆž Please take a look at it.

@chiefofautism (@chiefofautism) 's Twitter Profile Photo

CLAUDE CODE but for HACKING its called shannon, you point it at website and it just... tries to break in... fully autonomous with no human needed i pointed it at a test app and it stole the entire user database, created admin accounts, and bypassed login, all by itself, in 90

Jamieson Vincent O'Reilly (@theonejvo) 's Twitter Profile Photo

I'm a hacker and for 15 years I've worked on the offensive side - which is why this is not coming from a defensive frame of mind/opinion. I'm watching my own community (cybersecurity) laugh at AI slop while completely missing the point. Yeah, there will be mistakes. New

Y Combinator (@ycombinator) 's Twitter Profile Photo

.Hex Security (YC W26) is building AI agents that hack your systems before real attackers do. In weeks, their agents uncovered critical flaws at dozens of unicorns, earning over $250K in bounties. Hex already protects companies processing billions in transactions and millions of user

an0nbil ๐Ÿ‡ต๐Ÿ‡ธ (@an0nbil) 's Twitter Profile Photo

built cyberforme, because cybersecurity isnโ€™t one career. itโ€™s dozens of different fields. most people donโ€™t fail. they start in the wrong one. the tool supports up to 120 cybersecurity fields and gives you a roadmap that fits you. comment โ€œcyberโ€ and iโ€™ll send the link.

built cyberforme,

because cybersecurity isnโ€™t one career. itโ€™s dozens of different fields.

most people donโ€™t fail. they start in the wrong one.

the tool supports up to 120 cybersecurity fields and gives you a roadmap that fits you.

comment โ€œcyberโ€ and iโ€™ll send the link.
h0rus3c (@h0rus3c) 's Twitter Profile Photo

Itโ€™s been almost two years since I started my journey in Bug Bounty Hunting at 22, while finishing my university degree. After investing 1,730 hours in studying, researching, and hacking, Iโ€™m proud to share that Iโ€™ve earned over โ‚ฌ150,000 in bug bounty rewards, with more than

Itโ€™s been almost two years since I started my journey in Bug Bounty Hunting at 22, while finishing my university degree.

After investing 1,730 hours in studying, researching, and hacking, Iโ€™m proud to share that Iโ€™ve earned over โ‚ฌ150,000 in bug bounty rewards, with more than
Guillermo Rauch (@rauchg) 's Twitter Profile Photo

A Vercel user reported an issue that sounded extremely scary. An unknown GitHub OSS codebase being deployed to their team. We, of course, took the report extremely seriously and began an investigation. Security and infra engineering engaged. Turns out Opus 4.6 *hallucinated a

Forensic OSINT (@forensicosint) 's Twitter Profile Photo

We just released a free OSINT toolkit for investigators. IP Lookup (VPN/proxy detection + court-ready PDF) Username Search (600+ sites) Domain-to-IP with security scoring Email Header Analyzer Image EXIF Reader Timestamp Decoder Try instantly. Free account for ongoing access.

We just released a free OSINT toolkit for investigators.

IP Lookup (VPN/proxy detection + court-ready PDF)
Username Search (600+ sites)
Domain-to-IP with security scoring
Email Header Analyzer
Image EXIF Reader
Timestamp Decoder

Try instantly. Free account for ongoing access.