Houdini (@d3cryptor_x) 's Twitter Profile
Houdini

@d3cryptor_x

Cybersecurity | Won't stop learning & Solana Degen.

ID: 1383448214397878273

calendar_today17-04-2021 15:53:08

11,11K Tweet

824 Takipçi

2,2K Takip Edilen

Marconius Solidus #FreeSamourai (@m_solidus) 's Twitter Profile Photo

FIRST TIME LINUX INSTALLATION 101 1) Use Ventoy to put multiple distributions on one USB 2) You can try out distributions without installing them 3) When installing, enable FULL DISK ENCRYPTION 4) After installing, play around with settings 5) Use forums and AI to fix stuff

FIRST TIME LINUX INSTALLATION 101

1) Use Ventoy to put multiple distributions on one USB
2) You can try out distributions without installing them
3) When installing, enable FULL DISK ENCRYPTION
4) After installing, play around with settings
5) Use forums and AI to fix stuff
Ethan Leonard (@ethanleonard821) 's Twitter Profile Photo

if you're not using Hinge to source college girls for tiktoks in 2025 you are ngmi I have an entire funnel setup to go from match to posted content in less than 3 days THIS is the future of distribution - stop wasting your money on influencers

if you're not using Hinge to source college girls for tiktoks in 2025 you are ngmi

I have an entire funnel setup to go from match to posted content in less than 3 days

THIS is the future of distribution - stop wasting your money on influencers
marktsec (@marktsec46065) 's Twitter Profile Photo

Ayush Anand I recently built a lightweight Python tool to detect & block clipboard manipulation in real time: 👉 github.com/marktsec/Clipb… Open-source, feedback welcome!

Unwind AI (@unwind_ai_) 's Twitter Profile Photo

Bolt, Lovable, Replit Agents all cost $20+ per month each. This opensource alternative runs completely locally and for free. You just need Claude Code or Cursor CLI. Deploy to Vercel in one click.

NetworkChuck (@networkchuck) 's Twitter Profile Photo

Why I use Mosh over SSH when traveling 👇 SSH dies on flaky networks. Mosh doesn’t. You can switch networks, go offline briefly, and still maintain a live session. Built for travel, trusted by remote developers, and essential for all you digital nomads.

H4x0r.DZ (@h4x0r_dz) 's Twitter Profile Photo

Users who have Python installed on their PCs and use WhatsApp Desktop may be exposed to a security risk. A specially crafted .pyz (Python archive) file can be used to execute malicious code upon a single click, potentially compromising the system. A similar vulnerability was

Graham Helton (@grahamhelton3) 's Twitter Profile Photo

My homelab has been down for a while. I can't stress how nice this is to have it back with all my custom tooling. Deploy a VM with terraform to proxmox with single command: eph -name quick-sandbox -ram 8 -disk 30 -distro ubuntu -confirm

My homelab has been down for a while. I can't stress how nice this is to have it back with all my custom tooling.

Deploy a VM with terraform to proxmox with single command: 

eph -name quick-sandbox -ram 8 -disk 30 -distro ubuntu -confirm
Daily Loud (@dailyloud) 's Twitter Profile Photo

Keeta Vaccaro has walked away from her 17-month marriage to NFL star Tyreek Hill with a major divorce settlement, Daily Mail reports. She secured a $500K lump sum, $20K–$50K a month in spending money, $100K for a new car, $450K for legal fees, and exclusive use of their $5.5M

Keeta Vaccaro has walked away from her 17-month marriage to NFL star Tyreek Hill with a major divorce settlement, Daily Mail reports. 

She secured a $500K lump sum, $20K–$50K a month in spending money, $100K for a new car, $450K for legal fees, and exclusive use of their $5.5M
YesWeHack ⠵ (@yeswehack) 's Twitter Profile Photo

Want to hack mobile applications? 📱 We’ve just published the ultimate guide to building an Android #BugBounty lab with emulators, real devices and proxies (featuring Genymotion, Android emulator, Magisk, Burp, Frida & Medusa) 👇 #BugBountyTips yeswehack.com/learn-bug-boun…

Check Point Research (@_cpresearch_) 's Twitter Profile Photo

Phishing, but backwards ↩️ ✉️ Meet #ZipLine, where actors flipped the script: the victims send the first e-mail. 👾 Weeks of back-and-forth later, attackers dropped #MixShell in ZIPs disguised as legal docs. Read more about this elaborate campaign: research.checkpoint.com/2025/zipline-p…

Virus Bulletin (@virusbtn) 's Twitter Profile Photo

Check Point Research identified a phishing campaign targeting supply-chain-critical manufacturing companies, where attackers leverage legitimate-looking business interactions to stealthily deliver “MixShell”, a custom malware implant. research.checkpoint.com/2025/zipline-p…

Check Point Research identified a phishing campaign targeting supply-chain-critical manufacturing companies, where attackers leverage legitimate-looking business interactions to stealthily deliver “MixShell”, a custom malware implant.  research.checkpoint.com/2025/zipline-p…
Dear Son. (@dears_o_n) 's Twitter Profile Photo

AS A MAN, IT'S NORMAL TO: - Be confused at 27 - Be broke at 29 - Start over at 31 - Be glowing at 32 - Be thriving at 35 - Be a millionaire at 36 There's no timeline for success.

Paul Couvert (@itspaulai) 's Twitter Profile Photo

xAI has just released a STRONG model for vibe coding Grok Code Fast 1 is by far the fastest I've tested 🔥 → Usable in Cline (100% open source) → Also Cursor, Copilot, etc. → 160 toks/s (GPT-5 runs at 50 tok/s) → Free for the launch, 6x cheaper than GPT-5 then More below