Nader Shalabi (@nader_shalabi) 's Twitter Profile
Nader Shalabi

@nader_shalabi

#InfoSec, #Programmer, #MVP.
Following the digital chaos and threats landscape.

cyber-distance.com

github.com/nshalabi

ID: 1382827142

calendar_today26-04-2013 20:37:11

10,10K Tweet

1,1K Followers

2,2K Following

OccupytheWeb (@three_cube) 's Twitter Profile Photo

Python Basics for Hackers, Part 5: Building a WebSite Scraper to Find Potential Passwords #scraping #python #cybersecurity #cyberwarrior #infosec hackers-arise.com/post/python-ba…

Python Basics for Hackers, Part 5: Building a WebSite Scraper to Find Potential Passwords #scraping #python #cybersecurity #cyberwarrior #infosec 

hackers-arise.com/post/python-ba…
Today In Infosec (@todayininfosec) 's Twitter Profile Photo

2005: A worm spread on AOL's AIM IM service with the text: "LOL LOOK AT HIM" and a link to a PIF file which spread the worm to all contacts on the user's AIM Buddy List if executed.

2005: A worm spread on AOL's AIM IM service with the text: "LOL LOOK AT HIM" and a link to a PIF file which spread the worm to all contacts on the user's AIM Buddy List if executed.
Olexander (@_aircorridor) 's Twitter Profile Photo

⚔️ CyberWarrior Handbook, Pt. 1 ⚔️ Your skills are a superpower—capable of shaping global events. Use them wisely. hackers-arise.com/post/a-cyberwa… OccupytheWeb

Have I Been Pwned (@haveibeenpwned) 's Twitter Profile Photo

New stealer logs: 23B rows of "ALIEN TXTBASE" logs with 284M unique email addresses have been added to HIBP. New APIs can now search these by email domain and the domain of the website they were captured on. 69% were already in Have I Been Pwned. Read more: troyhunt.com/processing-23-…

vx-underground (@vxunderground) 's Twitter Profile Photo

Today Lockbit ransomware group issued a message to Kash Patel, the new Director of the United States Federal Bureau of Investigation. He requested Kash Patel contact him via Tox and offered him a file titled "personal_gift_for_new_director_FBI_Kash_Patel.7z". The file is

Olexander (@_aircorridor) 's Twitter Profile Photo

Master critical infrastructure security with the Advanced SCADA Hacking & Security course! Dive into Modbus, DNP3, OPC, Profinet & more. hackersarise.thinkific.com/courses/Advanc… OccupytheWeb

Master critical infrastructure security with the Advanced SCADA Hacking & Security course! 

Dive into Modbus, DNP3, OPC, Profinet & more. 
hackersarise.thinkific.com/courses/Advanc…
<a href="/three_cube/">OccupytheWeb</a>
OccupytheWeb (@three_cube) 's Twitter Profile Photo

Python Basics for Hackers, Part 6: Using Python to Decode an Encrypted Message with Frequency Analysis hackers-arise.net/2025/04/24/pyt…

Python Basics for Hackers, Part 6: Using Python to Decode an Encrypted Message with Frequency Analysis

hackers-arise.net/2025/04/24/pyt…
Olexander (@_aircorridor) 's Twitter Profile Photo

Hackers-Arise: Forge The Complete Cyberwarrior Beyond Red vs Blue teams - we create well-rounded warriors mastering BOTH offensive & defensive arts. 3-year program, 40+ cutting-edge courses including SCADA & car hacking. hackers-arise.com/what-is-a-cybe… OccupytheWeb

Hackers-Arise: Forge The Complete Cyberwarrior

Beyond Red vs Blue teams - we create well-rounded warriors mastering BOTH offensive &amp; defensive arts. 3-year program, 40+ cutting-edge courses including SCADA &amp; car hacking.
hackers-arise.com/what-is-a-cybe…
<a href="/three_cube/">OccupytheWeb</a>
vx-underground (@vxunderground) 's Twitter Profile Photo

Last year individuals from DEFCONs data duplication village requested I send them malware stuff so they can distribute it. I said, "For sure, no problem" I then subsequently specified the wrong path on Rclone and sent DEFCON staff my tax information from the past 5 years

Last year individuals from DEFCONs data duplication village requested I send them malware stuff so they can distribute it.

I said, "For sure, no problem"

I then subsequently specified the wrong path on Rclone and sent DEFCON staff my tax information from the past 5 years
0xor0ne (@0xor0ne) 's Twitter Profile Photo

"SecureBoot bypass for UEFI-compatible firmware based on Insyde H2O" Part 1: coderush.me/hydroph0bia-pa… Part 2: coderush.me/hydroph0bia-pa… #cybersecurity #uefi

"SecureBoot bypass for UEFI-compatible firmware based on Insyde H2O"

Part 1: coderush.me/hydroph0bia-pa…
Part 2: coderush.me/hydroph0bia-pa…

#cybersecurity #uefi
SEKTOR7 Institute (@sektor7net) 's Twitter Profile Photo

Modern obfuscation techniques - a great weekend read. Master's thesis (by Roman Oravec) investigates various common obfuscation techniques and freely available implementations, focusing on the LLVM Pass Framework's potential for program obfuscation. Additionally, several

Modern obfuscation techniques - a great weekend read.

Master's thesis (by Roman Oravec) investigates various common obfuscation techniques and freely available implementations, focusing on the LLVM Pass Framework's potential for program obfuscation.

Additionally, several
Nader Shalabi (@nader_shalabi) 's Twitter Profile Photo

CSA Updated Cloud Threat Modeling for 2025, there's an interesting content about AI-Specific threat modeling frameworks. linkedin.com/posts/cloud-se…

Nader Shalabi (@nader_shalabi) 's Twitter Profile Photo

Well, it was a fun ride with this tool, now it will be part of the OS very soon. I will keep an eyeand see how the visualisation tool will evolve ( github.com/nshalabi/Sysmo…) pcper.com/2025/11/micros…