Didiet Mauludi (@didietmauludi) 's Twitter Profile
Didiet Mauludi

@didietmauludi

linktr.ee/didietmauludi #Bitcoin @[email protected] #nostr: npub145s0tlknz99xj4en8jsetdu0dfxatzzhlx8fvsx9udlvzduyl07spwen34

ID: 62903868

linkhttps://didietmauludi.myportfolio.com/ calendar_today04-08-2009 19:26:28

9,9K Tweet

778 Followers

4,4K Following

Dark Night (@dark_night263) 's Twitter Profile Photo

OSINT Roadmap: Beginner โ†’ Expert ๐Ÿ•ต๏ธโ€โ™‚๏ธ โ”œโ”€โ”€ Phase 1: Foundations (1-2 weeks) โ”‚ โ”œโ”€โ”€ What is OSINT & Ethics/Legal โ”‚ โ”‚ โ”œโ”€โ”€ OSINT definition, types (SOCMINT, GEOINT, etc.) โ”‚ โ”‚ โ”œโ”€โ”€ Laws (GDPR, Privacy, Ethics) โ”‚ โ”‚ โ””โ”€โ”€ OPSEC for investigators โ”‚

OSINT Roadmap: Beginner โ†’ Expert ๐Ÿ•ต๏ธโ€โ™‚๏ธ

โ”œโ”€โ”€ Phase 1: Foundations (1-2 weeks)
โ”‚   โ”œโ”€โ”€ What is OSINT & Ethics/Legal
โ”‚   โ”‚   โ”œโ”€โ”€ OSINT definition, types (SOCMINT, GEOINT, etc.)
โ”‚   โ”‚   โ”œโ”€โ”€ Laws (GDPR, Privacy, Ethics)
โ”‚   โ”‚   โ””โ”€โ”€ OPSEC for investigators
โ”‚
Dark Night (@dark_night263) 's Twitter Profile Photo

Claude-OSINT โ€” AI-Driven OSINT Framework ๐Ÿ”Ž โ€ข OSINT skills + methodology (Claude-based) โ€ข Structured recon workflows + scripts + examples โ€ข Focus: passive intel (no exploitation) โ€ข Includes automation, testing, skill modules โ€ข Clean methodology for real investigations โš ๏ธ

Claude-OSINT โ€” AI-Driven OSINT Framework ๐Ÿ”Ž

โ€ข OSINT skills + methodology (Claude-based)
โ€ข Structured recon workflows + scripts + examples
โ€ข Focus: passive intel (no exploitation)
โ€ข Includes automation, testing, skill modules
โ€ข Clean methodology for real investigations

โš ๏ธ
HackManac (@h4ckmanac) 's Twitter Profile Photo

๐ŸšจCyber Alert โ€ผ๏ธ ๐Ÿ‡ฎ๐Ÿ‡ฉIndonesia - ๐——๐—ถ๐—ฟ๐—ฒ๐—ฐ๐˜๐—ผ๐—ฟ๐—ฎ๐˜๐—ฒ ๐—š๐—ฒ๐—ป๐—ฒ๐—ฟ๐—ฎ๐—น ๐—ผ๐—ณ ๐—–๐˜‚๐˜€๐˜๐—ผ๐—บ๐˜€ ๐—ฎ๐—ป๐—ฑ ๐—˜๐˜…๐—ฐ๐—ถ๐˜€๐—ฒ (๐——๐—๐—•๐—–) Everest claimed to have breached Indonesiaโ€™s Customs and Excise authority, allegedly leaking 44.86 GB of data from customs analytics and audit systems. The

๐ŸšจCyber Alert โ€ผ๏ธ

๐Ÿ‡ฎ๐Ÿ‡ฉIndonesia - ๐——๐—ถ๐—ฟ๐—ฒ๐—ฐ๐˜๐—ผ๐—ฟ๐—ฎ๐˜๐—ฒ ๐—š๐—ฒ๐—ป๐—ฒ๐—ฟ๐—ฎ๐—น ๐—ผ๐—ณ ๐—–๐˜‚๐˜€๐˜๐—ผ๐—บ๐˜€ ๐—ฎ๐—ป๐—ฑ ๐—˜๐˜…๐—ฐ๐—ถ๐˜€๐—ฒ (๐——๐—๐—•๐—–)

Everest claimed to have breached Indonesiaโ€™s Customs and Excise authority, allegedly leaking 44.86 GB of data from customs analytics and audit systems. The
International Cyber Digest (@intcyberdigest) 's Twitter Profile Photo

โ€ผ๏ธ๐Ÿšจ BREAKING: An AI found a Linux kernel zero-day that roots every distribution since 2017. The exploit fits in 732 bytes of Python. Patch your kernel ASAP. The vulnerability is CVE-2026-31431, nicknamed "Copy Fail," disclosed today by Theori. It has been sitting quietly in the

โ€ผ๏ธ๐Ÿšจ BREAKING: An AI found a Linux kernel zero-day that roots every distribution since 2017. The exploit fits in 732 bytes of Python. Patch your kernel ASAP.

The vulnerability is CVE-2026-31431, nicknamed "Copy Fail," disclosed today by Theori. It has been sitting quietly in the
Dark Web Intelligence (@dailydarkweb) 's Twitter Profile Photo

๐Ÿ‡ฎ๐Ÿ‡ฉ A threat actor is claiming to leak data allegedly associated with Indonesiaโ€™s Constitutional Court (Mahkamah Konstitusi Republik Indonesia - MKRI). At this stage, no verified technical evidence or publicly confirmed samples have been provided to validate the authenticity or

๐Ÿ‡ฎ๐Ÿ‡ฉ A threat actor is claiming to leak data allegedly associated with Indonesiaโ€™s Constitutional Court (Mahkamah Konstitusi Republik Indonesia - MKRI).

At this stage, no verified technical evidence or publicly confirmed samples have been provided to validate the authenticity or
Dark Web Intelligence (@dailydarkweb) 's Twitter Profile Photo

๐Ÿ‡ฎ๐Ÿ‡ฉ A threat actor is claiming to have leaked data allegedly linked to Indonesiaโ€™s Strategic Military Intelligence systems. The exposed sample allegedly includes names, ranks, units, usernames, email addresses, phone numbers, military identification numbers (NRP), device

๐Ÿ‡ฎ๐Ÿ‡ฉ A threat actor is claiming to have leaked data allegedly linked to Indonesiaโ€™s Strategic Military Intelligence systems.

The exposed sample allegedly includes names, ranks, units, usernames, email addresses, phone numbers, military identification numbers (NRP), device
Dark Web Intelligence (@dailydarkweb) 's Twitter Profile Photo

๐Ÿ‡ฎ๐Ÿ‡ฉ A threat actor is claiming to have leaked data allegedly linked to Coretax DJP GO.ID, associated with Indonesiaโ€™s Directorate General of Taxes. The underground post references โ€œCORETAXโ€ infrastructure and suggests the data may involve government-related tax

๐Ÿ‡ฎ๐Ÿ‡ฉ A threat actor is claiming to have leaked data allegedly linked to Coretax DJP GO.ID, associated with Indonesiaโ€™s Directorate General of Taxes.

The underground post references โ€œCORETAXโ€ infrastructure and suggests the data may involve government-related tax
Dark Web Intelligence (@dailydarkweb) 's Twitter Profile Photo

๐Ÿ‡จ๐Ÿ‡ณ ๐Ÿšจ A cybercrime forum user is claiming to possess an alleged Tencent-related dataset containing approximately 1.4 billion records. According to the post, the compressed archive is allegedly around 44GB and includes records referencing: โ€ข QQ email addresses โ€ข Phone numbers

๐Ÿ‡จ๐Ÿ‡ณ ๐Ÿšจ A cybercrime forum user is claiming to possess an alleged Tencent-related dataset containing approximately 1.4 billion records.

According to the post, the compressed archive is allegedly around 44GB and includes records referencing:
โ€ข QQ email addresses
โ€ข Phone numbers