Ch4rl3s K00m3 (@charleskoome6) 's Twitter Profile
Ch4rl3s K00m3

@charleskoome6

Security Analyst | CTF player | Head of Operations @BsidesMombasa

ID: 1220020762033164288

linkhttps://4n4l1st.blogspot.com calendar_today22-01-2020 16:30:11

915 Tweet

1,1K Followers

1,1K Following

National Cryptologic Foundation (@ncfcyber) 's Twitter Profile Photo

#CyberPulse Episode 3 drops tomorrow! This time, we’re joined by Tanya Janca | Shehackspurple. In this episode, we dive into: 🔒 The importance of Application Security 💻 How to keep #hackers from exploiting your software 📚 Developing secure #coding skills Tune in: open.spotify.com/show/3DLb6gbIB…

#CyberPulse Episode 3 drops tomorrow! This time, we’re joined by <a href="/shehackspurple/">Tanya Janca | Shehackspurple</a>.

In this episode, we dive into: 
🔒 The importance of Application Security
💻 How to keep #hackers from exploiting your software 📚 Developing secure #coding skills

Tune in: open.spotify.com/show/3DLb6gbIB…
gatheru.u (@gatheruu) 's Twitter Profile Photo

Excited to be attending #DevSecCon2024 at Sote Hub! A great opportunity to dive into the world of #DevSecOps, learn cutting-edge security practices, and connect with like-minded tech enthusiasts. Let’s secure the future, one code at a time. #sotehub #DevSecCon2024

Excited to be attending #DevSecCon2024 at Sote Hub!  A great opportunity to dive into the world of #DevSecOps, learn cutting-edge security practices, and connect with like-minded tech enthusiasts. Let’s secure the future, one code at a time. 
#sotehub #DevSecCon2024
arndxt (@arndxt_xo) 's Twitter Profile Photo

Bybit’s $1.5B hack is bullish - Lazarus has diamond hands. Led by Park Jin Hyok, now wanted by the FBI. They’ve just drained $1.46B in staked ETH & ERC-20 tokens from Bybit, making it the biggest crypto hack ever, twice the size of the second-largest breach. How did they pull

Bybit’s $1.5B hack is bullish - Lazarus has diamond hands.

Led by Park Jin Hyok, now wanted by the FBI.

They’ve just drained $1.46B in staked ETH &amp; ERC-20 tokens from Bybit, making it the biggest crypto hack ever, twice the size of the second-largest breach.

How did they pull
Atlas (@crptatlas) 's Twitter Profile Photo

Lazarus Group use PumpFun to vanish $1.5B They launched #500000 and vanished $44M I spent 10h to reveal their laundering scheme Here's what's happening and what's next👇🧵

Lazarus Group use PumpFun to vanish $1.5B

They launched #500000 and vanished $44M

I spent 10h to reveal their laundering scheme

Here's what's happening and what's next👇🧵
Nicolas Krassas (@dinosn) 's Twitter Profile Photo

Linux Kernel Vulnerability Exposes Local Systems to Privilege Escalation, PoC Published securityonline.info/linux-kernel-v…

CTFRoom (@ctf_room) 's Twitter Profile Photo

#Defcon33 is here with us & thanks to Blacks In Cybersecurity, we get to showcase the best from the international community. If you are a challenge creator & wish to contribute, please #ping Jones Baraza or DM. CTFRoom is once again privileged to be a #CTF partner alongside KC7 - Cyber detective game.

#Defcon33 is here with us &amp; thanks to <a href="/BlackInCyberCo1/">Blacks In Cybersecurity</a>, we get to showcase the best from the international community. If you are a challenge creator &amp; wish to contribute, please #ping <a href="/JonesBaraza/">Jones Baraza</a> or DM. <a href="/CTF_Room/">CTFRoom</a> is once again privileged to be a #CTF partner alongside <a href="/KC7cyber/">KC7 - Cyber detective game</a>.
Larry Madowo (@larrymadowo) 's Twitter Profile Photo

A Ugandan leader went for cancer treatment in Germany but built a grand church back home when he recovered, not a hospital. Sam Kutesa even invited President Museveni to open it

Alex (@enenumxela) 's Twitter Profile Photo

xsubfind3r: Give It a Spin! It doesn’t interact directly with its target , minimizing detection risks while uncovering subdomains. The subdomain list you get from a tool like xsubfind3r is more than just a bunch of hostnames, it’s a roadmap to a target's external footprint.

Okonu (@okonu_ian) 's Twitter Profile Photo

Built Synqs, a simple tool to sync multiple calendars so people only book you when you're actually free. No overlaps. Generate a booking link, share it, and you're good. Try mine 👉 synqs.site/book/okonu Want early access? DM/email me. Self-host? 👉 github.com/Okonu/calsync

Project Sekai CTF (@projectsekaictf) 's Twitter Profile Photo

🎁Monthly Giveaway🎁 Hack The Box 6-month VIP+ - Follow, Like, and Retweet to join! - Winners will be picked randomly on 5 June. #hackthebox #giveaway #projectsekaictf

🎁Monthly Giveaway🎁

Hack The Box 6-month VIP+
- Follow, Like, and Retweet to join!
- Winners will be picked randomly on 5 June.

#hackthebox #giveaway #projectsekaictf
Ch4rl3s K00m3 (@charleskoome6) 's Twitter Profile Photo

Today's the day, and all roads lead to Sarova Whitesands Beach Resort! See you at the Odoo Business Show Mombasa 2025. #odoomombasa #innovusodoo

Today's the day, and all roads lead to Sarova Whitesands Beach Resort! See you at the Odoo Business Show Mombasa 2025.

#odoomombasa #innovusodoo
Clandestine (@akaclandestine) 's Twitter Profile Photo

GitHub - stuxctf/PAYGoat: PAYGoat is a banking application built for educational purposes, focused on exploring and understanding common business logic flaws in financial platforms. github.com/stuxctf/PAYGoat

0xor0ne (@0xor0ne) 's Twitter Profile Photo

How to solve a CTF challenge that requires PAC, BTI, and relative vtables bypass (HITCON CTF 2025) bruce30262.github.io/hitcon-ctf-202… Credits Bruce Chen #infosec #ctf

How to solve a CTF challenge that requires PAC, BTI, and relative vtables bypass (HITCON CTF 2025)

bruce30262.github.io/hitcon-ctf-202…

Credits <a href="/bruce30262/">Bruce Chen</a>

#infosec #ctf
mRr3b00t (@uk_daniel_card) 's Twitter Profile Photo

Some good tools for doing DNS enumeration: crt.sh explore.silentpush.com domaintools.com securitytrails.com projectdiscovery.io

Coffin (@coffinxp7) 's Twitter Profile Photo

tell me any better XSS methodology than this 😎 Explanation: This oneliner command starts by collecting all URLs from passive sources using gau tool, then filters them for potential XSS parameters using gf patterns. Next, httpx and grep are used to keep only URLs that return

tell me any better XSS methodology than this 😎
Explanation:
This oneliner command starts by collecting all URLs from passive sources using gau tool, then filters them for potential XSS parameters using gf patterns. Next, httpx and grep are used to keep only URLs that return
Mobile Hacker (@androidmalware2) 's Twitter Profile Photo

New Android BEERUS framework for dynamic analysis & reverse engineering BEERUS brings Frida auto-injection, sandbox exfiltration, memory dumps, Magisk integration and more for on device app analysis by Hakai Offsec #AndroidSecurity #Frida #ReverseEngineering #MalwareAnalysis

New Android BEERUS framework for dynamic analysis &amp; reverse engineering
BEERUS brings Frida auto-injection, sandbox exfiltration, memory dumps, Magisk integration and more for on device app analysis by <a href="/HakaiOffsec/">Hakai Offsec</a> 
#AndroidSecurity #Frida #ReverseEngineering #MalwareAnalysis