Hải Trần (@n4b0n) 's Twitter Profile
Hải Trần

@n4b0n

ID: 1828428213061853184

calendar_today27-08-2024 13:44:03

6 Tweet

1 Takipçi

94 Takip Edilen

Dan Nanni (@xmodulo) 's Twitter Profile Photo

When you enter a command in a Linux shell, the shell parses it, locates the executable, creates a child process, and runs the command. Once done, it returns the exit status😎👇 #sysadmin #devops Find pdf books with all my #Linux infographics at study-notes.org

When you enter a command in a Linux shell, the shell parses it, locates the executable, creates a child process, and runs the command. Once done, it  returns the exit status😎👇 #sysadmin #devops 

Find pdf books with all my #Linux infographics at study-notes.org
Sumanth (@sumanth_077) 's Twitter Profile Photo

Turn any GitHub repository into interactive diagrams! Introducing GitDiagram, Simply replace "hub" with "diagram" in a GitHub URL and instantly visualize the code base with interactive diagrams.

Santiago (@svpino) 's Twitter Profile Photo

Massive release here! First, MCP. Then, A2A. Now, we have a new AI protocol. AG-UI is the Agent-User Interaction Protocol. This is a protocol for building user-facing AI agents. It's a bridge between a backend AI agent and a full-stack application. Up to this point, most

Massive release here!

First, MCP. Then, A2A. Now, we have a new AI protocol.

AG-UI is the Agent-User Interaction Protocol. This is a protocol for building user-facing AI agents. It's a bridge between a backend AI agent and a full-stack application.

Up to this point, most
Squiblydoo (@squiblydooblog) 's Twitter Profile Photo

Clickfix -> executes MSI in memory -> uses curl to drop signed payload into C:\Public\ Signed by the well known Kyrgyzstani company "Tim Instruments Limited Liability Company"; oh, I guess maybe not well known. 58995e4bf1318a44d775d7b273de4933

Clickfix -> executes MSI in memory -> uses curl to drop signed payload into C:\Public\

Signed by the well known Kyrgyzstani company "Tim Instruments Limited Liability Company"; oh, I guess maybe not well known.

58995e4bf1318a44d775d7b273de4933
gabe farran (@gabefarran) 's Twitter Profile Photo

if you’re using Cursor this is a game changer: you can reference docs from anything supabase, openai, stripe… anything. if your not already doing this. You should

eversinc33 🤍🔪⋆。˚ ⋆ (@eversinc33) 's Twitter Profile Photo

VIBE MALWARE TRIAGE - Claude analysing a binary with a little triage MCP server I wrote today. Integrates detect it easy, FLOSS, yara-forge and others to analyze a PE statically and outputs a markdown report.

Smukx.E (@5mukx) 's Twitter Profile Photo

Introduction to windows shellcode development series. PART 1: securitycafe.ro/2015/10/30/int… PART 2: securitycafe.ro/2015/12/14/int… PART 3: securitycafe.ro/2016/02/15/int… #redteam #exploit #shellcode

Introduction to windows shellcode development series. 

PART 1: securitycafe.ro/2015/10/30/int…
PART 2: securitycafe.ro/2015/12/14/int…
PART 3: securitycafe.ro/2016/02/15/int…

#redteam #exploit #shellcode
Shruti (@heyshrutimishra) 's Twitter Profile Photo

🚨 BREAKING: Claude 4 just made every dev tool outdated. If you’re building agents, coding copilots or AI workflows - pause everything and read this. Anthropic dropped code-native super intelligence and it’s wild: 🧵👇

🚨 BREAKING: Claude 4 just made every dev tool outdated.

If you’re building agents, coding copilots or AI workflows - pause everything and read this.

Anthropic dropped code-native super intelligence and it’s wild: 🧵👇
Avi Chawla (@_avichawla) 's Twitter Profile Photo

Fine-tune 100+ LLMs directly from a UI! LLaMA-Factory lets you train and fine-tune open-source LLMs and VLMs without writing any code. Supports 100+ models, multimodal fine-tuning, PPO, DPO, experiment tracking, and much more! 100% open-source with 50k stars!

Poonam Soni (@codebypoonam) 's Twitter Profile Photo

Cursor with CodeRabbit is a major shift. Now you can Vibe code with Cursor and vibe-check it with CodeRabbit. Here’s the full workflow:

Cursor with CodeRabbit is a major shift.

Now you can Vibe code with Cursor and vibe-check it with CodeRabbit.

Here’s the full workflow:
John Rush (@johnrushx) 's Twitter Profile Photo

I've tried all (46 😵‍💫) AI Coding Agents & IDEs [Factory, Cursor, Heyboss, Windsurf, Emergent, Wrapifai, Copilot, Lovable, Bolt, v0, Replit, MarsX, Canva, Devin, Github Spark, IDX, Stitch & more] The most complete list ever made (with demos & notes):

Ellie Jones (@ellie_jones_ai) 's Twitter Profile Photo

HOLY SH*T… This AI Agent does everything 🤯 Built in n8n : 🔁 Clones viral TikToks ✍️ Rewrites w/ GPT-4o 🎥 Auto creates avatar videos 🎬 Adds captions & edits 📤 Posts to 9 platforms (TikTok, IG, YT, X…) 🔁 Like+RT ✅ Reply “Steal” 🤝 Follow me & I’ll DM you workflow FREE.

HOLY SH*T… This AI Agent does everything 🤯

Built in n8n :
🔁 Clones viral TikToks
✍️ Rewrites w/ GPT-4o
🎥 Auto creates avatar videos
🎬 Adds captions & edits
📤 Posts to 9 platforms (TikTok, IG, YT, X…)

🔁 Like+RT
✅ Reply “Steal”
🤝 Follow me & I’ll DM you  workflow FREE.
Marry Evan (@marryevan999) 's Twitter Profile Photo

An n8n script so powerful it’s like the brain of the cosmos, jacked into the internet’s core. Scans TikTok, IG, YT, LinkedIn, X & FB at godspeed, crunching a trillion signals in real time, hijacking trends before they exist! FOLLOW + RT + comment ‘N8N’ & I’ll DM free.

An n8n script so powerful it’s like the brain of the cosmos, jacked into the internet’s core.

Scans TikTok, IG, YT, LinkedIn, X & FB at godspeed, crunching a trillion signals in real time, hijacking trends before they exist!

FOLLOW + RT + comment ‘N8N’ & I’ll DM free.
0b1d1 (@_0b1d1) 's Twitter Profile Photo

🦠 Rootkits & Virus Rootkits Explained Rootkits are among the stealthiest threats in cybersecurity. They hide deep inside operating systems, often below where traditional security tools can see, allowing malware to persist undetected for long periods.

🦠 Rootkits & Virus Rootkits Explained

Rootkits are among the stealthiest threats in cybersecurity. They hide deep inside operating systems, often below where traditional security tools can see, allowing malware to persist undetected for long periods.
OccupytheWeb (@three_cube) 's Twitter Profile Photo

Sysinternals is one of best tools for identifying malware on a running Windows system Digital Forensics, Part 8: Live System Analysis with Sysinternals hackers-arise.com/digital-forens…

Sysinternals is one of best tools for identifying malware on a running Windows system  

Digital Forensics, Part 8: Live System Analysis with Sysinternals

hackers-arise.com/digital-forens…
blackorbird (@blackorbird) 's Twitter Profile Photo

The Art of Pivoting - Techniques for Intelligence Analysts to Discover New Relationships in a Complex World This book explores how intelligence and cyber-security analysts can uncover hidden links between threat actor infrastructure and ongoing investigations by pivoting on

The Art of Pivoting - Techniques for Intelligence Analysts to Discover New Relationships in a Complex World 

This book explores how intelligence and cyber-security analysts can uncover hidden links between threat actor infrastructure and ongoing investigations by pivoting on