Vulcainreo (@vulcainreo) 's Twitter Profile
Vulcainreo

@vulcainreo

ID: 1499683826

linkhttps://github.com/Vulcainreo calendar_today10-06-2013 23:22:14

1,1K Tweet

420 Takipçi

679 Takip Edilen

Tom Dörr (@tom_doerr) 's Twitter Profile Photo

Trivy: a vulnerability scanner for containers, OS packages, and application dependencies, supporting various formats and integrations with CI/CD pipelines and platforms like GitHub and AWS

Trivy: a vulnerability scanner for containers, OS packages, and application dependencies, supporting various formats and integrations with CI/CD pipelines and platforms like GitHub and AWS
𝕏 Bug Bounty Writeups 𝕏 (@bountywriteups) 's Twitter Profile Photo

HExHTTP - Header Exploitation HTTP HExHTTP is a tool designed to perform tests on HTTP headers and analyze the results to identify vulnerabilities and interesting behaviors. github.com/c0dejump/HExHT…

HExHTTP  - Header Exploitation HTTP

HExHTTP is a tool designed to perform tests on HTTP headers and analyze the results to identify vulnerabilities and interesting behaviors.

github.com/c0dejump/HExHT…
Hacking Articles (@hackinarticles) 's Twitter Profile Photo

Windows DFIR Artifacts #infosec #cybersecurity #cybersecuritytips #microsoft #redteam #informationsecurity #CyberSec #networking #offensivesecurity #infosecurity #cyberattacks #security #oscp #cybersecurityawareness #bugbounty #bugbountytips

Windows DFIR Artifacts

#infosec #cybersecurity #cybersecuritytips #microsoft #redteam #informationsecurity #CyberSec #networking #offensivesecurity #infosecurity #cyberattacks #security #oscp #cybersecurityawareness #bugbounty #bugbountytips
BlackWasp (@blwasp_) 's Twitter Profile Photo

An interesting package just arrived at home! 👀 I'm starting to contribute to the DVID project by writing new trainings, and working on the wiki page. 🚀 If you are interested IoT security, check it out ! dvid.eu

An interesting package just arrived at home! 👀

I'm starting to contribute to the DVID project by writing new trainings, and working on the wiki page. 🚀
If you are interested IoT security, check it out !
dvid.eu
Denis Laskov 🇮🇱 (@it4sec) 's Twitter Profile Photo

Jailbreaking a bankrupt EV charger: Security researchers take apart a defunct cloud-locked device and bring it back to life! ⛽ 🪫 🛠️ Link to post: linkedin.com/posts/dlaskov_…

Jailbreaking a bankrupt EV charger: Security researchers take apart a defunct cloud-locked device and bring it back to life! ⛽ 🪫 🛠️

Link to post: linkedin.com/posts/dlaskov_…
7h3h4ckv157 (@7h3h4ckv157) 's Twitter Profile Photo

Hacking the Operational Technology (Resources are from internet. Sharing != Stealing) Hacking Operational Technology for Defense. Lessons Learned From OT Red Teaming Smart Meter Control Infrastructure: cloud.google.com/blog/topics/th… Operational Technology (OT) Simulator:

Hacking the Operational Technology 
(Resources are from internet. Sharing != Stealing)

Hacking Operational Technology for Defense. 
Lessons Learned From OT Red Teaming Smart Meter Control Infrastructure: cloud.google.com/blog/topics/th…

Operational Technology (OT) Simulator:
Denis Laskov 🇮🇱 (@it4sec) 's Twitter Profile Photo

Breaking into the password-protected JTAG of the SPC5 microchip using voltage fault injection - and why automotive cybersecurity experts should care. 🔲 🔬 ⚡ Link to post: linkedin.com/posts/dlaskov_…

Breaking into the password-protected JTAG of the SPC5 microchip using  voltage fault injection - and why automotive cybersecurity experts  should care. 🔲 🔬 ⚡

Link to post: linkedin.com/posts/dlaskov_…
Jarkko Vesiluoma (@jvesiluoma) 's Twitter Profile Photo

Can't recommend Nano KVM to anyone. It downloads binary files from internet, puts chinese DNS servers to resolv.conf and...it includes a *working microphone* ! (just tested it). #NanoKVM (Note, the device below is Nano KVM lite) Sipeed Why this device has a working

Can't recommend Nano KVM to anyone. It downloads binary files from internet, puts chinese DNS servers to resolv.conf and...it includes a *working microphone* ! (just tested it). #NanoKVM  (Note, the device below is Nano KVM lite)

<a href="/SipeedIO/">Sipeed</a>  Why this device has a working
Denis Laskov 🇮🇱 (@it4sec) 's Twitter Profile Photo

A new and fun way to bypass RFID readers: attacks on a 50-year-old interface and how to use a smart door to clone your card. 🚪 💳 🔎 Link to post: linkedin.com/posts/dlaskov_…

A new and fun way to bypass RFID readers: attacks on a 50-year-old interface and how to use a smart door to clone your card. 🚪 💳 🔎

Link to post: linkedin.com/posts/dlaskov_…
Clandestine (@akaclandestine) 's Twitter Profile Photo

GitHub - GauravSharma0560/wordlist-generator: This tool helps to create a unique wordlist which can crack more than 50% of passwords using brute-force attack, so on social media sites such as: Facebook, Instagram, Twitter etc as well github.com/GauravSharma05…

Md Ismail Šojal 🕷️ (@0x0sojalsec) 's Twitter Profile Photo

LLM pentesting tool focused on prompt injection attacks📕 - github.com/MrMoshkovitz/g… #infosec #cybersec #bugbountytips #aisecurity

LLM pentesting tool focused on prompt injection attacks📕

- github.com/MrMoshkovitz/g…

#infosec #cybersec #bugbountytips #aisecurity
DIGYTRONIX (@digytronix) 's Twitter Profile Photo

PLC Trainer kit with arduino OPTA PLC @Arduino #automation #robotics #electronics #ingenieering #prototyping #plc #viral #righttorepair #lab #digytronix

0xor0ne (@0xor0ne) 's Twitter Profile Photo

Bootloader vulnerability and firmware decryption in TP-Link (Tapo) C210 cloud cameras watchfulip.github.io/28-12-24/tp-li… Credits Watchful IP #embedded #infosec

Bootloader vulnerability and firmware decryption in TP-Link (Tapo) C210 cloud cameras

watchfulip.github.io/28-12-24/tp-li…

Credits <a href="/Watchful_IP/">Watchful IP</a>

#embedded #infosec