DROL Security(@DrolSecurity) 's Twitter Profileg
DROL Security

@DrolSecurity

Not my Day Job

ID:700868921298124801

calendar_today20-02-2016 02:25:47

18,0K Tweets

536 Followers

1,0K Following

Mike Takahashi(@TakSec) 's Twitter Profile Photo

Google Dork - Sensitive Docs 📄

ext:txt | ext:pdf | ext:xml | ext:xls | ext:xlsx | ext:ppt | ext:pptx | ext:doc | ext:docx
intext:“confidential” | intext:“Not for Public Release” | intext:”internal use only” | intext:“do not distribute”

Discover internal files 👀

Google Dork - Sensitive Docs 📄 ext:txt | ext:pdf | ext:xml | ext:xls | ext:xlsx | ext:ppt | ext:pptx | ext:doc | ext:docx intext:“confidential” | intext:“Not for Public Release” | intext:”internal use only” | intext:“do not distribute” Discover internal files 👀
account_circle
Smukx.E(@5mukx) 's Twitter Profile Photo

New TCP Keylogger[Beta]: Now you can receive the logs directly from victim using receiver.

[+] TCP Keylogger: github.com/Whitecat18/Rus…

[+] TCP Receiver: github.com/Whitecat18/Rus…

account_circle
Cyber Detective💙💛(@cyb_detective) 's Twitter Profile Photo

How to detect a fake account

A detailed multi-step guide on how to determine (and justify it in the report) whether a social media account is fake or not.

sowel.soxoj.com/Instructions/H…

(part of SOWEL - Socmint Weaknesses Enumeration List)

Contributor Soxoj

How to detect a fake account A detailed multi-step guide on how to determine (and justify it in the report) whether a social media account is fake or not. sowel.soxoj.com/Instructions/H… (part of SOWEL - Socmint Weaknesses Enumeration List) Contributor @Sox0j
account_circle
BleepingComputer(@BleepinComputer) 's Twitter Profile Photo

A GitHub flaw (or bad design decision) is being abused to distribute malware through URLs linked to Microsoft’s repository, and others, to make the files appear trustworthy.
bleepingcomputer.com/news/security/…

account_circle
Mike Takahashi(@TakSec) 's Twitter Profile Photo

Google Dork - Login Pages 🔑

inurl:login | inurl:signin | intitle:login | intitle:signin | inurl:secure site:example[.]com

Find hidden login pages and admin panels 👀

Google Dork - Login Pages 🔑 inurl:login | inurl:signin | intitle:login | intitle:signin | inurl:secure site:example[.]com Find hidden login pages and admin panels 👀
account_circle
BleepingComputer(@BleepinComputer) 's Twitter Profile Photo

The MITRE Corporation says state hackers breached its systems in January 2024 by chaining two Ivanti VPN zero-days - Sergiu Gatlan
bleepingcomputer.com/news/security/…

account_circle
Jason Haddix(@Jhaddix) 's Twitter Profile Photo

A 13 year old coded a botnet control framework that utilizes pastebin and github for control of hosts in red teaming…

This makes the hacker in me so hopeful.

Check out pastebomb when it’s dropped!

A 13 year old coded a botnet control framework that utilizes pastebin and github for control of hosts in red teaming… This makes the hacker in me so hopeful. Check out pastebomb when it’s dropped!
account_circle
Dave Kennedy(@HackingDave) 's Twitter Profile Photo

Vulnerability in Putty:

'attacker in possession of a few dozen signed messages and the public key has enough information to recover the private key'

* Revoke keys immediately including public in authorized_keys
* Generate a new key pair and replace

chiark.greenend.org.uk/~sgtatham/putt…

account_circle
Matthew Mesa(@mesa_matt) 's Twitter Profile Photo

Be alert that there is Qakbot being spread in the wild:
49220571574da61781de37f35c66e8f0dadb18fdedb6d3a1be67485069cfd4b0

Campaign: tchk08

ITW URLs on Virustotal:
upd5[.]pro
upd112.appspot[.]com

account_circle
Gabrielle Cuccia(@its_gabbygabs) 's Twitter Profile Photo

: US Gov't confirms Russia has cyber-hacked our own gov't *just a few days ago* (11 April).

reports the Russia-hacking operation, called Midnight Blizzard, successfully infiltrated our gov't by penetrating .

: is the main provider of

#BREAKING: US Gov't confirms Russia has cyber-hacked our own gov't *just a few days ago* (11 April). #CISA reports the Russia-hacking operation, called Midnight Blizzard, successfully infiltrated our gov't by penetrating #MICROSOFT. #Context: #Microsoft is the main provider of
account_circle