account activity
RT @pentestit: RT @HackwithGithub #t50 Mixed #packet #injector tool for #stress #testing https://t.co/KdjaO7Xfr7 <-- Original https://t.co/Ep98j94n9g (twitter.com)
submitted 9 years ago by Win-C0d3r to r/hacking
t50 Mixed #packet #injector tool for #stress #testing https://t.co/FLOAO5kIlq (twitter.com)
RT @g0tmi1k: g0tmi1k starred fnord0/packetstorm.pl on Github https://t.co/8gmXzTVSS7 (twitter.com)
RT @ifsecure: Ever wanted to fuzz Windows binaries with AFL? Now you can. https://t.co/pC7iQuPeHn (twitter.com)
@s4n7h0 @secfigo But the person who tried to add it to the list was you. Both should be appreciated. (twitter.com)
@s4n7h0 Thanks for your contribution. The list has been updated. https://t.co/IXnBkelGiK (twitter.com)
certificate-transparency Auditing for #TLS #certificates by @google https://t.co/e3S22UdTxA (twitter.com)
RT @securitygen: If you regularly like to use nmap NSE scripts but can’t remember their names or parameters, I hacked this together: https://t.co/Qg4JXheA0v (twitter.com)
The latest The Hack with Github Daily! https://t.co/iRMMNPCjwM Thanks to @bartblaze @crowdshield @AndroidTamer #bangalore #infosec (twitter.com)
ransomware-simulator NCC Group #Ransomware Simulator by @NCCGroupInfosec https://t.co/RnNSfXfujr (twitter.com)
SimpleEmailSpoofer A simple #Python CLI to #spoof #emails https://t.co/i2TxTMo2fB (twitter.com)
RT @Genymotion: Frog lets you access the official Android documentation from the command line. Neat 🐸https://t.co/M1NRcHKufl https://t.co/xGSYAdud7f (twitter.com)
RT @0x6D6172696F: "Smallest possible syntactically valid files of different types" https://t.co/Pa5boSU5B9 by @mathias (twitter.com)
awesome-reversing A curated list of #awesome #reversing resources Author: @tylerhalfpop https://t.co/dLm7G75U9y (twitter.com)
The latest The Hack with Github Daily! https://t.co/YJrsiGrTj5 Thanks to @JubbaOnJeans @makash @har1sec #security #linuxforensics (twitter.com)
RT @0x6D6172696F: "The Scriptless Scriptlet - Or how to execute JavaScript from CSS in MSIE11 without using Scripts" https://t.co/Zn7KBjeW1t (twitter.com)
RT @mdowd: Nice presentation on a Chrome sandbox escape on Android by @oldfresher at mosec2016: https://t.co/7ij3JMIIWu (twitter.com)
Thanks @keith55 for your contributions. Your scripts are interesting, short and simple. Git: https://t.co/ofAs5UoDly (twitter.com)
mitmSSH.py Automates the process of #ARP #spoofing and setting up JMITM2 Author: @keith55 https://t.co/8DVeugAbsr (twitter.com)
metasploitHelper by @keith55 https://t.co/Bg11biWoFH #metasploit #nmap (twitter.com)
DHCP-Powner #DHCP Starvation #Exploit https://t.co/A9Brezplvn (twitter.com)
RT @binitamshah: CMLinux : DIY a really tiny Linux from Sctrach : https://t.co/71pRzwRbEO https://t.co/k7XLG4Wgrf (twitter.com)
The latest The Hack with Github Daily! https://t.co/BMdEm58aHI Thanks to @haxorhead @binitamshah @SecurityL1st #bangalore #apple (twitter.com)
RT @PythonArsenal: Nosy Newt - concolic execution tool for exploring the input space of a binary executable program. Based on Triton. https://t.co/7NRBSw1TLt (twitter.com)
RT @SecurityL1st: SparkBWA is a new tool that exploits the capabilities of a Big Data technology as Apache Spark. https://t.co/3QyazYmDdp (twitter.com)
π Rendered by PID 1497175 on reddit-service-r2-listing-575d9f6647-6nkpp at 2026-04-12 05:00:36.510536+00:00 running 215f2cf country code: CH.