@T00lsCom Profile picture

T00ls | T00ls.com

@T00lsCom

https://t.co/cyPER0t2o7 https://t.co/mmlrrE3U2V Official Twitter account. #T00ls

Joined March 2016
Similar User
ZoomEye photo

@zoomeye_team

雨苁-www.ddosi.org photo

@gov_hack

苏安 photo

@suanve

heige photo

@80vul

WgpSec photo

@wgpsec

key photo

@VulkeyChen

Phith0n photo

@phithon_xg

k0shl photo

@KeyZ3r0

CX photo

@cxaqhq

✨𝓜o𝓰𝓾 (✸,✸) photo

@moguxyz

Erdon photo

@Erdon_CN

4uuu Nya photo

@4uuu_Nya

Yuan-chi photo

@0xyuhao

Tuuu Nya photo

@Tuuusb

T00ls | T00ls.com Reposted

Call it the biggest #NTLM #password database or monstrous #MD5 leak, but on weakpass.com, you can find precomputed datasets for various wordlists and different hashes - all free! FYI: all_in_one.latin.txt for NTLM contains 26.5 billion pairs of hash:password inside!🔥

w34kp455's tweet image. Call it the biggest #NTLM #password database or monstrous #MD5 leak, but on <a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/yCapE1L6Gh">weakpass.com</a>, you can find precomputed datasets for various wordlists and different hashes - all free!
FYI: all_in_one.latin.txt for NTLM contains 26.5 billion pairs of hash:password inside!🔥

T00ls | T00ls.com Reposted

看了下,这位朋友的钱包还真是被 AI 给“黑”了…用 GPT 给出的代码来写 bot,没想到 GPT 给的代码是带后门的,会将私钥发给钓鱼网站…😵‍💫 玩 GPT/Claude 等 LLM 时,一定要注意,这些 LLM 存在普遍性欺骗行为。之前提过 AI 投毒攻击,现在这起算是针对 Crypto 行业的真实攻击案例了。

Be careful with information from @OpenAI ! Today I was trying to write a bump bot for pump.fun and asked @ChatGPTapp to help me with the code. I got what I asked but I didn't expect that chatGPT would recommend me a scam @solana API website. I lost around $2.5k 🧵

r_cky0's tweet image. Be careful with information from @OpenAI ! Today I was trying to write a bump bot for <a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/cIAVsMwwFk">pump.fun</a> and asked @ChatGPTapp to help me with the code. I got what I asked but I didn't expect that chatGPT would recommend me a scam @solana API website. I lost around $2.5k 🧵
r_cky0's tweet image. Be careful with information from @OpenAI ! Today I was trying to write a bump bot for <a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/cIAVsMwwFk">pump.fun</a> and asked @ChatGPTapp to help me with the code. I got what I asked but I didn't expect that chatGPT would recommend me a scam @solana API website. I lost around $2.5k 🧵


🌐 T00.ls正式推出:打造网络安全人士的个人名片 t00ls.com/articles-72767…

T00lsCom's tweet image. 🌐 <a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/FB49IPZ1Wg">T00.ls</a>正式推出:打造网络安全人士的个人名片 <a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/lpfAlUPIzU">t00ls.com/articles-72767…</a>

T00ls | T00ls.com Reposted

我有个安全小习惯,只要复制了内容,用完后,我一定条件反射地去屏幕上的快捷方式小组件点击 # Clipboard 来清除我的剪切板(如图1)…这段快捷指令很简单(如图2),我忘记是不是自带的。如果你也用 iPhone,你可以像我这样养成习惯,至于安卓,我不大熟悉了。 用…

evilcos's tweet image. 我有个安全小习惯,只要复制了内容,用完后,我一定条件反射地去屏幕上的快捷方式小组件点击 # Clipboard 来清除我的剪切板(如图1)…这段快捷指令很简单(如图2),我忘记是不是自带的。如果你也用 iPhone,你可以像我这样养成习惯,至于安卓,我不大熟悉了。

用…
evilcos's tweet image. 我有个安全小习惯,只要复制了内容,用完后,我一定条件反射地去屏幕上的快捷方式小组件点击 # Clipboard 来清除我的剪切板(如图1)…这段快捷指令很简单(如图2),我忘记是不是自带的。如果你也用 iPhone,你可以像我这样养成习惯,至于安卓,我不大熟悉了。

用…
evilcos's tweet image. 我有个安全小习惯,只要复制了内容,用完后,我一定条件反射地去屏幕上的快捷方式小组件点击 # Clipboard 来清除我的剪切板(如图1)…这段快捷指令很简单(如图2),我忘记是不是自带的。如果你也用 iPhone,你可以像我这样养成习惯,至于安卓,我不大熟悉了。

用…

T00ls | T00ls.com Reposted

有一说一,朝鲜黑客的研发及沟通水平都挺不错,否则也不会得到这么广泛的“认可”。收网前你都很满意,其他作恶者如果打进来,朝鲜黑客还能帮你悄悄干掉... 就是这么的细节。如果他不是朝鲜黑客,你愿意带他一个项目一个项目地玩下去...🙃

据联合国的报告,【朝鲜黑客】在过去7年窃取了超过30亿美元的加密货币 你可能不知道的是,大部分案件里,黑客都是通过「应聘远程工作」加入了web3项目方,甚至某些项目方超过1/3都是朝鲜黑客😱 你交互过的项目是否已经被黑客渗透? 可以有哪些防范的方法? 分享3个朝鲜黑客应聘的小故事👇🧵 1/n

rubywxt1's tweet image. 据联合国的报告,【朝鲜黑客】在过去7年窃取了超过30亿美元的加密货币

你可能不知道的是,大部分案件里,黑客都是通过「应聘远程工作」加入了web3项目方,甚至某些项目方超过1/3都是朝鲜黑客😱

你交互过的项目是否已经被黑客渗透?
可以有哪些防范的方法?

分享3个朝鲜黑客应聘的小故事👇🧵

1/n


T00ls | T00ls.com Reposted

If the WAF doesn't allow the creation of a JavaScript term like 'alert' or 'confirm' in any way, write it inverted and then use reverse() with self[]. Payload: <a%20href=%0dj&Tab;avascript&colon;x='trela'.split('').reverse().join('');self[x](origin)> #Bugbounty #AkamaiBypass

erickfernandox's tweet image. If the WAF doesn't allow the creation of a JavaScript term like 'alert' or 'confirm' in any way, write it inverted and then use reverse() with self[].

Payload:

&lt;a%20href=%0dj&amp;Tab;avascript&amp;colon;x='trela'.split('').reverse().join('');self[x](origin)&gt;

#Bugbounty #AkamaiBypass

T00ls | T00ls.com Reposted
momika233's tweet image.

T00ls | T00ls.com Reposted

GitLab Authentication Bypass (CVE-2024-45409) : blog.projectdiscovery.io/ruby-saml-gitl… credits @rootxharsh @iamnoooob


🌕月盈欣喜,🌒月亏淡然,小满知足,知足常乐,常乐则圆满。T00ls愿岁岁年年,年年今夜,所盼如愿,事事圆满!🥮🥮🥮

T00lsCom's tweet image. 🌕月盈欣喜,🌒月亏淡然,小满知足,知足常乐,常乐则圆满。T00ls愿岁岁年年,年年今夜,所盼如愿,事事圆满!🥮🥮🥮

T00ls | T00ls.com Reposted

绝了,案中案。 受害人报案,警方发现原火币三个员工,2023 年在火币钱包里面植入木马,盗了上万个私钥,被抓。 可是,又发现受害人不是被这三偷的,因为他们约好,2 年之后再偷。 怎么回事?警方再查,发现 2021 年火币还有个员工植入木马,盗了几千条私钥,2023 年没钱了,开偷。 绝!

WutalkWu's tweet image. 绝了,案中案。

受害人报案,警方发现原火币三个员工,2023 年在火币钱包里面植入木马,盗了上万个私钥,被抓。

可是,又发现受害人不是被这三偷的,因为他们约好,2 年之后再偷。

怎么回事?警方再查,发现 2021 年火币还有个员工植入木马,盗了几千条私钥,2023 年没钱了,开偷。

绝!

T00ls | T00ls.com Reposted

MSSQL ATTACK TOOL – A swiss army knife for pentesting MSSQL servers meterpreter.org/mssql-attack-t…


T00ls | T00ls.com Reposted

Tips on bypassing 403 and 401

pwn4arn's tweet image. Tips on bypassing 403 and 401

🌈加入T00ls,与网络安全精英同行!💥💥💥 t00ls.com/articles-71987…


T00ls | T00ls.com Reposted

speak soon. CVE-2024-4577, Argument Injection in PHP-CGI

watchtowrcyber's tweet image. speak soon.

CVE-2024-4577, Argument Injection in PHP-CGI

T00ls | T00ls.com Reposted

oh by the way this means we can escape any tag now! xss injections are real now @github

LADIES AND GENTLEMAN WE GOT IT BACK github.com/vmfunc/vmfunc

vmfunc's tweet image. LADIES AND GENTLEMAN
WE GOT IT BACK
<a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/85G9iK7iUK">github.com/vmfunc/vmfunc</a>


T00ls | T00ls.com Reposted

Iconv, set the charset to RCE: in the first blog post of this series, @cfreal_ will show a new exploitation vector to get RCE in PHP from a file read primitive, using a bug in iconv() (CVE-2024-2961) ambionics.io/blog/iconv-cve…


T00ls | T00ls.com Reposted

😱被钓 1155 个 WBTC,价值近 7000 万美金。这个用户刚刚遭遇了首尾号相似钱包地址的钓鱼攻击。钓鱼团伙实在是大力出奇迹... 会被攻击的关键点: 1. 用户正常转账的目标地址被钓鱼团伙盯上,钓鱼团伙提前碰撞生成了首尾号相似的钓鱼地址,比如这里是去除 0x 后的首4位、尾6位一样 2.…

evilcos's tweet image. 😱被钓 1155 个 WBTC,价值近 7000 万美金。这个用户刚刚遭遇了首尾号相似钱包地址的钓鱼攻击。钓鱼团伙实在是大力出奇迹...

会被攻击的关键点:

1. 用户正常转账的目标地址被钓鱼团伙盯上,钓鱼团伙提前碰撞生成了首尾号相似的钓鱼地址,比如这里是去除 0x 后的首4位、尾6位一样

2.…

🚨💔 2 hours ago, another victim lost $68 million by copying the wrong address from a contaminated transfer history.

realScamSniffer's tweet image. 🚨💔 2 hours ago, another victim lost $68 million by copying the wrong address from a contaminated transfer history.
realScamSniffer's tweet image. 🚨💔 2 hours ago, another victim lost $68 million by copying the wrong address from a contaminated transfer history.


T00ls | T00ls.com Reposted

🚨 Attention #WordPress users! A critical SQL injection #vulnerability (CVE-2024-27956) in the WP-Automatic plugin is being actively exploited. With a max severity of 9.9/10, this bug enables site takeovers and malicious activities. Details: thehackernews.com/2024/04/hacker… #hacking


T00ls | T00ls.com Reposted

big vuln!!! Grafana backend sql injection affected all versions🤡🤡🤡 fdlucifer.github.io/2024/04/22/gra…

fdlucifer11's tweet image. big vuln!!! Grafana backend sql injection affected all versions🤡🤡🤡
<a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/I8nkKxcyKx">fdlucifer.github.io/2024/04/22/gra…</a>
fdlucifer11's tweet image. big vuln!!! Grafana backend sql injection affected all versions🤡🤡🤡
<a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/I8nkKxcyKx">fdlucifer.github.io/2024/04/22/gra…</a>
fdlucifer11's tweet image. big vuln!!! Grafana backend sql injection affected all versions🤡🤡🤡
<a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/I8nkKxcyKx">fdlucifer.github.io/2024/04/22/gra…</a>
fdlucifer11's tweet image. big vuln!!! Grafana backend sql injection affected all versions🤡🤡🤡
<a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/I8nkKxcyKx">fdlucifer.github.io/2024/04/22/gra…</a>

T00ls | T00ls.com Reposted

I've been reverse engineering the xz backdoor this weekend and have documented the payload format and written a proof-of-concept exploit for the RCE. The payloads are signed with an ED448 key, so I patched my own key into the backdoor for testing. :-) github.com/amlweems/xzbot

amlweems's tweet image. I've been reverse engineering the xz backdoor this weekend and have documented the payload format and written a proof-of-concept exploit for the RCE. The payloads are signed with an ED448 key, so I patched my own key into the backdoor for testing. :-)

<a style="text-decoration: none;" rel="nofollow" target="_blank" href="https://t.co/CvKo3xPRkP">github.com/amlweems/xzbot</a>

Loading...

Something went wrong.


Something went wrong.