@fckthefbi Profile picture

nk

@fckthefbi

curl -o zone_databreach.au3 // @wior

Similar User
なかむー|公務員流・あんしん投資 photo

@asset_deka

Sábado De Corazón photo

@sabadod_corazon

Zemi photo

@zemigems

Crypto Tex (CTEX) photo

@CryptoTexCoin

Ghost Drive photo

@GhostDrive_Web3

slayso photo

@slaysohxrd

LifeCryptnautic photo

@LifeCryptnautic

Gothree (Free WL Launchpad) photo

@GothreeOfficial

Vilencia DiMeo photo

@vilenci6

@萄 photo

@Newbee740

Pinned

yotgzxg ucty znk lho.


lmfao

Yo, where my $SUNDOG at? I sent it to my TRX address and it ain’t showing??? tronscan.org/#/transaction/…



nk Reposted

most people know me for turning $16,000 into over $18 million upnl on a single $BONK trade what they do not know however is: - this October will make it 12 months since i've held that position & i'm yet to sell a token - i'll be up $50m to $100m on that single trade later this…


nk Reposted

AT&T, Verizon reportedly hacked to target US govt wiretapping platform - @Ionut_Ilascu bleepingcomputer.com/news/security/…">bleepingcomputer.com/news/security/… bleepingcomputer.com/news/security/…">bleepingcomputer.com/news/security/…


about to do a challenge on a memecoin to $5k. bought $bro 5,783.178132 ($5) -> sold $bro ($32.20) in one night. onto the next.


What kind of even question is this, it’s obviously A. Make sure target car’s unlocked. >Connect Autel scanner. >Go to “IMMO” functions. >Generate Smart Key (IYKYK) >Back-up IMMO data. >Save IMMO data. >Then your Emulated Key will be generated.

🔒🚗 Remote car hacking vulnerabilities are a growing concern in cybersecurity. Which component is most often targeted by attackers to gain unauthorized access to a vehicle? A) Engine Control Unit B) Infotainment System C) Brake System D) Airbags #Cybersecurity



lol, from back in June.

WikiLeaks Founder Pleads Guilty and is Sentenced for Conspiring to Obtain and Disclose Classified National Defense Information, @FBIWFO justice.gov/opa/pr/wikilea…



e366666666666666666666.

Tweet Image 1
Tweet Image 2
Tweet Image 3

better than any other kit out there for e46

Idk if this has been discussed before but this kit looks like a m3 gtr and a bn sports kit had a baby, and not in a good way

Tweet Image 1
Tweet Image 2
Tweet Image 3
Tweet Image 4


Y’all really believe that it just now has been updated to these terms? It’s been like this for a while, the CEO will never admit to it as it’ll be the downfall of Tele. Your info is never confidential, I don’t care what anyone says.

Telegram has updated its terms of service, stating that it will now share users' IP addresses, phone numbers, and other personal information with authorities when required by legal requests 👀

Tweet Image 1
Tweet Image 2


nk Reposted

#malware #Stealer #python c2 #Fraudae s://bundeskriminalamt[.]agency/login 83.136.208[.]208/login

Tweet Image 1

nk Reposted
Tweet Image 1

psychotic.

Tweet Image 1

nk Reposted

Bad news for the onion network. German prosecutors have been able to deanon Tor users since at least 2022 by tapping Tor Nodes over long time and then doing a timing analysis. Journalists saw documents related to at least one court case where this method was successful 4 times.

🇩🇪 prosecutors appear to be able to **deanonymize Tor ** by tapping servers, for years (!) and doing "timing analysis". In one case – Ricochet, related to CSAM – they did this four times, ordered telco provider to identify customer connecting to entry node tagesschau.de/investigativ/p…



nk Reposted

dear christ¡! 😵

Tweet Image 1
Tweet Image 2
Tweet Image 3

nk Reposted

⚠️ GitLab has released urgent patches for a critical CVSS 10.0 #vulnerability in both CE and EE versions, targeting a flaw in the ruby-saml library that could enable an authentication bypass. Read details here & act fast: thehackernews.com/2024/09/gitlab… #cybersecurity #hacking #devops


nk Reposted

nk Reposted

1/ An investigation into how Greavys (Malone Iam), Wiz (Veer Chetal), and Box (Jeandiel Serrano) stole $243M from a single person last month in a highly sophisticated social engineering attack and my efforts which have helped lead to multiple arrests and millions frozen.

Tweet Image 1
Tweet Image 2

beast x mini, sora v2, or mchose ax5?


In less than 72 hours, I disliked the keycaps on the TKL pro wireless, had to get pudding caps, also switched to glass skates on the Pulsar X2V2 🥸

Tweet Image 1
Tweet Image 2

LMAOOOOOOOOO I forgot abt this.

🇩🇪 prosecutors appear to be able to **deanonymize Tor ** by tapping servers, for years (!) and doing "timing analysis". In one case – Ricochet, related to CSAM – they did this four times, ordered telco provider to identify customer connecting to entry node tagesschau.de/investigativ/p…



Loading...

Something went wrong.


Something went wrong.