@cyberwatch29's avatar

CyberWatch

@cyberwatch29

Cyber Security & Crypto enthusiast - Posts are mine (for real ^^)

140 Posts
40 Replies
206 Following
111 Followers
90 Mirrors


@cyberwatch29's avatar
CyberWatch
@cyberwatch29
This article might interest anyone who has an activity in media, education, small businesses. Russian intel FSB Center 16 has been using "Snake" implant as a cyber espionage tool for…
0 Comments
0 Likes
0 Mirrors

@cyberwatch29's avatar
CyberWatch
@cyberwatch29
OSINT TOOL : A Curated List of Awesome Telegram OSINT Tools, Sites & Resources https://github.com/ItIsMeCall911/Awesome-Telegram-OSINT
0 Comments
1 Likes
0 Mirrors

@cyberwatch29's avatar
CyberWatch
@cyberwatch29
Hi @stani.lens, as a cyber engineer, I usually share content from my field: news, tips, cyber tutorials. Recently, I realized that I can no longer publish content on Orb or…
0 Comments
0 Likes
0 Mirrors

@stani's avatar
Stani
@stani
Built on @memester-xyz.lens
attachment
49 Comments
829 Likes
228 Collects
225 Mirrors

@cyberwatch29's avatar
CyberWatch
@cyberwatch29
Hi all, since many weeks i posted cyber news on Phaver without seeing that it was not replicated on Lens, do u want me to share on lens theses posts?…
0 Comments
0 Likes
0 Mirrors

@cyberwatch29's avatar
CyberWatch
@cyberwatch29
This one is fun 😂😂
attachment
0 Comments
1 Likes
0 Collects
0 Mirrors

@cyberwatch29's avatar
CyberWatch
@cyberwatch29
How LNK Files Are Abused by Threat Actors [How LNK Files Are Abused by Threat Actors](https://www.intezer.com/blog/malware-analysis/how-threat-actors-abuse-lnk-files/) LNK files (aka Windows shortcuts) may seem simple, but threat actors can use them to execute…
attachment
0 Comments
1 Likes
0 Collects
0 Mirrors

@cyberwatch29's avatar
CyberWatch
@cyberwatch29
How LNK Files Are Abused by Threat Actors [How LNK Files Are Abused by Threat Actors](https://www.intezer.com/blog/malware-analysis/how-threat-actors-abuse-lnk-files/) LNK files (aka Windows shortcuts) may seem simple, but threat actors can use them to execute…
attachment
0 Comments
2 Likes
0 Collects
0 Mirrors

@cyberwatch29's avatar
CyberWatch
@cyberwatch29
Becareful: Mysterious leak of Booking.com reservation data is being used to scam customers [Mysterious leak of Booking.com reservation data is being used to scam customers](https://arstechnica.com/information-technology/2023/02/mysterious-leak-of-booking-com-reservation-data-is-being-used-to-scam-customers/) Somehow, scammers keep accessing customer reservation details,…
attachment
0 Comments
2 Likes
0 Collects
0 Mirrors

@cyberwatch29's avatar
CyberWatch
@cyberwatch29
Hack : How to Create Screen Recorder using Python [How to Create Screen Recorder using Python](https://morioh.com/p/9ed8250b6eec) In this video, we will show you how to create a screen recorder using python packages…
attachment
0 Comments
0 Likes
0 Collects
0 Mirrors

@cyberwatch29's avatar
CyberWatch
@cyberwatch29
Hack : How to Create Screen Recorder using Python [How to Create Screen Recorder using Python](https://morioh.com/p/9ed8250b6eec) In this video, we will show you how to create a screen recorder using python packages…
attachment
0 Comments
1 Likes
0 Collects
0 Mirrors

@cyberwatch29's avatar
CyberWatch
@cyberwatch29
IF YOU HAVEN’T PATCHED MICROSOFT PROCESS EXPLORER, PREPARE TO GET PWNED [Flaw in Microsoft Process Explorer under active attack](https://www.theregister.com/2023/04/24/microsoft_driver_aukill_ransomware/) AuKill abuses a deprecated tool to disable security processes ahead of the attack
attachment
0 Comments
4 Likes
0 Collects
0 Mirrors

@cyberwatch29's avatar
CyberWatch
@cyberwatch29
Cybersecurity : Finding Decoy Dog Toolkit via Anomalous DNS Traffic [Analyzing DNS Traffic for Anomalous Domains and Threat Detection | Infoblox](https://blogs.infoblox.com/cyber-threat-intelligence/cyber-threat-advisory/dog-hunt-finding-decoy-dog-toolkit-via-anomalous-dns-traffic/) Learn how Infoblox’s Threat Intelligence Group identified C2 servers in DNS…
attachment
0 Comments
2 Likes
0 Collects
0 Mirrors

@cyberwatch29's avatar
CyberWatch
@cyberwatch29
Cybersecurity : Tools used to scan suspicious email :
attachment
0 Comments
0 Likes
0 Collects
0 Mirrors

@luduvigo's avatar
luduvigo 🚀🚀🚀
@luduvigo
Hey, frens 👋. How to grow on Lens: Episode 0 to 500 followers 🔥 is out. https://luduvigo.substack.com/p/how-to-grow-on-lens-episode-0-to-500 I hope it can be helpful, and I am curious about your feedback. Let me know what…
attachment
150 Comments
920 Likes
492 Collects
524 Mirrors

@godthelens's avatar
ELI ◱ ◱
@godthelens
Hey 🌿
attachment
4 Comments
19 Likes
4 Collects
4 Mirrors

@cyberwatch29's avatar
CyberWatch
@cyberwatch29
Cybersec : penetration testing with gpt [GitHub - GreyDGL/PentestGPT: A GPT-empowered penetration testing tool](https://github.com/GreyDGL/PentestGPT) A GPT-empowered penetration testing tool. Contribute to GreyDGL/PentestGPT development by creating an account on GitHub.
attachment
0 Comments
2 Likes
0 Collects
0 Mirrors

@cyberwatch29's avatar
CyberWatch
@cyberwatch29
OSINT Most powerful OSINT tool ever [Most powerful OSINT tool ever](https://artem-maksymov.medium.com/most-powerful-osint-tool-ever-15158f9ffd4f) Have you ever find yourself obsessively searching for lists of the best OSINT tools, or tools that claim to be able…
attachment
0 Comments
3 Likes
0 Collects
0 Mirrors

@cyberwatch29's avatar
CyberWatch
@cyberwatch29
OSINT: How to find details of an person and may be used to Hack their accounts using “SOSINT” [How to find details of an person and may be used to Hack…
attachment
0 Comments
3 Likes
0 Collects
0 Mirrors

@cyberwatch29's avatar
CyberWatch
@cyberwatch29
I want to share a game that I follow since the beginning. The game has a token KOMPETE. First I thought it was a scam. Years later, the game is…
attachment
0 Comments
2 Likes
0 Collects
0 Mirrors

@cyberwatch29's avatar
CyberWatch
@cyberwatch29
❗️ Google ads push BumbleBee malware used by ransomware gangs [Google ads push BumbleBee malware used by ransomware gangs](https://www.bleepingcomputer.com/news/security/google-ads-push-bumblebee-malware-used-by-ransomware-gangs/) The enterprise-targeting Bumblebee malware is distributed through Google Ads and SEO poisoning that…
attachment
0 Comments
4 Likes
0 Collects
0 Mirrors

@zhutoop's avatar
Zhutoop
@zhutoop
Hello LENS wonderful start
attachment
21 Comments
344 Likes
129 Collects
179 Mirrors

@05063's avatar
Aod_Satoshi◱ ◱
@05063
When you’re unsure of what color shirt to wear, the outcome is😁💕 #Phaver #Lens
attachment
9 Comments
126 Likes
6 Collects
18 Mirrors

@cyberwatch29's avatar
CyberWatch
@cyberwatch29
GitHub - blacklanternsecurity/MANSPIDER: Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported! [GitHub - blacklanternsecurity/MANSPIDER: Spider entire networks for juicy files sitting…
attachment
0 Comments
2 Likes
0 Collects
0 Mirrors

@cyberwatch29's avatar
CyberWatch
@cyberwatch29
Who is it?
0 Comments
0 Likes
0 Collects
0 Mirrors

@cyberwatch29's avatar
CyberWatch
@cyberwatch29
Ways to Stay Anonymous Online 1. Use VPN 2. Using TOR Browser 3. Changing your IP Address 4. Changing your Proxy Chain 5. Changing your DNS Server 6. Spoofing your…
0 Comments
1 Likes
0 Collects
0 Mirrors

@karmawav's avatar
karma.wav
@karmawav
Can someone build this for @lensprotocol.lens? Music NFT banners 👀🌊🌿
attachment
24 Comments
103 Likes
40 Collects
55 Mirrors

@cyberwatch29's avatar
CyberWatch
@cyberwatch29
Penetration Testing Bible Explore more than 2000 Hacking Articles saved as PDF [GitHub - blaCCkHatHacEEkr/PENTESTING-BIBLE: articles](https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE) articles. Contribute to blaCCkHatHacEEkr/PENTESTING-BIBLE development by creating an account on GitHub.
attachment
0 Comments
5 Likes
0 Collects
0 Mirrors

@cyberwatch29's avatar
CyberWatch
@cyberwatch29
Social Media OSINT Resources and tools for: Facebook Instagram Discord Linkedin Snapchat [GitHub - cqcore/Social-Media-OSINT](https://github.com/cqcore/Social-Media-OSINT) Contribute to cqcore/Social-Media-OSINT development by creating an account on GitHub.
attachment
0 Comments
5 Likes
0 Collects
0 Mirrors

@cyberwatch29's avatar
CyberWatch
@cyberwatch29
Cybersecurity "Bypassing Windows Defender (10 Ways)" [FO-Sec :: Articles :: Bypassing Windows Defender](https://www.fo-sec.com/articles/10-defender-bypass-methods)
0 Comments
1 Likes
0 Collects
0 Mirrors