adliwahid Profile Banner
Adli Wahid Profile
Adli Wahid

@adliwahid

Followers
2K
Following
34K
Media
335
Statuses
11K

Tweets are personal. Bee photos on Instagram https://t.co/X9rcu4SmNT

Brisbane, Queensland
Joined June 2009
Don't wanna be here? Send us removal request.
@adliwahid
Adli Wahid
24 hours
RT @Shadowserver: Thanks to a scan conducted by @leak_ix, we have shared SharePoint IPs confirmed vulnerable to CVE-2025-53770, CVE-2025-5….
0
18
0
@adliwahid
Adli Wahid
24 hours
RT @0x4D31: dropping this tonight (been meaning to for days but kept fixing and adding stuff hah). forcing myself to stop tweaking. shippi….
0
3
0
@adliwahid
Adli Wahid
3 days
RT @Suricata_IDS: Did you hear about our latest release? Suricata 8.0.0 is out now! Hear from longtime supporter and Suricata Evangelist, P….
0
6
0
@adliwahid
Adli Wahid
5 days
RT @Shadowserver: Alert: SharePoint CVE-2025-53770 incidents! In collaboration with @eyesecurity & @watchtowrcyber we are notifying comprom….
0
60
0
@adliwahid
Adli Wahid
12 days
RT @vanhoefm: Our research on open tunneling servers got nominated for the Most Innovative Research award :). The work will be presented by….
Tweet card summary image
github.com
Contribute to vanhoefm/tunneltester development by creating an account on GitHub.
0
47
0
@adliwahid
Adli Wahid
14 days
RT @TrendMicroRSRCH: Vidar, Lumma Stealer, and Rhadamanthys were among the most prominent infostealer families detected in #OperationSecure….
0
3
0
@adliwahid
Adli Wahid
14 days
RT @FranceskAlbs: "The powerful punishing those who speak for the powerless, it is not a sign of strength, but of guilt". Let's stand tall….
0
18K
0
@adliwahid
Adli Wahid
15 days
RT @a_greenberg: McDonald's uses an AI bot called "Olivia" for hiring. A pair of hackers found they could access every conversation job app….
Tweet card summary image
wired.com
Basic security flaws left the personal info of tens of millions of McDonald’s job-seekers vulnerable on the “McHire” site built by AI software firm Paradox.ai.
0
480
0
@adliwahid
Adli Wahid
17 days
RT @TrendMicroRSRCH: Attackers are exploiting misconfigured Docker #APIs to gain access to containerized environments, then using Tor to ma….
0
12
0
@adliwahid
Adli Wahid
20 days
RT @passthesaltcon: OVER x SLIDES & VIDEOS . 📣 #pts25 is now over, thanks so much to all 🙏. 🚨 As always, due to the 🔥 work of the team, you….
0
13
0
@adliwahid
Adli Wahid
21 days
RT @virusbtn: Elastic Security Labs has observed multiple campaigns that appear to be leveraging commercial AV/EDR evasion framework SHELLT….
0
16
0
@adliwahid
Adli Wahid
21 days
RT @0x4D31: built a tiny fingerprint-aware reverse proxy (on top of fingerproxy)—logs JA3, JA4, and JA4H fingerprints, and lets you ⛔️ bloc….
0
26
0
@adliwahid
Adli Wahid
21 days
RT @AmnestyUK: The documentary that the BBC refused to air showing the targeting, detainment and torture of medics in Gaza by Israeli autho….
0
17K
0
@adliwahid
Adli Wahid
22 days
RT @netresec: IOCs in blog post:.📡 91.92.120.101:62520.📡 91.92.120.101:65535.💾 711d9cbf1b1c77de45c4f1b1a82347e6.💾 6ff95e302e8374e4e1023fbec….
0
1
0
@adliwahid
Adli Wahid
28 days
RT @UNRWA: “#Gaza: the new aid distribution system has become a killing field. Over 400 starving people reported killed since it started o….
0
695
0
@adliwahid
Adli Wahid
2 months
RT @a_greenberg: When Ross Ulbricht received a mystery $31 million bitcoin donation Saturday, some guessed he was sending himself old Silk….
Tweet card summary image
wired.com
Crypto-tracing firm Chainalysis says the mysterious 300-bitcoin donation to the pardoned Silk Road creator appears to have come from someone associated with a different defunct black market: AlphaBay.
0
55
0
@adliwahid
Adli Wahid
2 months
RT @SecurityYamato: Updates for Hayabusa, Takajo and Suzaku released recently at AUSCERT and SINCON. While you will….
0
17
0
@adliwahid
Adli Wahid
3 months
RT @virusbtn: The DFIR Report has published data from an open directory associated with a ransomware affiliate, likely linked to the Fog ra….
0
39
0
@adliwahid
Adli Wahid
3 months
RT @netresec: Did you know that NetworkMiner parses the #njRAT protocol? The following artefacts are extracted from njRAT C2 traffic:.🖥️ Sc….
0
19
0
@adliwahid
Adli Wahid
3 months
RT @CERT_Polska_en: Do you really enjoy reverse engineering but keep stumbling into heavily obfuscated binary files? We've got you covered!….
Tweet card summary image
cert.pl
In this article we describe a basic deobfuscation technique by leveraging a code snippet substitution.
0
55
0