Explore tweets tagged as #CyberExplorer
@cyberexplorer0
cyberexplorer010
29 days
Jumping on this notepad++ hack bandwagon. Intriguing history of Self signed TLS certificates with CN=wiresguard[.]com. One even appears to have been trusted but never used. 🤔🤔 What do you all make of this?
3
3
4
@cyberexplorer0
cyberexplorer010
29 days
Hmmm, so which ones were in use I wonder. https://t.co/bvnCO79ld4
0
0
0
@cyberexplorer0
cyberexplorer010
29 days
What's more, the oldest cert was first seen back in March 2025 on the 24th. 5 days after the domain was first acquired going by domain tools (2025-03-19).
0
0
0
@StielAscon
AsconStiel
8 months
Just Cyberexplorer Unknown Intergalactic Biometical Yager with it new body #Digitalart #Oc #CuibyAsconStiel
1
0
1
@cyberexplorer0
cyberexplorer010
9 months
@skocherhan Lol- There's noway this actually works... right? .... Right? :P
0
0
1
@bisi4ka123
Kateryna Petrochenko | EthicalAI🦾🧜🏼‍♀️✨ 📡 🐋🌐
1 year
🔍 Exploring the digital realm is like digging for the vinyl - only here, it’s blockchains, AI, and pure algorithmic magic. #DigitalDimension #Blockchain #AI #CyberExplorer #FutureNow
0
0
1
@cyberexplorer0
cyberexplorer010
10 months
@ShanHolo Did you spot this? :D tiworker.exe also calls out to 1145785a[.]buzz which resolved to two ip's 38[.]6.155.18 and 38[.]55.237.221 all with very similar lets encrypt TLS certs with fake 'domains' some that don't appear to ever resolve. 38[.]55.237.221 TLS seems blank too.
1
1
1
@cyberexplorer0
cyberexplorer010
9 months
@skocherhan @ShanHolo Onto a trail? (services.jarm.fingerprint: 00000000000000000041d41d0000001798d6156df422564fb9b667b7418e4c) and autonomous_system.name=`AS-COLOCROSSING` Perhaps all these are also related? or maybe one pivot too far! 🤔🤔
0
2
1
@cyberexplorer0
cyberexplorer010
9 months
@skocherhan Nice one, looks like a pretty common Windows desktop name. 'DESKTOP-E4F55FE' over 1000 other hosts with the same one.
1
1
0
@cyberexplorer0
cyberexplorer010
9 months
@skocherhan Looks like it could be related to the ASN owner COLOCROSSING going by censys. Perhaps a specific windows build shipped on virtual machines? @skocherhan @ShanHolo
2
1
1
@TauheedulGirls
TIGHS
2 years
Big shoutout to our awesome Y9 students as they embark on the Cyber Explorer Competition. They’re ready to soar to new heights! #CyberExplorer Cup #TechSkills #WeAreStar
0
1
1
@cyberexplorer0
cyberexplorer010
6 months
@cyberfeeddigest Looks to be open across two different ip addresses with the same hostnames. same HTTP e-tag but different SSH host keys. Nice bit of load balancing across 2 ip's I suppose! :D
0
1
0
@cyberexplorer0
cyberexplorer010
9 months
@skocherhan @JAMESWT_WT @500mk500 @k3dg3 Looks like there's also a Powershell file with two versions of the same name. It calls out to the domains @skocherhan mentioned above. As well as the domain bkngrvffy[.]com which, is what the file is named after: bkngrvffy2[.]com.ps1 bkngrvffy[.]com.ps1
1
3
2
@cyberexplorer0
cyberexplorer010
11 days
@banthisguy9349 @blackbigswan Great find! That email is mentioned as a co-author in GitHub... with GitHub name: ppcp360 -> not delved into what repo's there are... but that's intriguing!
1
1
0
@cyberexplorer0
cyberexplorer010
6 months
Ransomware notes found on open RDP tunnels. About 30 devices compromised by a single group/actor. familiar to anyone? >> #ransomware #ThreatIntel #malware
0
0
0
@bilang626
比浪AI出海
1 month
I'm claiming my AI agent "CyberExplorer_01" on @moltbook 🦞 Verification: seabed-7TFT
0
0
0
@cyberexplorer0
cyberexplorer010
29 days
https://t.co/2dUPj6T0el Ioc's included in Rapid7's initial infection chain research.
0
0
0
@Sector_Surf_
CyberExplorer💧
20 days
@daily_ai_tools_ What makes this orchestration platform different from existing solutions?
1
0
0