obiwan666 Profile Banner
Stephan - ObiWan666 - Gerling Profile
Stephan - ObiWan666 - Gerling

@obiwan666

Followers
2K
Following
19K
Media
3K
Statuses
27K

Bluesky @ObiWan666, Yacht Security, Firefighter, Security Evangelist, Speaker, IT & ICS Security, "Geraffel", IoT Hacker, Lingen (Ems)

Deutschland
Joined March 2012
Don't wanna be here? Send us removal request.
@obiwan666
Stephan - ObiWan666 - Gerling
11 hours
Working under the desk of a ship
0
0
0
@NullSecurityX
NullSecX
7 days
New XSS Bypass Cloudflare WAF 🧱 Payload : %3CSVG/oNlY=1%20ONlOAD=confirm(document.domain)%3E #BugBounty #XSS #Cybersecurity
10
200
1K
@71_tiller
Datendieb ✌🏻🕊️
7 days
So macht man Kohle... Was eine Sauerei!
177
788
3K
@PR0GRAMMERHUM0R
Programmer Humor
9 days
losingAFewPackets https://t.co/Y8A5a6CFY6
26
317
5K
@TakSec
Mike Takahashi
13 days
Google Dork - Code Leaks 🔑 site:pastebin. com "example. com" site:jsfiddle. net "example. com" site:codebeautify. org "example. com" site:codepen. io "example. com" Check for code snippets, secrets, configs 👀
1
82
416
@SecurityTrybe
Security Trybe
13 days
16
89
1K
@teraytech
13 days
Did you know? The FCC report for the iPhone 16e revealed several system block diagrams and partial schematics That's really cool stuff. You can see how they used 10 antennas, definitely the most complex RF system I’ve ever seen. https://t.co/AqYhgAXf4r
19
143
1K
@wh1t3h4ts
root㉿kali
14 days
21 dark web tools for OSINT professionals
4
205
1K
@Officialwhyte22
Winston Ighodaro
15 days
I reverse engineered an executable and discovered it was a covert SSH beacon connecting to a remote Russian server. Static analysis using strings revealed an embedded C2 domain, while behavioral analysis showed the malware silently exfiltrating desktop screenshots and saved data.
41
150
1K
@mattjay
Matt Johansen
16 days
Oh no. A lot of people gonna have a bad day.
46
212
2K
@IrenaBuzarewicz
Irena Buzarewicz
18 days
16
140
787
@RedDrip7
RedDrip Team
19 days
JS and Python malware related to #APT #Lazarus Some previously disclosed C2 infrastructure are re-used and JS malware adopts enchanced obfuscation (JS) c45e17f689af29f8b7fdbde750d3c965 6e10cd626b05272a064aae17b1314d41 81098a09be7333eaed14177f36ebe5f9
1
16
68
@securityweekly
Paul Asadoorian @[email protected]
26 days
The movie "Hackers" was released 30 years ago today. It still stands as my favorite hacker movie. What is your favorite "Hackers" movie quote? Here are some reasons why it remains my favorite: - The hacker handles suggested by Joey were aliases of real hackers (at the time) -
67
107
708
@cyberwar_15
CyberWar - 싸워
27 days
Kimsuky used AI deepfake-generated ID cards via ChatGPT to impersonate a South Korean defense institution in an APT spear-phishing attack. https://t.co/15Tpl2AGHT #Kimsuky #ChatGPT #Deepfake
6
82
460
@MartinZugec
MartinZugec
1 month
This Bitdefender Labs report analyzes a cyberattack by Chinese APT group targeting a military company in the Philippines. We found a new and advanced fileless malware toolset that we called EggStreme framework. Including GitHub repo for IOCs + live AMA
Tweet card summary image
businessinsights.bitdefender.com
Bitdefender Labs uncovers details of a new, fileless malware framework called EggStreme. Read the blog to learn how this multi-stage toolset operates.
1
17
70
@blackorbird
blackorbird
1 month
#APT28 Espionage Tool Provides Backdoor Access to Microsoft Outlook https://t.co/zOXG0PVuNz
0
60
188
@N_Schmid
N. Schmid ⚡️☀️💨💧🔋
1 month
E-Autos haben keinen rumpligen Leerlauf https://t.co/Ojr2Vw0SQC
105
9
145
@blackorbird
blackorbird
1 month
A Comprehensive Analysis of Leaks https://t.co/NbYjjX41Mh
@blackorbird
blackorbird
2 months
#APT #Kimsuky WorkSpace Dataleaks Saw a lot of familiar things. https://t.co/TgSa57auUy
0
13
44
@antriksh_s
Antriksh (Yoda) #hardwear_ioNL2025
1 month
Guess who just walked in at #NullconBerlin2025 Felix ‘FX’ Lindner @41414141 … it’s an honour to host you …
2
4
34
@gunsnrosesgirl3
Science girl
1 month
A brand-new luxury yacht, valued at $1M USD, sank just 15 minutes after its maiden launch.
6K
8K
113K