Sublime
An inspiration engine for ideas
next.
we hijacked cursor via jira mcp by submitting a support ticket
cursor harvests and exfiltrate all creds from your dev machine
and then reports back to the dev that "the 2-hour downtime that affected user transactions has been resolved"
#DEFCO... See more
Michael Barguryx.com
feeling sorry for @leojr94_
vibe coders check these before releasing real-world apps
- implement auth, JWT will do
- sanitize inputs, handle cors
- activate ddos protection (if available)
- firewall infra + IP filter
- secure API keys ... See more

DORK-RECON
I’m happy to announce DorkRecon; a powerful Cybersecurity & OSINT tool that leverages Google's search engine to expose vulnerabilities, sensitive data leaks, and public asset footprints through advanced dork queries.
#OSINT #Cybersecurity #Python #InfoSec https://t.co/vlHQbGIg37

Yesterday, I tried to find out where the Deepseek servers are located, but I couldn't because they are Cloudflare-protected. Just now, someone randomly sent me a link to: "CF-Hero is a reconnaissance tool that uses multiple data sources to discover the origin IP addresses of Cloudflare-protected web applications"

Nebula DevOps Penetration Testing Framework
Link: https://t.co/om1vdMpwBD... See more