Binni Shah Profile Banner
Binni Shah Profile
Binni Shah

@binitamshah

Followers
137,400
Following
186
Media
4,930
Statuses
33,845

Linux Evangelist, Malwares , Security Enthusiast, Investor, Contrarian , Neurology , Philanthropist , Reformist ,Sigma female. Born to break rules and banality

India | NY
Joined March 2009
Don't wanna be here? Send us removal request.
Explore trending content on Musk Viewer
Pinned Tweet
@binitamshah
Binni Shah
9 hours
rustdesk : An open-source remote desktop application designed for self-hosting (as an alternative to TeamViewer) :
Tweet media one
0
28
88
@binitamshah
Binni Shah
4 months
Reverse-engineering and “running Windows 95” on a disposable vape with a colour LCD screen :
Tweet media one
Tweet media two
66
809
8K
@binitamshah
Binni Shah
7 years
We have patched the vulnerability you reported
Tweet media one
78
4K
7K
@binitamshah
Binni Shah
7 years
RJ45 building + RJ11
Tweet media one
23
2K
3K
@binitamshah
Binni Shah
2 years
How I Hacked my Car : Part 2: Making a Backdoor : Part 3: Making Software : Guides - Creating Custom Firmware :
Tweet media one
54
821
3K
@binitamshah
Binni Shah
6 years
Saw something beautiful ,worth sharing
Tweet media one
20
1K
3K
@binitamshah
Binni Shah
5 years
How HTTPS Works : Part 1 : Why do we need HTTPS : 2 : The keys : 3 : The handshake : 4 : HTTPS , SSL ,TLS differences : 5 :
16
1K
3K
@binitamshah
Binni Shah
6 years
I had this pinned on my pin board for many years - Piece of sanity & wisdom
Tweet media one
40
645
2K
@binitamshah
Binni Shah
5 years
lazydocker : A simple terminal UI for both docker and docker-compose :
24
666
2K
@binitamshah
Binni Shah
6 years
Interactive map of Linux kernel :
Tweet media one
7
1K
2K
@binitamshah
Binni Shah
4 years
Python 3 Cheatsheet :
Tweet media one
Tweet media two
14
569
2K
@binitamshah
Binni Shah
5 years
How to make a Mini Black Hole in 140 bytes of Javascript! : cc @KilledByAPixel
27
510
2K
@binitamshah
Binni Shah
5 years
How to build a TCP proxy (Part 1) : Intro : Fake DNS Server (Part 2) : Proxy Server (Part 3) : Fake Certificate Authority (Part 4) : cc @RobJHeaton
12
762
2K
@binitamshah
Binni Shah
1 month
Hackberry-Pi_Zero : A handheld Linux terminal using Raspberry pi Zero 2W as Core with 4' 720X720 TFT display :
Tweet media one
Tweet media two
19
350
2K
@binitamshah
Binni Shah
3 years
Ever wondered what happens when you type in a URL in an address bar in a browser? :
Tweet media one
22
542
2K
@binitamshah
Binni Shah
2 years
There's now an Internet Explorer gravestone in South Korea👻 - Time for cyber cemetery ?🧐
Tweet media one
47
311
2K
@binitamshah
Binni Shah
6 years
One of the most innovative 404 page's I have come across
Tweet media one
19
825
2K
@binitamshah
Binni Shah
4 years
Imhex : A Hex Editor for Reverse Engineers, Programmers and people that value their eye sight when working at 3 AM : credits @WerWolv
Tweet media one
Tweet media two
20
492
2K
@binitamshah
Binni Shah
3 years
unredacter : Never ever ever use pixelation as a redaction technique : credits @2600AltF4
14
615
2K
@binitamshah
Binni Shah
4 years
Exploiting the Nespresso smart cards for fun and profit :
Tweet media one
Tweet media two
24
360
2K
@binitamshah
Binni Shah
5 years
I don't know how CPUs work so I simulated one in code : cc @djhworld
Tweet media one
35
506
2K
@binitamshah
Binni Shah
2 years
tproxy : A cli tool to proxy and analyze TCP connections :
Tweet media one
Tweet media two
30
326
2K
@binitamshah
Binni Shah
2 years
ImHex : A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM : credits @WerWolv
Tweet media one
28
354
2K
@binitamshah
Binni Shah
5 months
Building My First Homelab Server Rack : credits @deliberatecoder
Tweet media one
34
137
2K
@binitamshah
Binni Shah
6 years
SSL/TLS for dummies (Part 1): Ciphersuite, Hashing,Encryption : , Part 2: Understanding key exchange algorithm : 3: Understanding Certificate Authority : 4: TLS Handshake Protocol :
7
755
2K
@binitamshah
Binni Shah
5 years
usbrip : Simple command line forensics tool for tracking USB device artifacts (history of USB events) on GNU/Linux :
Tweet media one
11
630
2K
@binitamshah
Binni Shah
6 years
Exploits & Tools Search Engine :
8
732
2K
@binitamshah
Binni Shah
7 years
Mining Bitcoin with pencil and paper (0.67 hashes per day) : , Demo : cc @kenshirriff
Tweet media one
20
750
2K
@binitamshah
Binni Shah
5 years
SSH Pentesting Guide - A Comprehensive Guide to Breaking SSH :
12
573
1K
@binitamshah
Binni Shah
6 years
wtf : A personal information dashboard for your terminal :
Tweet media one
15
475
1K
@binitamshah
Binni Shah
6 years
Big sigh ! I'm not alone to struggle w/ this
Tweet media one
13
433
1K
@binitamshah
Binni Shah
6 years
: the only cheat sheet you need :
Tweet media one
7
565
1K
@binitamshah
Binni Shah
9 years
maybe : See what a program does before deciding whether you really want it to happen :
Tweet media one
18
1K
1K
@binitamshah
Binni Shah
2 years
The Cyberclopaedia : Linux Privilege Escalation Now for Free on the Cyberclopaedia! :
Tweet media one
58
437
1K
@binitamshah
Binni Shah
5 years
Real-Time-Voice-Cloning : Clone a voice in 5 seconds to generate arbitrary speech in real-time : Transfer Learning from Speaker Verification to Multispeaker Text-To-Speech Synthesis : (pdf) Demo :
Tweet media one
21
598
1K
@binitamshah
Binni Shah
4 years
Interactive Map of Linux Kernel : (Below is taken from wikipedia)
Tweet media one
9
426
1K
@binitamshah
Binni Shah
2 months
BlueSpy - PoC to record audio from a Bluetooth device : credits @Tarlogic
Tweet media one
6
254
1K
@binitamshah
Binni Shah
4 years
Python in one image :
Tweet media one
7
377
1K
@binitamshah
Binni Shah
6 years
Tsurugi Linux : A heavily customized Linux distro designed for DFIR investigations, malware analysis and Open Sourced intelligence activities : cc @Sug4r7 || @blackmoon105 || tsurugi_linux
Tweet media one
8
528
1K
@binitamshah
Binni Shah
3 years
Reverse Engineer's Toolkit : This is a collection of tools you may like if you are interested on reverse engineering and/or malware analysis on x86 and x64 Windows systems :
13
389
1K
@binitamshah
Binni Shah
7 years
Tweet media one
27
296
1K
@binitamshah
Binni Shah
4 years
Infection Monkey : An automated pentest tool ( The Infection Monkey is an open source security tool for testing a data center's resiliency to perimeter breaches and internal server infection) :
Tweet media one
Tweet media two
Tweet media three
Tweet media four
6
308
1K
@binitamshah
Binni Shah
3 years
modern-unix : A collection of modern/faster/saner alternatives to common unix commands :
Tweet media one
9
331
1K
@binitamshah
Binni Shah
5 years
Shodan Hacking Guide :
1
435
1K
@binitamshah
Binni Shah
2 years
Offensive Software Exploitation (OSE) Course : credits @binaryz0ne Ref : HTID (Hacking Techniques and Intrusion Detection) :
Tweet media one
27
347
1K
@binitamshah
Binni Shah
9 years
Git CheatSheet :
Tweet media one
10
479
1K
@binitamshah
Binni Shah
3 years
Somebody is stealing a pack of Doritos from a store 🐦
40
201
1K
@binitamshah
Binni Shah
6 years
Part 1 – Reverse Engineering Basics – Linux x64 : , Part 2 – Reverse Engineering Basics – Windows x64 : , Part 2-2 XOR encryption – Windows x64 : , Part 3 – Linux on ARM64 :
4
458
1K
@binitamshah
Binni Shah
6 years
Never connect to ProtonMail using Chrome - in fact stop using Google at all* if you are privacy concerned :
Tweet media one
42
695
983
@binitamshah
Binni Shah
6 months
BlueSpy - PoC to record audio from a Bluetooth device : Spying on Bluetooth conversations :
Tweet media one
9
281
1K
@binitamshah
Binni Shah
2 years
Network Attacks :
Tweet media one
5
242
981
@binitamshah
Binni Shah
6 years
How to build your own Rogue GSM BTS for fun & profit : cc @evilsocket
Tweet media one
7
404
974
@binitamshah
Binni Shah
2 years
Malware development : Part 1: 2: 3: 4: 5: 6: 7: 8: 9:
31
315
960
@binitamshah
Binni Shah
6 years
The Illustrated TLS Connection - Every byte of a TLS connection explained and reproduced : cc @xargsnotbombs
Tweet media one
8
408
946
@binitamshah
Binni Shah
6 years
Writing a Simple Operating System — from Scratch : (pdf || 77 pgs) The little book about OS development :
6
377
938
@binitamshah
Binni Shah
5 years
The Art of Hacking : awesome-security : awesome software, libraries, doc, books, resources & cools stuffs about security : Penetration-Testing : : Awesome Pentest Cheat Sheets :
4
358
930
@binitamshah
Binni Shah
4 years
Vim cheat sheet (basic) :
Tweet media one
6
286
919
@binitamshah
Binni Shah
4 months
How 18-Year-Old Me Discovered a VirtualBox VM Escape Vulnerability : credits @j0nathanj
Tweet media one
11
165
913
@binitamshah
Binni Shah
4 years
Hacking Nissan Car - Documentation and code for rooting and extending a Bosch car head unit (lcn2kai) :
Tweet media one
16
255
903
@binitamshah
Binni Shah
5 years
ReversingHero : Learn Reverse Engineering (on 64bit Linux / 15 levels) :
7
303
900
@binitamshah
Binni Shah
6 months
We Hacked Google A.I. for $50,000 : credits @0xLupin @rez0__ @Rhynorater
Tweet media one
12
163
902
@binitamshah
Binni Shah
3 years
GHunt : Introducing an OSINT tool to investigate Google Accounts to find their real name, physical location, devices , their devices etc : credits @mxchreborn
Tweet media one
8
268
892
@binitamshah
Binni Shah
6 years
Write your Own Virtual Machine :
8
346
891
@binitamshah
Binni Shah
7 years
gitleaks : Searches full repo history for secrets and keys (faster than trufflehog)
5
435
871
@binitamshah
Binni Shah
2 years
How I hacked into a Telecom Network — Part 1 (Getting the RCE) : Part 2 : TCP Tunneling : 3 : Stealthy SSH & Dynamic Tunnels :  4 :Getting Access to CDRs, SS7 applications & VLRs:
11
236
881
@binitamshah
Binni Shah
5 years
ffsend : Easily and securely share files (up to 2GB) from the command line through a safe, private and encrypted link using a single simple command (A fully featured Firefox Send client) :
Tweet media one
8
310
854
@binitamshah
Binni Shah
6 months
Reversing for dummies - x86 assembly and C code (Beginner/ADHD friendly) :
Tweet media one
2
213
860
@binitamshah
Binni Shah
7 years
Passhunt - a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors and their 2084 default passwords : cc @ManiarViral
Tweet media one
4
373
849
@binitamshah
Binni Shah
4 years
Reverse Shell Generator :
Tweet media one
2
328
843
@binitamshah
Binni Shah
4 years
qrcp : Transfer files over wifi from your computer to your mobile device by scanning a QR code without leaving the terminal : cc @daw985
8
305
834
@binitamshah
Binni Shah
4 years
How I Hacked Into Apple, Microsoft and Dozens of Other Companies - The Story of a Novel Supply Chain Attack : credits @alxbrsn
Tweet media one
Tweet media two
9
226
817
@binitamshah
Binni Shah
6 years
hexyl : A command-line simple hex viewer for terminal (It uses a colored output to distinguish different categories of bytes (NULL bytes, printable ASCII characters, ASCII whitespace characters, other ASCII characters and non-ASCII) ) : cc @sharkdp86
Tweet media one
Tweet media two
Tweet media three
11
316
826
@binitamshah
Binni Shah
30 days
Creating Undetectable Windows Malware (Villain C2 Framework+ PowerShell Obfuscation + Undetectable Delivery) :
Tweet media one
4
207
842
@binitamshah
Binni Shah
5 years
Learn Assembly language from scratch : x64 Assembly for the advanced :
6
318
820
@binitamshah
Binni Shah
9 months
Reverse engineering reveals code causing Polish trains lock up when serviced in third-party workshops : (Polish -->TR*)
Tweet media one
Tweet media two
10
126
812
@binitamshah
Binni Shah
7 months
Building a Password Cracker :
Tweet media one
Tweet media two
32
100
807
@binitamshah
Binni Shah
6 months
Malware Hiding in PDFs : What You Need to Know :
Tweet media one
Tweet media two
8
226
814
@binitamshah
Binni Shah
5 years
A 9-step recipe to crack a NTLMv2 Hash from a freshly acquired .pcap : cc @801Labs
4
333
801
@binitamshah
Binni Shah
27 days
ImHex : A Hex Editor for Reverse Engineers, Programmers and people who value their retinas when working at 3 AM : credits @WerWolv
Tweet media one
Tweet media two
10
172
813
@binitamshah
Binni Shah
5 years
TheFatRat : an exploiting tool which compiles a malware w/ famous payload, and then the compiled maware can be executed on Linux , Windows , Mac and Android. It provides an Easy way to create Backdoors and Payload which can bypass most anti-virus :
Tweet media one
6
307
791
@binitamshah
Binni Shah
3 years
Was skimming through this while the last point cracked me up
Tweet media one
32
121
792
@binitamshah
Binni Shah
6 years
Cracking an Encrypted External Hard Drive (Part 1): , Part 2 :
Tweet media one
3
378
765