David Corvin
@davidcorvin.bsky.social
Ethical hacker on tryhackme,i do pentesting ,bugbounty, and in free time i like to work on ai to invent new things
i like talking about politics, technologies and hacking . if you want to talk about these feel free to DM me .
i like talking about politics, technologies and hacking . if you want to talk about these feel free to DM me .
Hydra is a popular password-cracking tool used for conducting brute-force attacks on various protocols and services. It supports numerous protocols, including HTTP, FTP, SSH, and more, allowing users to test the strength of passwords on these services. #Ethicalhacking Key features of Hydra include:
October 27, 2025 at 8:27 AM
Hydra is a popular password-cracking tool used for conducting brute-force attacks on various protocols and services. It supports numerous protocols, including HTTP, FTP, SSH, and more, allowing users to test the strength of passwords on these services. #Ethicalhacking Key features of Hydra include:
Metasploit is a penetration testing framework that enables security professionals to find and exploit vulnerabilities in systems. Metasploit is widely used for ethical hacking and security assessment, helping professionals identify weaknesses in their systems. Its key features include: #Hacking
October 26, 2025 at 8:42 AM
Metasploit is a penetration testing framework that enables security professionals to find and exploit vulnerabilities in systems. Metasploit is widely used for ethical hacking and security assessment, helping professionals identify weaknesses in their systems. Its key features include: #Hacking
Nmap (Network Mapper) is a powerful open-source tool used for network discovery and security auditing. It allows users to discover hosts and services on a computer network by sending packets and analyzing the responses. Key features of Nmap include: #Ethicalhacking #Cybersecurity
October 26, 2025 at 5:29 AM
Nmap (Network Mapper) is a powerful open-source tool used for network discovery and security auditing. It allows users to discover hosts and services on a computer network by sending packets and analyzing the responses. Key features of Nmap include: #Ethicalhacking #Cybersecurity
Gobuster is a high-performance directory/file, DNS and virtual host brute-forcing tool written in Go. It's designed to be fast, reliable, and easy to use for security professionals and penetration testers. #Ethicalhacking #Cybersecurity
October 25, 2025 at 4:15 AM
Gobuster is a high-performance directory/file, DNS and virtual host brute-forcing tool written in Go. It's designed to be fast, reliable, and easy to use for security professionals and penetration testers. #Ethicalhacking #Cybersecurity
that's a big concern.
A malicious network of YouTube accounts is publishing and promoting videos that lead to malware downloads.
The network has been active since 2021 and has published more than 3,000 malicious videos.
research.checkpoint.com/2025/youtube...
The network has been active since 2021 and has published more than 3,000 malicious videos.
research.checkpoint.com/2025/youtube...
October 24, 2025 at 12:57 PM
that's a big concern.
A.G.I will completely change this world.
"Right now, it feels as if Big Tech is throwing general-purpose A.I. spaghetti at the wall and hoping that nothing truly terrible sticks."
@garymarcus.bsky.social, the author of "Taming Silicon Valley," writes on the race toward A.G.I. for @nytimes.com:
@garymarcus.bsky.social, the author of "Taming Silicon Valley," writes on the race toward A.G.I. for @nytimes.com:
Opinion | Chatbots Are a Waste of A.I.’s Real Potential
Generative A.I. can do many things human beings can do. But that misses the point about how A.I. can truly benefit us.
nytimes.com
October 24, 2025 at 12:12 PM
A.G.I will completely change this world.
List — Hacking / Security OS and their capabilities
Kali Linux (Debian)
Use: General pentesting & offensive security
Capabilities: Metasploit, Nmap, Burp, wireless tools, forensics add-ons. Best for learning & industry-standard labs.
Kali Linux (Debian)
Use: General pentesting & offensive security
Capabilities: Metasploit, Nmap, Burp, wireless tools, forensics add-ons. Best for learning & industry-standard labs.
October 24, 2025 at 10:58 AM
List — Hacking / Security OS and their capabilities
Kali Linux (Debian)
Use: General pentesting & offensive security
Capabilities: Metasploit, Nmap, Burp, wireless tools, forensics add-ons. Best for learning & industry-standard labs.
Kali Linux (Debian)
Use: General pentesting & offensive security
Capabilities: Metasploit, Nmap, Burp, wireless tools, forensics add-ons. Best for learning & industry-standard labs.
The kernel you run shapes what you can and can’t do as a security researcher. Mainline (vanilla) Linux is the baseline — best for broad compatibility and up-to-date features.
October 24, 2025 at 10:51 AM
The kernel you run shapes what you can and can’t do as a security researcher. Mainline (vanilla) Linux is the baseline — best for broad compatibility and up-to-date features.
The kernel is the core of an operating system — it controls CPU scheduling, memory management, device drivers, and system calls. It’s the layer that translates app requests into hardware actions. 🔁
October 24, 2025 at 10:31 AM
The kernel is the core of an operating system — it controls CPU scheduling, memory management, device drivers, and system calls. It’s the layer that translates app requests into hardware actions. 🔁
There are always new tools being introduced in the field of hacking . Some recent tools focus on automation, threat detection, and penetration testing. Tools like Sn1per, Nmap, Metasploit, and Burp Suite continue to evolve, while newer ones like BloodHound and Cado Security are gaining traction.
October 24, 2025 at 3:51 AM
There are always new tools being introduced in the field of hacking . Some recent tools focus on automation, threat detection, and penetration testing. Tools like Sn1per, Nmap, Metasploit, and Burp Suite continue to evolve, while newer ones like BloodHound and Cado Security are gaining traction.
Ethical hacking is evolving rapidly with AI, cloud/IoT expansion, and new Zero Trust models, driving security professionals to adopt advanced tools and collaborative "purple teaming" to stay ahead of sophisticated threats. #EthicalHacking #Cybersecurity #AI.
October 24, 2025 at 3:27 AM
Ethical hacking is evolving rapidly with AI, cloud/IoT expansion, and new Zero Trust models, driving security professionals to adopt advanced tools and collaborative "purple teaming" to stay ahead of sophisticated threats. #EthicalHacking #Cybersecurity #AI.
The arc of AI is just started.
October 23, 2025 at 4:50 PM
The arc of AI is just started.
"Imagine a world where machines think, learn, and innovate like humans- that’s AGI. AI won’t just be a tool, but a partner in solving humanity’s biggest challenges: curing diseases, fighting climate change, and creating tech beyond imagination. Shaping it safely is key. #AGI #FutureOfAI #Innovation"
October 23, 2025 at 4:14 PM
"Imagine a world where machines think, learn, and innovate like humans- that’s AGI. AI won’t just be a tool, but a partner in solving humanity’s biggest challenges: curing diseases, fighting climate change, and creating tech beyond imagination. Shaping it safely is key. #AGI #FutureOfAI #Innovation"