Kodama
banner
kodamachameleon.com
Kodama
@kodamachameleon.com
Threat Intel | OSINT | Programming | Cybersecurity MSc Student

🌐 https://kodamachameleon.com
Pinned
I realize changing colors platform to platform might leave some to wonder... so I made a nice, shiny new logo to tie them all together. Look for the K built from Penrose shapes. Why Penrose? I guess I'm just fascinated with making something from the impossible.

kodamachameleon.com
Kodama Chameleon - Strange Cyber Tails Caught in the Wild
Strange Cyber Tails Caught in the Wild
kodamachameleon.com
October 27, 2025 at 2:05 PM
Reposted by Kodama
Discord confirms a data breach through a third-party vendor, exposing user IDs, emails, and even government IDs. Meanwhile, hackers on #Telegram claim responsibility.

Read: hackread.com/discord-data...

#Discord #DataBreach #CyberSecurity #Privacy #InfoSecurity #Hacking
Discord Data Breach: Hackers Access IDs, Billing Details and Support Chats
Follow us on Bluesky, Twitter (X), Mastodon and Facebook at @Hackread
hackread.com
October 4, 2025 at 4:36 PM
Reposted by Kodama
License plate readers are growing fast. These days, they are cheap to own and operate. Essentially, a $100 burner phone with a $5/month prepaid account can be made into a license plate reader. It's gonna solve a lot of crime, making it impractical to drive anywhere to commit crime.
September 29, 2025 at 9:09 PM
🎉🎉 Excited to announce the launch of Twiliompus. A Discord phone verification bot using the Twilio API.

github.com/kodamaChamel...

#GitHub #Discord #Bots #Twilio #phoneverification
GitHub - kodamaChameleon/Twiliompus: Discord bot for Twilio Phone Lookups
Discord bot for Twilio Phone Lookups. Contribute to kodamaChameleon/Twiliompus development by creating an account on GitHub.
github.com
September 24, 2025 at 4:02 PM
🦓 Exploring why this default security strategy often misses the mark, and how security professionals can communicate more effectively.
#CyberAwareness #SecurityMindset #OnlineSafety
Security by Anonymity
Most of us in the security profession have heard the term “security through obscurity”—the flawed model that assumes systems are […]
kodamachameleon.com
September 15, 2025 at 10:54 AM
Reposted by Kodama
Salesloft breach dates back to March and originated from the company's GitHub account, per a new update

trust.salesloft.com?uid=Update+o...
September 7, 2025 at 3:40 PM
Reposted by Kodama
I don't know anyone from Obsidian (at least, I'm not aware if i do) but this take is :chef's kiss: spot on accurate and more folks need to recognize this across ecrime, and even state-sponsored ops:
September 2, 2025 at 9:13 PM
I realize changing colors platform to platform might leave some to wonder... so I made a nice, shiny new logo to tie them all together. Look for the K built from Penrose shapes. Why Penrose? I guess I'm just fascinated with making something from the impossible.

kodamachameleon.com
Kodama Chameleon - Strange Cyber Tails Caught in the Wild
Strange Cyber Tails Caught in the Wild
kodamachameleon.com
September 2, 2025 at 11:40 PM
... I figured this chameleon ought to learn something about the software development process formally for a change. I was in for a bit of a surprise!

#omscy #cs6300 #gatech #cybersecurity
Software Dev Process
As someone who can easily find themselves up past midnight coding for fun, I figured this chameleon ought to learn […]
kodamachameleon.com
August 12, 2025 at 5:53 PM
It should come as no surprise to those of us who remember what happened with #polyfill.io that the FBI has tied #funnull to #pigbutchering.

www.ic3.gov/CSA/2025/250...
www.ic3.gov
June 5, 2025 at 4:04 AM
Anyone else come across this crypto scam technique? Same website templates, new hook. Stay safe out there!

#crypto #scam #x #twitter #blog

kodamachameleon.com/2025/06/02/1...
$1.8M in My DMs? Must Be Love
Just when you think you’ve got the whole crypto investment scam playbook memorized...
kodamachameleon.com
June 2, 2025 at 5:48 PM
Not often do #privacy professionals and child safety advocates get to celebrate the same legislation as the most recent #takeitdown act. Enforcement and abuse will undoubtedly be an issue, but let’s not let best be the enemy of the good.

www.yahoo.com/news/down-ac...
How the Take It Down Act tackles nonconsensual deepfake porn − and how it falls short
A bill with broad bipartisan support aims to take on AI-generated sexual abuse, but enforcement issues and privacy blind spots could leave victims just as vulnerable.
www.yahoo.com
May 11, 2025 at 7:09 PM
We're back! After a long break, our latest blog has finally been released. This one's on counter-fraud, a world I find myself investigating more and more. Enjoy, and feedback is always welcomed!

#fraud #scams #socialmedia #FTC #ICANN

kodamachameleon.com/2025/04/11/s...
Social Mayhem: Fighting Fraudsters Ain't Fair
Humans crave connection. Am I right? I mean, that's pretty much what they were created for, and when that slithering serpent (a.k.a. disgraced reptile) got them...
kodamachameleon.com
April 11, 2025 at 5:53 PM
Reposted by Kodama
NEW: 🚨 Hackers are actively exploiting #ChatGPT's CVE-2024-27564 vulnerability, with 10,000+ attacks recorded in a week!

Read: hackread.com/hackers-expl...

#CyberSecurity #OpenAI #Vulnerability #AI
Hackers Exploit ChatGPT with CVE-2024-27564, 10,000+ Attacks in a Week
Follow us on Bluesky, Twitter (X) and Facebook at @Hackread
hackread.com
March 17, 2025 at 9:36 PM
Just watched @pexx’s walkthrough of WhatsMyName-Docker. Awesome breakdown of how to streamline username enumeration! Huge thanks for the detailed walkthrough. Check it out at youtu.be/oqxRg4EBeNA!

#WhatsMyName #OSINT #Docker
Automating OSINT... | What's My Name Docker Walkthrough
YouTube video by pexx
youtu.be
February 17, 2025 at 8:38 PM
Reposted by Kodama
Silent Push has discovered a Chinese CDN that rents IPs from major could providers and makes them available to various cybercrime operations.

FUNNULL has hosted phishing portals, online romance scams, and gambling sites linked to money laundering operations.

www.silentpush.com/blog/infrast...
Infrastructure Laundering: Silent Push Exposes Cloudy Behavior Around FUNNULL CDN Renting IPs from Big Tech
Infrastructure Laundering is a criminal practice of intermediaries enabling threat actors to hide infrastructure with major cloud providers.
www.silentpush.com
February 1, 2025 at 9:28 PM
Reposted by Kodama
New Blog! Tracking Adversaries: Ghostwriter APT Infrastructure 🇧🇾

blog.bushidotoken.net/2025/01/trac...
Tracking Adversaries: Ghostwriter APT Infrastructure
CTI, threat intelligence, OSINT, malware, APT, threat hunting, threat analysis, CTF, cybersecurity, security
blog.bushidotoken.net
January 20, 2025 at 10:35 AM
Not really in a position to investigate this myself, so if anyone else wants to pay my “urgent toll bills” at https://ezdrive.com-hgyz[.]top/us, would love for you to tell me what you find.

#scam #fraud #cybersecurity #smishing
January 14, 2025 at 6:38 PM
Reposted by Kodama
Discover techniques to identify origin IPs behind Web Application Firewalls (WAFs). Professionals emphasize ethical practices while using various tools for this task. Understanding these methods can enhance #cybersecurity efforts. Stay informed about the challenges in addressing #threats to web appl
Techniques for Identifying Origin IPs Behind WAFs
The article discusses techniques and tools used by cybersecurity professionals to uncover the origin IP addresses of websites protected by Web Application Firewalls, emphasizing the importance of ethical considerations in this process.
decrypt.lol
December 31, 2024 at 11:21 PM
🚀 Exciting News! WhatsMyName-Docker v1.1.0 is Here!

I am thrilled to announce the latest update to WMN-Docker, packed with amazing new features and enhancements!

👉 github.com/kodamaChamel...

#WhatsMyName #OpenSource #OSINT #Docker #TechRelease
GitHub - kodamaChameleon/wmn-docker: Docker API Wrapper over WhatsMyName OSINT Username Enumeration Tool
Docker API Wrapper over WhatsMyName OSINT Username Enumeration Tool - kodamaChameleon/wmn-docker
github.com
December 31, 2024 at 3:43 PM
Reposted by Kodama
parrottalks extension also affected (40k users) kkodiihpgodmdankclfibbiphjkfdenh
t.co/SMFH07Gnv8
December 27, 2024 at 2:26 AM
Classic #usps #scam at https://usps[.]com-tracking-xxxcv.cc/vip/. Site only renders on mobile. It asks for personal info and credit card details.

#cti #ioc #cybersecurity
December 19, 2024 at 9:13 PM
Reposted by Kodama
May have missed the bigger headline: MICROSOFT BUILDS REMOTE BACKDOOR INTO POPULAR DEVELOPMENT APP. What could possibly go wrong?

www.bleepingcomputer.com/news/securit...

#cybersecurity #cti #vscode #microsoft
Chinese hackers use Visual Studio Code tunnels for remote access
Chinese hackers targeting large IT service providers in Southern Europe were seen abusing Visual Studio Code (VSCode) tunnels to maintain persistent access to compromised systems.
www.bleepingcomputer.com
December 12, 2024 at 11:26 PM
May have missed the bigger headline: MICROSOFT BUILDS REMOTE BACKDOOR INTO POPULAR DEVELOPMENT APP. What could possibly go wrong?

www.bleepingcomputer.com/news/securit...

#cybersecurity #cti #vscode #microsoft
Chinese hackers use Visual Studio Code tunnels for remote access
Chinese hackers targeting large IT service providers in Southern Europe were seen abusing Visual Studio Code (VSCode) tunnels to maintain persistent access to compromised systems.
www.bleepingcomputer.com
December 12, 2024 at 11:26 PM
Reposted by Kodama
A classical example of supply chain attacks.
Nowadays, attackers more and more focus on 3rd party like github repository packages, be careful.
Here is an interesting article by wiz about the ultralytics infection :

www.wiz.io/blog/ultraly...

#cybersecurity #infosec #github #malware #hacking #AI
www.wiz.io
December 10, 2024 at 7:28 AM