Twitter | Search | |
Search Refresh
John Opdenakker Jul 14
Hey Twitter. Who do you admire in Infosec and why?
Reply Retweet Like
Florian Hansemann Jul 9
Windows Privilege Escalation Guide
Reply Retweet Like
The AntiSocial Engineer Jul 11
twitter, meet LinkedIn IT people... I’ve explicitly warned this person before about oversharing information online, then today this... 🤷🏻‍♂️
Reply Retweet Like
Josh Jay Jul 10
Alright What is your go to pentesting laptop?
Reply Retweet Like
Rico Platano 🍌 Jul 15
Getting into infosec doesn’t have to be $$$. W/ a raspberry pi (~$40) you can learn * Linux operation & Administration * Programming or Scripting * Reverse Engineering & Forensics * Networking & Firewall mgnt * & A LOT MORE DM’s open
Reply Retweet Like
Elliot Alderson Jul 12
Many students asked my academic background by DMs and what is the best to do to work in . I will answer here: 1) I have a Master's Degree in Telecoms and Networks Engineering from . 2) There is not only one way to work in infosec, create your own!
Reply Retweet Like
Anis Muslić ⣢ Jul 11
Can this be considered as data leak?
Reply Retweet Like
Maite Ortega Jul 15
The UK CyberSlide features some of the most innovative cybersecurity companies in the UK: To add your cybersecurity company please fill the form available below:
Reply Retweet Like
Jennifer Aldoretta Jul 10
twitter: any tips on what keywords or legal jargon to look out for in Terms of Use / Privacy Policy documents that might indicate a company may be selling my data?
Reply Retweet Like
Florian Hansemann Jul 14
Brute Forcing Accounts that have logged onto an AD joined computer
Reply Retweet Like
Malwarebytes Jul 13
A great reminder of the regulatory risks surrounding digital tokens, via
Reply Retweet Like
Florian Hansemann Jul 15
Advanced Exploitation of SQL Injection to get Remote Code Execution
Reply Retweet Like
Xtoff is going to DEF CON! Jul 12
.:: PRO CYBER SECURITY TIP Create a file called flag.txt in the root directory of all of your servers and fill it with a string of garbage. That way if someone hacks into the servers, they'll think they're in a CTF and will give up, thinking that they've won!
Reply Retweet Like

Related searches

#osint · #cybersecurity · #bugbountytips · #hacker · ciso
Abugzlife Jul 15
New post about the not so special bugs out there. Hopefully this will help motivate beginners that are struggling to see the light at the end of the tunnel, and show some of the very simple, impactful bugs out there.
Reply Retweet Like
Michael Fisher Jul 13
Reply Retweet Like
Devon 17h
Grateful for co-workers encouraging me to learn and grow.
Reply Retweet Like
TCC 16h
Last family reunion, I taught some of my family how to use lastpass after they scared me to death with their password stories. One just sent me this. More work to be done.
Reply Retweet Like
Florian Hansemann Jul 14
Executing Metasploit & Empire Payloads from MS Office Document Properties (part 1 of 2)
Reply Retweet Like
Sebastien Meunier Jul 15
Reply Retweet Like
🤗 (((Jayson E. Street))) 🤗 20h
I’m not saying I’m overly excited about speaking at .... I’m just saying I’M HERE WHERE IS EVERYONE!!!!! 😁 Actually here to give a talk to people outside of but they still want to learn which is awesome!!! 😊
Reply Retweet Like