Twitter | Search | |
Search Refresh
The AntiSocial Engineer Jul 11
twitter, meet LinkedIn IT people... I’ve explicitly warned this person before about oversharing information online, then today this... 🤷🏻‍♂️
Reply Retweet Like
John Opdenakker Jul 14
Hey Twitter. Who do you admire in Infosec and why?
Reply Retweet Like
BreachedSec Jul 13
Red Team Use of MITRE ATT&CK - thanks for sharing
Reply Retweet Like
Anis Muslić ⣢ Jul 11
Can this be considered as data leak?
Reply Retweet Like
Elliot Alderson Jul 12
Many students asked my academic background by DMs and what is the best to do to work in . I will answer here: 1) I have a Master's Degree in Telecoms and Networks Engineering from . 2) There is not only one way to work in infosec, create your own!
Reply Retweet Like
John Opdenakker Jul 13
Very thorough guide on how to erase data from your (mobile) devices. Bookmarked: might come in handy sooner or later!
Reply Retweet Like
Florian Hansemann Jul 12
Serverless Toolkit for Pentesters - pretty cool post by my friend
Reply Retweet Like
Rico Platano 🍌 Jul 15
Getting into infosec doesn’t have to be $$$. W/ a raspberry pi (~$40) you can learn * Linux operation & Administration * Programming or Scripting * Reverse Engineering & Forensics * Networking & Firewall mgnt * & A LOT MORE DM’s open
Reply Retweet Like
yομ ѡēԻĕɴ'τ ʟоοκɩɴɡ Ϝοᚱ ᛖЕ ᕙ(⇀‸↼‶)ᕗ 16h
So, Twitter: I'm having some spare time, reading books I totally forgot and just enjoying silence at home. But recently I really felt in love with some ananas avocado salat and since I'm a very efficient human, please let me know what to do with these little fuckers.
Reply Retweet Like
Florian Hansemann Jul 14
Executing Metasploit & Empire Payloads from MS Office Document Properties (part 1 of 2)
Reply Retweet Like
Abugzlife Jul 15
New post about the not so special bugs out there. Hopefully this will help motivate beginners that are struggling to see the light at the end of the tunnel, and show some of the very simple, impactful bugs out there.
Reply Retweet Like
Pavel Cernik 20h
just stuff - password can contain only letters, numbers, dot, underscore and hyphen. And by the way - their passwords are CASE INSENSITIVE!!! (they won't tell you but you can confirm it on your own)
Reply Retweet Like
Armorblox 9h
Reply Retweet Like

Related searches

#osint · #cybersecurity · #bugbountytips · #hacker · ciso
Alyssa Miller Jul 13
I'm feeling anxiety over this year. There are so many folks I've connected with on Twitter this last year that I hope to meet in person. Not sure how it can all happen and worried I may not recognize them if we do see each other IRL.
Reply Retweet Like
Florian Hansemann Jul 15
Advanced Exploitation of SQL Injection to get Remote Code Execution
Reply Retweet Like
Michael Fisher Jul 14
Reply Retweet Like
Revolution Cyber Security Jul 15
Gee tell us something we didn't know. Big data is a corrupt and corrosive entity not to be trusted.
Reply Retweet Like
Giuliano Liguori Jul 15
Reply Retweet Like
GTI Computers Ltd Jul 11
This month Microsoft Patch Tuesday has patched 77 vulnerabilities, 16 of which are rated Critical. It's needless to say, but we repeat it again: please make sure updates are installed. via |
Reply Retweet Like
Georgia Weidman 6h
My favorite memory is not scuba in the Maldives or having dinner with geisha in Japan (though those were awesome) it's driving to all the bookstores in town with and guerrilla signing our books on the shelves. What's yours?
Reply Retweet Like