Twitter | Search | |
Search Refresh
John Opdenakker Jul 14
Hey Twitter. Who do you admire in Infosec and why?
Reply Retweet Like
Florian Hansemann Jul 9
Windows Privilege Escalation Guide
Reply Retweet Like
The AntiSocial Engineer Jul 11
twitter, meet LinkedIn IT people... I’ve explicitly warned this person before about oversharing information online, then today this... 🤷🏻‍♂️
Reply Retweet Like
Josh Jay Jul 10
Alright What is your go to pentesting laptop?
Reply Retweet Like
Elliot Alderson Jul 12
Many students asked my academic background by DMs and what is the best to do to work in . I will answer here: 1) I have a Master's Degree in Telecoms and Networks Engineering from . 2) There is not only one way to work in infosec, create your own!
Reply Retweet Like
Rico Platano 🍌 Jul 15
Getting into infosec doesn’t have to be $$$. W/ a raspberry pi (~$40) you can learn * Linux operation & Administration * Programming or Scripting * Reverse Engineering & Forensics * Networking & Firewall mgnt * & A LOT MORE DM’s open
Reply Retweet Like
Anis Muslić ⣢ Jul 11
Can this be considered as data leak?
Reply Retweet Like
Jennifer Aldoretta Jul 10
twitter: any tips on what keywords or legal jargon to look out for in Terms of Use / Privacy Policy documents that might indicate a company may be selling my data?
Reply Retweet Like
Florian Hansemann Jul 14
Brute Forcing Accounts that have logged onto an AD joined computer
Reply Retweet Like
Maite Ortega Jul 15
The UK CyberSlide features some of the most innovative cybersecurity companies in the UK: To add your cybersecurity company please fill the form available below:
Reply Retweet Like
Florian Hansemann Jul 15
Advanced Exploitation of SQL Injection to get Remote Code Execution
Reply Retweet Like
Xtoff is going to DEF CON! Jul 12
.:: PRO CYBER SECURITY TIP Create a file called flag.txt in the root directory of all of your servers and fill it with a string of garbage. That way if someone hacks into the servers, they'll think they're in a CTF and will give up, thinking that they've won!
Reply Retweet Like
Michael Fisher Jul 13
Reply Retweet Like

Related searches

#osint · #cybersecurity · #bugbountytips · #hacker · ciso
Alyssa Miller Jul 13
I'm feeling anxiety over this year. There are so many folks I've connected with on Twitter this last year that I hope to meet in person. Not sure how it can all happen and worried I may not recognize them if we do see each other IRL.
Reply Retweet Like
Malwarebytes Jul 13
A great reminder of the regulatory risks surrounding digital tokens, via
Reply Retweet Like
Shay Jul 15
New lunch box, crayons, outfit, and cool markers. First day at my new gig is a go.
Reply Retweet Like
Devon 17h
Grateful for co-workers encouraging me to learn and grow.
Reply Retweet Like
Florian Hansemann Jul 14
Executing Metasploit & Empire Payloads from MS Office Document Properties (part 1 of 2)
Reply Retweet Like
Mantis Jul 14
Going to open source my pentest reporting tool later.
Reply Retweet Like
Pratik. Jul 12
First android application bounty 😍of 500 GBP .. special thanks to and mobexler 😍😍
Reply Retweet Like