Wissam

3.6K posts

Wissam banner
Wissam

Wissam

@WeesamLy

info tech 🖥️

Libya،misurata Katılım Şubat 2017
468 Takip Edilen308 Takipçiler
Sabitlenmiş Tweet
Wissam
Wissam@WeesamLy·
الحمدلله ❤️🤲🏻
Wissam tweet mediaWissam tweet mediaWissam tweet mediaWissam tweet media
العربية
7
0
26
0
bugcrowd
bugcrowd@Bugcrowd·
$1,000,000 in bug bounties came down to one decision: pick a program and stick with it 👨‍💻😮‍💨 HX007, a hacker in the Bugcrowd community, made over $750K on a single program. Not by knowing more than everyone else. By knowing one target better than anyone else. 🔖 The longer you work a program, the more you understand the dev team behind it. Their patterns, their blind spots, the bugs they keep missing. It stops feeling like hunting and starts feeling like collaboration. When nothing's clicking, HX007 switches to a VDP, racks up some P1s, and comes back with his confidence rebuilt. 💡 More advice from HX007 and why he hunts on Bugcrowd: bugcrowd.com/blog/how-i-hac…
bugcrowd tweet media
English
7
22
207
11.4K
Coffin
Coffin@lostsec_·
comming soon..
Coffin tweet media
English
25
25
560
30.8K
Mr Phil Ghana 🇬🇭
Mr Phil Ghana 🇬🇭@mrphilghana·
THREAD 🧵 One of the most common statements I hear is: “iPhones can’t be accessed or extracted.” That belief usually comes from everyday user experience where devices are protected by strong encryption and security controls. However, in a controlled digital forensics laboratory, investigators use specialized forensic acquisition techniques that allow the structured extraction and analysis of data from iOS devices while maintaining evidence integrity. I recently conducted a forensic extraction on my iPhone 11 Pro Max to demonstrate how this process works in practice. The examination began with device identification and preservation. Before any data acquisition takes place, the device must be documented to establish evidence integrity. Key identifiers such as the device model, serial number, IMEI, operating system version, SIM status, and device configuration are recorded. This step ensures the device can be uniquely identified and that any findings can later be verified. After the device is properly documented, the forensic acquisition phase begins. Instead of simply copying files, the extraction process reads structured data stored within the operating system and application containers. Smartphones store information across multiple formats including SQLite databases, JSON records, system logs, and application storage structures. #DigitalForensics #MobileForensics #DFIR #CyberSecurity #iOSForensics #CyberInvestigation #IncidentResponse #Infosec #ForensicAnalysis @Asaassim @RedHatPentester @elormkdaniel @cyberjeremiah @cybergirl_io @h4ruk7 Check thread 🧵
Mr Phil Ghana 🇬🇭 tweet mediaMr Phil Ghana 🇬🇭 tweet mediaMr Phil Ghana 🇬🇭 tweet mediaMr Phil Ghana 🇬🇭 tweet media
English
5
10
48
4.1K
Wissam
Wissam@WeesamLy·
اللهم في هذه الليلة الطيبة المباركة ، أمي وأبي وإخوتي ، أطل أعمارهم أصلح أعمالهم. اللهم هوّن عليهم شدائد الدنيا ، ربّ لا ترينا فيهم همّا ولا سوءاً.. اللهم اكتب لهما عيشة طيبة وحياة مطمئنة 🤍
العربية
1
0
4
185
Wissam
Wissam@WeesamLy·
@AliSasi_9 الفطور مافيش كيف الحوش ، السحور عادي برا الحوش
العربية
0
0
0
53
S A S i
S A S i@AliSasi_9·
أسوء شي ف رمضان الفطور برا الحوش
العربية
3
1
21
1.1K
Wissam
Wissam@WeesamLy·
@ii_man0 حافظو عليه المدير هذا
العربية
1
0
1
38
Intigriti
Intigriti@intigriti·
Hackers! What are some of your most used Google dorking queries that you use to find interesting assets? 🤠
English
17
20
156
15.7K
Wissam
Wissam@WeesamLy·
@Mahamed7OCT نفس الشي ف مصراته الحزام الاخضر
العربية
0
0
0
114
الشــعَّابْ
الشــعَّابْ@Mahamed7OCT·
في الجو المعجج الغبيري هذا تفكرت في 2016 قلة قليلة كانت تكتب وتحذر من الزحف العمراني العشوائي على الحزام الاخضر المحيط بطرابلس واللي تم اقتطاعه كله لمقسمات سكنية مافيش ولا حاجة قعدت غوط الرمان - القره بولي -القويعة يلي بدت استراحات- مشروع الابقار- حوايز اللوز تاجوراء
العربية
5
4
30
1.3K
Wissam
Wissam@WeesamLy·
@Hacker0x01 سرقة عيني عينك
العربية
0
0
3
2.1K
HackerOne
HackerOne@Hacker0x01·
Point-in-time pentests can’t keep up, while fully autonomous testing creates noise. The solution? HackerOne Agentic PTaaS pairs specially trained AI agents with elite human validation to deliver results based on real-world exploitability, not theory. This 50-second video shows you how it works.
English
30
10
115
212.4K
Wissam
Wissam@WeesamLy·
@FabrizioRomano سلمك هدراز ، اول خسارة وتعادل تلقى روحك برا النادي
العربية
0
0
0
19
Fabrizio Romano
Fabrizio Romano@FabrizioRomano·
🚨👀 Arne Slot on UCL impacting future plans: “The only thing I do know is that it happened before and recently [Klopp in 22/23] and it didn’t affect the future of that manager”. “But that doesn't guarantee anything of course. Usually at this club several factors are taken into consideration”.
Fabrizio Romano tweet media
English
1.1K
737
14.3K
2M
S A S i
S A S i@AliSasi_9·
قوائم حجاج مصراتة عرفناهم بالخطولوح خيرا تكتم اعلامى بالخصوص
العربية
3
0
1
254
S A S i
S A S i@AliSasi_9·
@WeesamLy انت من جماعة الرحلة يلي بينزلوها لتونس ومصارش
العربية
1
0
0
94
Wissam
Wissam@WeesamLy·
تشحويرة ماتودها لعدوك
Wissam tweet media
العربية
1
0
3
189
Wissam retweetledi
قرآن| Quran
قرآن| Quran@4vl_p·
{رَبِّ اجْعَلْنِي مُقِيمَ الصَّلاَةِ وَمِن ذُرِّيَّتِي}
العربية
21
1K
3.3K
107.7K