Information Security
86 Threads
Start your Career in Cyber-Security / Information-Security by spending $0 These are FREE University courses that are available online for you to take! 🧵 #infosec #infosecurity...
30 cybersecurity search engines for researchers: 1. Dehashed—View leaked credentials. 2. SecurityTrails—Extensive DNS data. 3. DorkSearch—Really fast Google dorking. 4. ExploitDB—...
(1/21) Cryptography Fundamentals: Diffie-Hellman Key Exchange How do you share private information over public networks? How can we create mathematically secure secrets? What actu...
What's the best way to store your own personal digital data for the long run? I've been trying to answer this question for a while, allow me to share. Here's a 🧵 https://t.co/oS8L...
This will be a thread discussing a real world breach involving a drone delivered exploit system that occurred this summer Some details I am not able to discuss, however for the b...
A thread on "Token-Based Authentication" - Part 9 of the "Understand the Internet" series. 🧵👇 #bugbounty #infosec #cybersecurity #hacking
🚀 New launch 🚀 Hey friends., I'm happy to launch https://t.co/iHklTJ2asX. From today, you will be able to find any quality tweet or blog post that I write on cybersecurity in th...
Top burpsuite extensions you must give a try while hunt✅ 👇🔥 #bugbountytips #infosec →Autorise: Used to detect IDORs and BACs →Upload Scanner: Tests multiple upload vulnerabilities...
Get FREE Certifications in these programming courses ↓ Learn, Build projects and Earn Certifications ↓ Open thread 🧵 ↓
I revisited NahamCon 2021 and found the talk by @rez0__ on fuff super informative. Hence, I decided to write a thread on it for those who don't have time to watch the talk. "fuff...
I finished reading this Active Directory book. While the latest edition was released in 2013, it contains plenty of information still relevant to this day. Below are described 10...
When you know that a server is attempting to validate an image's intrinsic attributes and prevent Content-Type/Extension bypasses, you can upload a polygot file to get RCE. But wh...
I think every individual in the security industry should experiment and play around different Linux distros before settling for one. Confused what to choose? Here's a list of my...
Newsletters are simply amazing as you get to stay updated in your field of interest on a daily/weekly/monthly basis without much effort. There are many wonderful newsletters in th...
August is coming to an end and this month has been very resourceful in terms of wonderful articles, reports and tips. Here's my top 3 favourite reports disclosed in August. 🧵👇 #...
From branding dissent and independent analysis as ‘disinformation’ to condemning it as ‘information terrorism’? Taking a stand in defence of simple honesty is not going to get any...
According to pretty scientific poll, 70% of my followers still have magnetic stripes in their credit cards—which is technology from the 1970s! Here's a short thread about some of t...
In the UK, as a Cybersecurity contractor, you can earn daily rates in the range of £400 - £1,000. Here is a thread of some of the Cybersecurity contract jobs I have come across and...
Tech is a broad field, you need to choose where to specify. Below are some fields in tech you’ll want to learn. A THREAD 🧵 1. Cybersecurity
If you're into OSINT or threat intelligence - it's important to keep on top of the latest news, tools and techniques. Here's our top 20 sources of OSINT-related news, blogs and pu...
LEARNING OSCP: Day #7 Rooted a whole AD domain. I will share my methodology. There are multiple paths and ways to gain access and move laterally, multiple tools and techniques wi...
Brute force DNS records using shuffleDNS + BBRF + Axiom 1. Get all domains from all BBRF programs bbrf domains --all --show-disabled > alldomains.bbrf.txt wc -l 6,113,435 alldom...
FREE LABS TO TEST YOUR PENTEST/CTF SKILLS :-) #cybersecurity #infosec
Tools are the best friends of every Application Security Engineer. Here is the list of some of the best tools that go well with @AWS. #aws #cloudsecurity #appsec #infosec