zʇunH ʎɐſ ɐsɐɟnW 🦁🦁🦁🦁
@jay_hunts
I don't exist. I'm a total ghost. What is dead may never die. R_R_R_R ||The Four Lions.🦁🦁🦁
Invested and interested in this case like Madddddd!!!! .....I will follow and read through every single update on it.
You can get me my refund and rebate. The court will get me my 5 billion. I’m not letting go of the emotional and physical damages. I fell sick because of this and I had to borrow money from my landlord for a different flight. I’ve still not paid and he has been embarrassing me.…
I decided to check VulnBank’s dashboard on Cloudflare to see how it’s doing, and it’s really nice to see that it has been visited by over 5,000 people and has received more than 3 million requests. You really can do great things from anywhere!
Vulnerable Bank is Now Live! 🚀 I'm excited to announce that VulnBank is officially live and accessible at vulnbank.org! This project aims to make learning application security testing easier, more practical, and highly contextual for everyone.
Well fair point 😂😂😂
U know u re the definition of "don't let them know ur next move"😂
...Leaking Sensitive Data from Air-Gapped Machines via Covert Noise covertchannels.com
Today feels like a good day to get married. Who's down abeg????
Why I Started 30-Days Bug Bounty Hunting Challenge Before Going Full-Time. - I hope it helps. medium.com/@40sp3l/why-i-…
Hey, @grok, who was the most famous person to visit my profile? It doesn't need to be a mutual, don't tag them, just say who it was
A fulllll life lived 🤣🤣🤣🤣🤣
Wayne Rooney left Everton, got married, had 3 kids, won 16 trophies, went bald, had a hair transplant, became Man Utd's top goalscorer, returned to Everton, left Everton to go to the MLS, became manager of Derby, got relegated, left to become Birmingham manager, got sacked and…
6.If your compliance report says 'no findings' every year, are you secure, or just untested? 7. If a risk is on the register but no control is implemented, is it truly being managed or just acknowledged?
4. If a user has no admin rights, but can run PowerShell scripts via scheduled tasks and registry tweaks, are they really a limited user? 5. If your WAF blocks SQL injection but allows credential stuffing, are you secure? Or just comfortably blind?
4. If a user has no admin rights, but can run PowerShell scripts via scheduled tasks and registry tweaks, are they really a limited user? 5. If your WAF blocks SQL injection but allows credential stuffing, are you secure? Or just comfortably blind?
2. If an attacker deletes all their logs, did è breach ever happen? How do you prove the absence of evidence isn't evidence of absence 3. Your smart TV isn’t allowed on the corporate network, but it listens all day and has Wi-Fi. What security boundary does it really belong to?
Oh wow!! I have questions 1. How did you pivot your way into the engineer's workstation....?? Was it dual homed...also 2. What kinda misconfigured firewall did you find that allowed ingress into OT. @lpha3ch0
Yes. I’ve done security assessments on OT networks and usually there are firewall rules allowing ingress for IT admins and monitoring. I’ve gained access to a HMI and had control of a city electrical grid after hacking into an engineer’s workstation during an internal network…
2. If an attacker deletes all their logs, did è breach ever happen? How do you prove the absence of evidence isn't evidence of absence 3. Your smart TV isn’t allowed on the corporate network, but it listens all day and has Wi-Fi. What security boundary does it really belong to?
Questions for my Cybersecurity people: 1. If a system is 'air-gapped and has no network connection, can it still be hacked? If yes, how?
Questions for my Cybersecurity people: 1. If a system is 'air-gapped and has no network connection, can it still be hacked? If yes, how?
That moment when you just need a random stranger to vibe with...total random stranger .....nothing serious ....don't talk about anything deep or serious ....just vibe. After that... y'all delete numbers and pretend you never spoke. 😅😅😅
Episode 2 is live! 🎥 If you’ve ever worked in healthcare and wondered, “What does cybersecurity have to do with me?” This is your answer. In this video, I explain cybersecurity in the simplest way, using real healthcare examples we can all relate to. Because protecting…
I am searching for a bug bounty hunter who can help coach/train someone in bug bounty. Please help, this will mean a lot to me. Kindly help retweet 🙏🏾
Engineering Opportunities at Veepee Group Location: Sango-Ota, Nigeria Company: At Veepee Group Currently hiring for the following roles: 1. Electrical Engineer 2. Utility Engineer Send CV to [email protected]