sh4yo (@3h4yo) 's Twitter Profile
sh4yo

@3h4yo

Student || CTF Player || Pentester/ Red Teamer || n00b || still learning..........

ID: 1499301478166667265

linkhttps://github.com/shayol33 calendar_today03-03-2022 08:31:56

668 Tweet

495 Takipçi

1,1K Takip Edilen

Adams (@the0xlam) 's Twitter Profile Photo

🛡️ PhishSage: A lightweight email security toolkit for analyzing headers, attachments, and links. Offers quick insights, heuristics, and enrichment in JSON or readable summaries. 🔗 GitHub: github.com/0xlam/PhishSage Dr Iretioluwa Akerele #Phishing #Infosec #Cybersecurity #Security #OpenSource

🛡️ PhishSage: A lightweight email security toolkit for analyzing headers, attachments, and links. Offers quick insights, heuristics, and enrichment in JSON or readable summaries.
🔗 GitHub: github.com/0xlam/PhishSage
<a href="/ireteeh/">Dr Iretioluwa Akerele</a>
#Phishing #Infosec #Cybersecurity #Security #OpenSource
CYSSSA (@cysssa_lautech) 's Twitter Profile Photo

Ready to put your cybersecurity skills to the test? Register now for the CYSSSA Hackathon! Compete, learn, collaborate, and challenge yourself in real-world security scenarios. 🔗 Click the link below to secure your spot! bit.ly/cysssa-ctf

Ready to put your cybersecurity skills to the test?
Register now for the CYSSSA Hackathon!
Compete, learn, collaborate, and challenge yourself in real-world security scenarios.
🔗 Click the link below to secure your spot!
bit.ly/cysssa-ctf
Rookie. (@miiide__) 's Twitter Profile Photo

New job, new city, good greens. I've prayed for this for a long time, put in crazy work too. But there's so more work to be done. More shege to be seen. a la folie🤞

0xVenus (@0x_venus) 's Twitter Profile Photo

Hacked Thebit in less than 5 mins 🔥 watch the full video #hacker #hacked #rce #sqli #linux #windows #pentest #cybersecurity #root

sh4yo (@3h4yo) 's Twitter Profile Photo

Fun 4hrs. Cybertalents CTF GG boys 🙂 PWN_NG boys were on🔥 Till next time. cybertalents.com/competitions/n… #ctf #Pentesting #hacking #linux #windows #cybersec #cybersecurity

Fun 4hrs. Cybertalents CTF

GG boys 🙂

PWN_NG boys were on🔥

Till next time.

cybertalents.com/competitions/n…

#ctf #Pentesting #hacking #linux #windows #cybersec #cybersecurity
esentry (@esentry_mssp) 's Twitter Profile Photo

The holiday season is a time of celebration, gatherings, and giving, but it is also a period when phishing attacks spike. Cybercriminals rarely need to force their way past firewalls, their aim is far simpler and far more effective. They exploit human nature. A single

The holiday season is a time of celebration, gatherings, and giving, but it is also a period when phishing attacks spike. 

Cybercriminals rarely need to force their way past firewalls, their aim is far simpler and far more effective.
They exploit human nature.

A single
Altered Security (@alteredsecurity) 's Twitter Profile Photo

Thanks to everyone for the amazing response to our Final Black Friday Giveaway. Congrats to our winners: CRTP: Nabil CRTE: Oversudo Please DM us your name and email ID to claim your course access. Only a few hours left to grab our Black Friday deals • Up to 25% OFF on

7h3h4ckv157 (@7h3h4ckv157) 's Twitter Profile Photo

Hey Hackers, No excuses this year. Fill the feed with exploits, writeups, bounty, certs, CVEs, challenges, 0days, etc. I’m pushing myself right alongside you. Happy new year!! 🥳 HackThePlanet

0x0smilex (@assa2940) 's Twitter Profile Photo

Shodan+Nuclei (Nuclei by ProjectDiscovery ) = Bounties 💸, Tip:Got LFI? Don't stop at /etc/passwd. Try reading private SSH keys (~/.ssh/id_rsa) to get a direct shell. 🐚 #BugBounty #bugbountytips #TrendingNow #RCE #NucleiTemplates #CyberSec

Shodan+Nuclei (<a href="/pdnuclei/">Nuclei by ProjectDiscovery</a> ) = Bounties 💸, Tip:Got LFI? Don't stop at /etc/passwd. Try reading private SSH keys (~/.ssh/id_rsa) to get a direct shell. 🐚
#BugBounty #bugbountytips #TrendingNow #RCE #NucleiTemplates #CyberSec
Black Hills Information Security (@bhinfosecurity) 's Twitter Profile Photo

"[...] Kerberos delegation is easily among my top favorite vectors of abuse, and [...] I’ve noticed that Impacket doesn’t get nearly as much coverage as tools like Rubeus or Mimikatz. Read more: blackhillsinfosec.com/abusing-delega… Abusing Delegation with Impacket (Part 1): Unconstrained

"[...] Kerberos delegation is easily among my top favorite vectors of abuse, and [...] I’ve noticed that Impacket doesn’t get nearly as much coverage as tools like Rubeus or Mimikatz.
Read more: blackhillsinfosec.com/abusing-delega…

Abusing Delegation with Impacket (Part 1): Unconstrained
sh4yo (@3h4yo) 's Twitter Profile Photo

Completed the Active Directory Attack Path in Action webcast by Black Hills Information Security A practical look at how attackers chain small weaknesses to escalate from uncredentialed access to Domain Admin. Always learning. Always improving. #ActiveDirectory #BlackHillsInfosec

Completed the Active Directory Attack Path in Action webcast by <a href="/BHinfoSecurity/">Black Hills Information Security</a> 

A practical look at how attackers chain small weaknesses to escalate from uncredentialed access to Domain Admin.

Always learning. Always improving.

#ActiveDirectory   #BlackHillsInfosec
OSCG (@oscguild) 's Twitter Profile Photo

The Olympus Students Cyber Security Guild is pleased to announce a partnership with Google Developer Groups On Campus, LAUTECH. Together, we look forward to delivering value-driven programs that empower students with relevant tech skills.

The Olympus Students Cyber Security Guild is pleased to announce a partnership with Google Developer Groups On Campus, LAUTECH.
Together, we look forward to delivering value-driven programs that empower students with relevant tech skills.
CYSSSA (@cysssa_lautech) 's Twitter Profile Photo

Happy New Month 💙 Hello February! 🚀 A new month, new goals, and new opportunities to grow, learn, and secure the future. Let’s make it productive, impactful, and cyber-smart 🔐

Happy New Month 💙
Hello February! 🚀
A new month, new goals, and new opportunities to grow, learn, and secure the future.

Let’s make it productive, impactful, and cyber-smart 🔐
Black Hills Information Security (@bhinfosecurity) 's Twitter Profile Photo

"Deceptive-Auditing is a tool that deploys Active Directory honeypots and automatically enables auditing for those honeypots." Read more: blackhillsinfosec.com/deceptive-audi… Deceptive-Auditing: An Active Directory Honeypots Tool By: Sean Minnick Published: 1/7/2026

"Deceptive-Auditing is a tool that deploys Active Directory honeypots and automatically enables auditing for those honeypots."
Read more: blackhillsinfosec.com/deceptive-audi…

Deceptive-Auditing: An Active Directory Honeypots Tool
By: Sean Minnick
Published: 1/7/2026