Vasileiadis A. (Cyberkid)(@Anastasis_King) 's Twitter Profileg
Vasileiadis A. (Cyberkid)

@Anastasis_King

Cybersecurity Evangelist | Offensive Security Consultant (Red Team Operator) | Information Security Analyst

ID:1183515132

linkhttps://octagonsec.gr calendar_today15-02-2013 19:10:58

33,3K Tweets

2,6K Followers

1,4K Following

Vasileiadis A. (Cyberkid)(@Anastasis_King) 's Twitter Profile Photo

🔰 TOP 10 GITHUB HACKING TOOLS FOR ANDROID 🔰

✅ Androguard: Unveiling Android’s Inner Workings
👉 Androguard is a formidable reverse engineering and analysis tool for Android OS applications. Its capabilities extend to disassembling, decompiling, and scrutinizing APK files,

🔰 TOP 10 GITHUB HACKING TOOLS FOR ANDROID 🔰 ✅ Androguard: Unveiling Android’s Inner Workings 👉 Androguard is a formidable reverse engineering and analysis tool for Android OS applications. Its capabilities extend to disassembling, decompiling, and scrutinizing APK files,
account_circle
Vasileiadis A. (Cyberkid)(@Anastasis_King) 's Twitter Profile Photo

🧑‍🏫Cheat Code to Starting a Career in Cyber Security

1. Learn the Basics: Study basic skills (networking and basic IT skills)

2. Education and Training: Obtain a degree or certifications like CompTIA Security+, Google Cert, or even CySA+.

3. Gain Experience: Signup for in

🧑‍🏫Cheat Code to Starting a Career in Cyber Security 1. Learn the Basics: Study basic skills (networking and basic IT skills) 2. Education and Training: Obtain a degree or certifications like CompTIA Security+, Google Cert, or even CySA+. 3. Gain Experience: Signup for in
account_circle
Vasileiadis A. (Cyberkid)(@Anastasis_King) 's Twitter Profile Photo

🐧🕵️Linux Forensics Analysis Cheat Sheet

🔹Validate compromised
-Interviewing client/user/administrator (what, why, how, when, where, who?)
-Live response commands / Run triage scripts

🔹Collect evidence
-Live response triage script collection
-Disk image
-Memory dump

🐧🕵️Linux Forensics Analysis Cheat Sheet 🔹Validate compromised -Interviewing client/user/administrator (what, why, how, when, where, who?) -Live response commands / Run triage scripts 🔹Collect evidence -Live response triage script collection -Disk image -Memory dump
account_circle
Vasileiadis A. (Cyberkid)(@Anastasis_King) 's Twitter Profile Photo

📡Wi-Fi Hacking with Bettercap

📱Bluetooth devices are everywhere and are used in mobile phones, watches, headphones, computers, etc. They are also a target for malicious users who aim to carry out simple or complex hacking attacks in order to collect, track or seize them. In

📡Wi-Fi Hacking with Bettercap 📱Bluetooth devices are everywhere and are used in mobile phones, watches, headphones, computers, etc. They are also a target for malicious users who aim to carry out simple or complex hacking attacks in order to collect, track or seize them. In
account_circle
Vasileiadis A. (Cyberkid)(@Anastasis_King) 's Twitter Profile Photo

🥷Here's how hackers get system informations:

🔍 Port Scanning: Use tools like Nmap to scan for open ports and services running on target systems.

🔒 Banner Grabbing: Extract information from banners and headers returned by network services to identify software versions and

🥷Here's how hackers get system informations: 🔍 Port Scanning: Use tools like Nmap to scan for open ports and services running on target systems. 🔒 Banner Grabbing: Extract information from banners and headers returned by network services to identify software versions and
account_circle
Vasileiadis A. (Cyberkid)(@Anastasis_King) 's Twitter Profile Photo

📱10 Smallest Hacking Gadgets + Their Uses

1. Raspberry Pi:

This is a low cost credit card sized desktop computer that runs Linux but it also provides a set of GPIO (general purpose input/output) pins. It enables people to explore computing and learn Programming

2.

📱10 Smallest Hacking Gadgets + Their Uses 1. Raspberry Pi: This is a low cost credit card sized desktop computer that runs Linux but it also provides a set of GPIO (general purpose input/output) pins. It enables people to explore computing and learn Programming 2.
account_circle
Vasileiadis A. (Cyberkid)(@Anastasis_King) 's Twitter Profile Photo

📚Practical Cyber Security Resources

📋Contents:

🔹Pentest General Resources
🔹Web Pentest
🔹Mobile Pentest
🔹Cloud Security & Pentest
🔹Bug Bounty
🔹OSINT & Google Dorks
🔹API Security & Pentest
🔹Active Directory
🔹Red Teaming
🔹Exploit Development
🔹AppSec & Code Review

📚Practical Cyber Security Resources 📋Contents: 🔹Pentest General Resources 🔹Web Pentest 🔹Mobile Pentest 🔹Cloud Security & Pentest 🔹Bug Bounty 🔹OSINT & Google Dorks 🔹API Security & Pentest 🔹Active Directory 🔹Red Teaming 🔹Exploit Development 🔹AppSec & Code Review
account_circle
Vasileiadis A. (Cyberkid)(@Anastasis_King) 's Twitter Profile Photo

🔍Here are 22 search engines useful for pentesters:

🔹Shodan
🔹Censys
🔹ZoomEye
🔹IntelligenceX
🔹BinaryEdge
🔹Hunter
🔹Intelx
🔹Fofa
🔹Clearbit
🔹Vulners
🔹FullHunt
🔹Grep
🔹Omnisint
🔹Leakix
🔹Pulsedive
🔹Weleakinfo
🔹Cir.lu
🔹Leakprobe

🔍Here are 22 search engines useful for pentesters: 🔹Shodan 🔹Censys 🔹ZoomEye 🔹IntelligenceX 🔹BinaryEdge 🔹Hunter 🔹Intelx 🔹Fofa 🔹Clearbit 🔹Vulners 🔹FullHunt 🔹Grep 🔹Omnisint 🔹Leakix 🔹Pulsedive 🔹Weleakinfo 🔹Cir.lu 🔹Leakprobe
account_circle
Vasileiadis A. (Cyberkid)(@Anastasis_King) 's Twitter Profile Photo

📱Mobile Hacking Cheatsheets

📝Android and iOS pentesting, forensics, debugging and fuzzing cheatsheets

🔗Link: github.com/randorisec/Mob…

🔖

📱Mobile Hacking Cheatsheets 📝Android and iOS pentesting, forensics, debugging and fuzzing cheatsheets 🔗Link: github.com/randorisec/Mob… 🔖#infosec #cybersecurity #hacking #pentesting #security
account_circle
Vasileiadis A. (Cyberkid)(@Anastasis_King) 's Twitter Profile Photo

💻Windows Privilege Escalation Cheatsheet

🔰List:

🔹AlwaysInstallElevated
🔹SeBackupPrivilege
🔹DnsAdmins to DomainAdmin
🔹SeImpersonatePrivilege
🔹HiveNightmare
🔹Logon Autostart Execution (Registry Run Keys)
🔹Boot Logon Autostart Execution (Startup Folder)
🔹Stored

💻Windows Privilege Escalation Cheatsheet 🔰List: 🔹AlwaysInstallElevated 🔹SeBackupPrivilege 🔹DnsAdmins to DomainAdmin 🔹SeImpersonatePrivilege 🔹HiveNightmare 🔹Logon Autostart Execution (Registry Run Keys) 🔹Boot Logon Autostart Execution (Startup Folder) 🔹Stored
account_circle