George 25 (@nelectroni69308) 's Twitter Profile
George 25

@nelectroni69308

ID: 1839422680988090368

calendar_today26-09-2024 21:52:30

14 Tweet

1 Followers

56 Following

TryHackMe (@realtryhackme) 's Twitter Profile Photo

NEW CHALLENGE ROOM: K2 🔗hubs.la/Q02QDRCt0 🏔️ Many hardships await as you make your way through the mountain 🏔️

NEW CHALLENGE ROOM: K2
🔗hubs.la/Q02QDRCt0

🏔️ Many hardships await as you make your way through the mountain 🏔️
ARISS - Amateur Radio on the ISS (@ariss_intl) 's Twitter Profile Photo

1 hour until STEM contact with Azerbaijan! Learners from Khazar University, Dunya School in Baku will talk with Sunita Williams on the ISS via ham radio. Scheduled today at 09:13 UTC | 5:13 AM ET | 1:13 PM AZT. Direct via 4K6EH. Listen live on 145.800 MHz FM in the region.

1 hour until STEM contact with Azerbaijan!

Learners from Khazar University, Dunya School in Baku will talk with <a href="/Astro_Suni/">Sunita Williams</a> on the ISS via ham radio.

Scheduled today at 09:13 UTC | 5:13 AM ET | 1:13 PM AZT. Direct via 4K6EH.

Listen live on 145.800 MHz FM in the region.
TryHackMe (@realtryhackme) 's Twitter Profile Photo

NEW RED MODULE: Authentication Attacks 🔗hubs.la/Q02R-ThW0 Master exploiting authentication mechanisms through real-world scenarios! 📉Bypass authentication forms 🕸️Exploit session states 🎯Test your skills with challenges

NEW RED MODULE: Authentication Attacks
🔗hubs.la/Q02R-ThW0

Master exploiting authentication mechanisms through real-world scenarios!

📉Bypass authentication forms
🕸️Exploit session states
🎯Test your skills with challenges
ARISS - Amateur Radio on the ISS (@ariss_intl) 's Twitter Profile Photo

Contact Upcoming in Russia. Learners at School No. 2,  Veliky Ustyug, Russia will talk with crew member Ivan Vagner live via ham radio from the ISS. Scheduled for Sun. Oct. 06 at 10:50 UTC | 6:50 AM ET | 3:50 PM YEKT via the Service Module radio. Listen on 145.800 MHz FM.

Contact Upcoming in Russia.

Learners at School No. 2,  Veliky Ustyug, Russia will talk with crew member Ivan Vagner live via ham radio from the ISS.

Scheduled for Sun. Oct. 06 at 10:50 UTC | 6:50 AM ET | 3:50 PM YEKT via the Service Module radio.

Listen on 145.800 MHz FM.
Hack The Box (@hackthebox_eu) 's Twitter Profile Photo

Half-full or half-empty? ☕️ A new Machine by ippsec is available FOR FREE, focusing on the most recent #CUPS vulnerability. Discover how to abuse the four #CVEs and exploit print jobs to execute malicious code on a target system. → Find it now: okt.to/GeQg14

Half-full or half-empty? ☕️ 
A new Machine by <a href="/ippsec/">ippsec</a> is available FOR FREE, focusing on the most recent #CUPS vulnerability. Discover how to abuse the four #CVEs and exploit print jobs to execute malicious code on a target system.
→ Find it now: okt.to/GeQg14
ARISS - Amateur Radio on the ISS (@ariss_intl) 's Twitter Profile Photo

Getting ready for the SSTV Experiment starting Tuesday? We have some notes to know. Links: Image Submissions: spaceflightsoftware.com/ARISS_SSTV/ AMSAT Live Satellite Status: amsat.org/status/ SSTV Award Certificates: ariss.pzk.org.pl/sstv/ FAQ: spaceflightsoftware.com/ARISS_SSTV/faq…

Getting ready for the SSTV Experiment starting Tuesday?   We have some notes to know.  
Links:
Image Submissions: spaceflightsoftware.com/ARISS_SSTV/
AMSAT Live Satellite Status: amsat.org/status/
SSTV Award Certificates: ariss.pzk.org.pl/sstv/
FAQ: spaceflightsoftware.com/ARISS_SSTV/faq…
Hack The Box (@hackthebox_eu) 's Twitter Profile Photo

Referee, that's a foul 😤 A new Sherlock is now available on #HTB Labs & HTB Enterprise Platform! Investigate illegal RDP sessions without Privileged Access Management (PAM) and track the threat actor's lateral movement. Start the investigation: okt.to/ZG4LQV

Referee, that's a foul 😤
A new Sherlock is now available on #HTB Labs &amp; HTB Enterprise Platform! Investigate illegal RDP sessions without Privileged Access Management (PAM) and track the threat actor's lateral movement. Start the investigation: okt.to/ZG4LQV
Intigriti (@intigriti) 's Twitter Profile Photo

Developers have applied new validation checks to only allow users to fetch from whitelisted external resources 🤠 But is this code snippet still vulnerable to SSRF? If so, how can you exploit this? 🤔

Developers have applied new validation checks to only allow users to fetch from whitelisted external resources 🤠

But is this code snippet still vulnerable to SSRF? If so, how can you exploit this? 🤔
Hack The Box (@hackthebox_eu) 's Twitter Profile Photo

How easy is it for you to keep up with the latest threats? 🔎 Cybersecurity professionals worldwide met at the biggest #hacking conference and spilled their secrets. What's your #cyber confession? Read the unfiltered truths shared at DEF CON: okt.to/IRu91c

How easy is it for you to keep up with the latest threats? 🔎
Cybersecurity professionals worldwide met at the biggest #hacking conference and spilled their secrets. What's your #cyber confession? Read the unfiltered truths shared at <a href="/defcon/">DEF CON</a>: okt.to/IRu91c