Dylan Kaiser ☮️ 🏳️‍🌈 (@dylanmasondbk) 's Twitter Profile
Dylan Kaiser ☮️ 🏳️‍🌈

@dylanmasondbk

30, anarchist who believes in defensive voting, #purpleteam hacker. If you claim I watch CNN, you’ve already lost. He/him @j3rich0123 is my alt.

ID: 1080449131

calendar_today11-01-2013 17:53:51

18,18K Tweet

3,3K Takipçi

4,4K Takip Edilen

Tech Enthusiast (@ctprecious) 's Twitter Profile Photo

Phishing Email Scanner The phishing email scanning tool is now on my GitHub. Feel free to use it with the provided guidelines and share your results. I humbly look forward to your feedback! #OSINT #Cybersecurity

Phishing Email Scanner 

The phishing email scanning tool is now on my GitHub. Feel free to use it with the provided guidelines and share your results. I humbly look forward to your feedback! 

#OSINT
#Cybersecurity
solst/ICE (@icesolst) 's Twitter Profile Photo

- kernel level anticheat - games never been SAST scanned, no ssdlc, no security tooling nor budget - bespoke pipelines built by a single wizard (vanished into the nether) - no appetite to fix findings - some game devs have astronomically big egos and say things like “remove the

solst/ICE (@icesolst) 's Twitter Profile Photo

Since software is manufactured by sheer willpower and cerebral exertion, we experience psychological fragility. It’s too much to devise products out of thin air, yet still have to continuously remodel your entire toolset and approach, as the ecosystem advances (which is happening

HackerRats - Uncle Rat ❤️ (XSS Rat) (@thexssrat) 's Twitter Profile Photo

🕷️ 25 Web App Exploits Every Bug Bounty Hunter Should Know: 1. XSS (Cross-Site Scripting) 2. SQL Injection (SQLi) 3. CSRF (Cross-Site Request Forgery) 4. IDOR (Insecure Direct Object Reference) 5. SSRF (Server-Side Request Forgery) 6. RCE (Remote Code Execution) 7. LFI / RFI

William (@william1618033) 's Twitter Profile Photo

That's one of the most important posts from the cybersecurity community! No time to waste on bs, focus on knowledge, family, and build things!