Captain Levi (@0x_captainlevi) 's Twitter Profile
Captain Levi

@0x_captainlevi

Security researcher 👨‍💻| Amb. @_zknet | I Share insights on X Spaces @mobymedia | Learning cool stuff @cyblackorg | I Build Brand specific AI agents

ID: 1537871055947169794

linkhttps://mobymedia.org/ calendar_today17-06-2022 18:53:37

7,7K Tweet

2,2K Followers

1,1K Following

0xor0ne (@0xor0ne) 's Twitter Profile Photo

We’re hiring offensive security researchers Apple SEAR! We’re looking for skilled researchers across multiple security domains. Learn more and apply here: jobs.apple.com/en-us/details/… If you’re into low level systems like firmware, RTOS, coprocessors, embedded components, or

Remedy (@xyz_remedy) 's Twitter Profile Photo

and if you’re a skilled bug bounty hunter, turn your bugs into a Glider query and scan the entire Ethereum mainnet. you will find all similar bugs and might earn 10× more for the same work.

Giovanni Di Siena (@giovannidisiena) 's Twitter Profile Photo

The sooner you realise that no one is coming to save you, the better. It may not be your fault, but it is your responsibility. You owe it to yourself.

Remedy (@xyz_remedy) 's Twitter Profile Photo

yes, this is a very good point. you can turn any public findings into a Glider query, and you will basically become the owner of that attack vector. whenever a similar bug is found in any smart contract, either at that moment or in the future, you will get instantly notified.

Dr Iretioluwa Akerele (@ireteeh) 's Twitter Profile Photo

Last November, I started a Cybersecurity Mentorship Program for 42 people. Today, I’m proud to share that 37 of them successfully completed the cohort 🎉 Here’s how I supported them over the past year 👇🏾 Created a structured learning pathway to build their cybersecurity

Last November, I started a Cybersecurity Mentorship Program for 42 people. Today, I’m proud to share that 37 of them successfully completed the cohort 🎉

Here’s how I supported them over the past year 👇🏾

Created a structured learning pathway to build their cybersecurity
Remedy (@xyz_remedy) 's Twitter Profile Photo

Glider Gitbook is the best place to start learning Glider. We promise to keep adding more and more educational materials to make it easy for you to start using the tool. Whoever masters Glider early, before it becomes mainstream, will benefit more.

Patrick Collins (@patrickalphac) 's Twitter Profile Photo

We had a candidate reach the coding portion of our interview process. The task: “Build an X, use whatever tools you want, just share your screen and thinking aloud” 90% of it was him asking questions to Claude. We hired him. He asked Claude the best questions.

freeCodeCamp.org (@freecodecamp) 's Twitter Profile Photo

You can now learn key cybersecurity concepts from Harvard professor Dr. David J. Malan right on the freeCodeCamp YouTube channel. In this course, Dr. Malan teaches you how to secure your accounts, databases, software systems, and more. You'll also learn how to protect your

You can now learn key cybersecurity concepts from Harvard professor Dr. David J. Malan right on the freeCodeCamp YouTube channel.

In this course, Dr. Malan teaches you how to secure your accounts, databases, software systems, and more.

You'll also learn how to protect your
Whale Coin Talk (@whalecointalk) 's Twitter Profile Photo

Our latest episode on @letscatapult with Forked By Zero is one you don’t want to miss 🎥 We dived into some game-changing updates, from launching your own token with just $10, to earning from trading volume, and now creator rewards have been massively improved. And it gets better…

freeCodeCamp.org (@freecodecamp) 's Twitter Profile Photo

You may have heard about the Model Context Protocol and wondered how it lets AI tools connect to other tools, APIs, and systems. Well, it's all thanks to MCP servers. In this guide, Manish explains how MCP servers work and helps you build your own with Python and the FastMCP

You may have heard about the Model Context Protocol and wondered how it lets AI tools connect to other tools, APIs, and systems.

Well, it's all thanks to MCP servers.

In this guide, Manish explains how MCP servers work and helps you build your own with Python and the FastMCP
Ghost St Badmus (@commando_skiipz) 's Twitter Profile Photo

Two years ago, while I was still at MTN, a senior developer refused to approach my team for a security architecture review and requirements for what seemed to be an important project. The go-live date was already very close, and the team was still fixing bugs. I think the CIO got