DANODII (@danodi_j6) 's Twitter Profile
DANODII

@danodi_j6

python programmer💻
Cyber security expert (pentester)👮🏼
music lover, Ethical hacker

ID: 1559983442439315457

calendar_today17-08-2022 19:20:24

1,1K Tweet

85 Followers

419 Following

DANODII (@danodi_j6) 's Twitter Profile Photo

TryHackMe - Interactive Cyber Skills Labs TryflackMe is a guided, hands-on platform for learning cybersecurity and defensive skills through safe, legal labs and challenges. #TryHackMe #CyberSecurity #Learning #OSINT #BlueTeam #InfoSec

TryHackMe - Interactive Cyber Skills Labs

TryflackMe is a guided, hands-on platform for learning cybersecurity and defensive skills through safe, legal labs and challenges. 
#TryHackMe #CyberSecurity #Learning #OSINT #BlueTeam #InfoSec
DANODII (@danodi_j6) 's Twitter Profile Photo

Essential Linux Commands Every IT Professional Should Know Linux is the backbone of servers, DevOps, cybersecurity, and cloud infrastructure. Whether you're a beginner or want to organize your knowledge, these core Linux commands are a must

Essential Linux Commands Every IT Professional Should Know

Linux is the backbone of servers, DevOps, cybersecurity, and cloud infrastructure.

Whether you're a beginner or want to organize your knowledge, these core Linux commands are a must
DANODII (@danodi_j6) 's Twitter Profile Photo

Mobile Security Cheat Sheets (by RandoriSec) A comprehensive set of Android & iOS mobile application security cheat sheets, covering everything from APK structure to forensic analysis and fuzzing. Perfect for professionals working in mobile app security, pentesting, and digital

Mobile Security Cheat Sheets (by RandoriSec)

A comprehensive set of Android & iOS mobile application security cheat sheets, covering everything from APK structure to forensic analysis and fuzzing. Perfect for professionals working in mobile app security, pentesting, and digital
DANODII (@danodi_j6) 's Twitter Profile Photo

OSINT BIBLE Social Networks Geoint & Images Domain/IP/DNS Deep & Dark Web Automation (Python) Report Templates Al Intelligence Facial Recognition and more. #osintbible #CyberSecurity

OSINT BIBLE

Social Networks

Geoint & Images

Domain/IP/DNS

Deep & Dark Web

Automation (Python)

Report Templates

Al Intelligence

Facial Recognition

and more.
#osintbible 
#CyberSecurity
DANODII (@danodi_j6) 's Twitter Profile Photo

CVE-2026-21858+ CVE-2025-68613: n8n Ni8mare - Full Chain Exploit Unauthenticated to Root RCE: - LFI via Content-Type confusion Read/proc/self/environ to find HOME - Steal encryption key + database - Forge admin WT token - Expression injection sandbox bypass RCE as root

CVE-2026-21858+ CVE-2025-68613: n8n Ni8mare - Full Chain

Exploit

Unauthenticated to Root RCE:

- LFI via Content-Type confusion

Read/proc/self/environ to find HOME

- Steal encryption key + database

- Forge admin WT token

- Expression injection sandbox bypass

RCE as root
DANODII (@danodi_j6) 's Twitter Profile Photo

OSINT Resources: The Ultimate Toolkit for Ethical Investigations Whether you're a cybersecurity analyst, red teamer, journalist, or researcher having the right Open Source Intelligence (OSINT) resources at your fingertips. #OSINT #OSINTResources #CyberSecurity

OSINT Resources: The Ultimate Toolkit for Ethical Investigations

Whether you're a cybersecurity analyst, red teamer, journalist, or researcher having the right Open Source Intelligence (OSINT) resources at your fingertips.
#OSINT
#OSINTResources
#CyberSecurity
DANODII (@danodi_j6) 's Twitter Profile Photo

Top XSS Tools Every Ethical Hacker Must Know #xss #EthicalHacking #BugBounty #Pentesting #websecurity #cybersecurity #infosec #owasp #hackingtools #securitytools #redteam #blueteeam #Linux #Kali #hexsec

Top XSS Tools Every Ethical Hacker Must Know

#xss #EthicalHacking #BugBounty #Pentesting #websecurity #cybersecurity #infosec #owasp
#hackingtools #securitytools
#redteam #blueteeam #Linux
#Kali #hexsec
DANODII (@danodi_j6) 's Twitter Profile Photo

SQL Injection Cheat Sheet - Protect Your Databases Quick overview of SQLi types, safe lab testing tips, and concrete defenses (parameterized queries & input validation). For educational and authorized testing only.

SQL Injection Cheat Sheet - Protect Your Databases

Quick overview of SQLi types, safe lab testing tips, and concrete defenses (parameterized queries & input validation). For educational and authorized testing only.
DANODII (@danodi_j6) 's Twitter Profile Photo

Dangerous Linux commands you should know Linux gives users immense power, especially with root privileges. These commands are not bad by themselves, but using them without understanding can crash systems or permanently erase data. Educational awareness only. Do not try on

Dangerous Linux commands you should know

Linux gives users immense power, especially with root privileges. These commands are not bad by themselves, but using them without understanding can crash systems or permanently erase data.

Educational awareness only. Do not try on
DANODII (@danodi_j6) 's Twitter Profile Photo

14 must watch cybersecurity TV series Because some of the most powerful cybersecurity lessons weren't learned in classrooms or textbooks. They were learned by watching how threats actually unfold on screen.

14 must watch cybersecurity TV series

Because some of the most powerful cybersecurity lessons weren't learned in classrooms or textbooks.

They were learned by watching how threats actually unfold on screen.
DANODII (@danodi_j6) 's Twitter Profile Photo

Windows Forensics - Beginner-Friendly Overview Windows Forensics focuses on the collection, preservation, and analysis of digital evidence from Windows systems following security incidents or cybercrime activity. #WindowsForensics #CyberSecurity #IncidentResponse

Windows Forensics - Beginner-Friendly Overview

Windows Forensics focuses on the collection, preservation, and analysis of digital evidence from Windows systems following security incidents or cybercrime activity.
#WindowsForensics
#CyberSecurity
#IncidentResponse