Gh05T50litary (@gh05t50litary) 's Twitter Profile
Gh05T50litary

@gh05t50litary

ID: 1074667714411548673

calendar_today17-12-2018 14:08:44

185 Tweet

8 Followers

343 Following

Decabyte (@decabyte_info) 's Twitter Profile Photo

FREE FOR ALL: AWS intro to Pentesting terabox.com/s/1i1XALQkjHrf… OSCP COURSE STUDY MATERIAL teraboxapp.com/s/1v8felmY9-n_… CompTIA PenTest + (PT0-002) terabox.com/s/1PAHPXkXxHxv… CEH V12 tibibox.com/s/1pWjde4CVmvk… teraboxapp.com/s/1cLP2eRMTRJd…

Decabyte (@decabyte_info) 's Twitter Profile Photo

🎣 Top 13 Public Phishing Tools 🔹 1. Phishing Frenzy: github.com/pentestgeek/ph… 🎉  🔹 2. Ghost Phisher: github.com/savio-code/gho… 👻  🔹 3. King Phisher: github.com/rsmusllp/king-… 👑  🔹 4. WiFiPhisher: github.com/wifiphisher/wi… 📶  🔹 5. GoPhish: github.com/gophish/gophish 🚀

Sahil Choudhary (@sahilsince2000) 's Twitter Profile Photo

No jailbreak. No problem. 🔓 I built a tool that bypasses iOS SSL Pinning using OpenVPN + iptables — works with Burp Suite & mitmproxy out of the box. 👇 GitHub github.com/SahilH4ck4you/… #CyberSecurity #BugBounty #iOS #Pentesting

SEKTOR7 Institute (@sektor7net) 's Twitter Profile Photo

AV/EDR Lab Environment Setup A curated list of various resources helpful in building own malware-centric research lab. A post by Udayveer Singh (Udayveer Singh) Source: an0nud4y.notion.site/AV-EDR-Lab-Env… #redteam #blueteam #maldev #malwaredevelopment

Faiyaz Ahmad (@faiyazz007) 's Twitter Profile Photo

What if you could learn bug bounty reconnaissance — completely FREE? On my YouTube channel, I’ve created multiple playlists covering practical cybersecurity topics. One of them is my Reconnaissance playlist, where I break down: • How to approach recon from scratch • Subdomain

What if you could learn bug bounty reconnaissance — completely FREE?

On my YouTube channel, I’ve created multiple playlists covering practical cybersecurity topics. One of them is my Reconnaissance playlist, where I break down:

• How to approach recon from scratch
• Subdomain
TheCyberPatronNetwork © (@thecyberpatron_) 's Twitter Profile Photo

7 hands-on GitHub projects to build practical cybersecurity skills today • Splunk: lnkd.in/d2YR_wYA • Windows Forensics: lnkd.in/ds6RT2Yf • Log Analysis: lnkd.in/dhAZvesz • Active Directory: lnkd.in/d5uPB29b • Security Assessments:

CyberSudo (@cyber_sudo) 's Twitter Profile Photo

🔎 OSINT Tool: Discover and Map Invisible Wireless Signals Most OSINT workflows focus on digital footprints like social accounts, domains, or leaks BUT there’s a hidden layer of information right around you wireless signals 📡 WireTapper is a tool that turns those invisible

🔎 OSINT Tool: Discover and Map Invisible Wireless Signals

Most OSINT workflows focus on digital footprints like social accounts, domains, or leaks 
BUT there’s a hidden layer of information right around you wireless signals 📡

WireTapper is a tool that turns those invisible
kelvinlina𖤍✨ (@cybergirl_io) 's Twitter Profile Photo

OSCP LIVE DEMO OffSec Live: Active Information Gathering OffSec Live: Passive Information Gathering OffSec Live: Web Application Attacks OffSec Live: Live Terminal Sessions OffSec Live: SQL Download Link: mega.nz/folder/kykEDaJ… Follow kelvinlina𖤍💜✨ for more

OSCP LIVE DEMO  

OffSec Live:  Active Information Gathering 
OffSec Live: Passive Information Gathering 
OffSec Live: Web Application Attacks 
OffSec Live: Live Terminal Sessions 
OffSec Live: SQL  
Download Link: mega.nz/folder/kykEDaJ… 

Follow
<a href="/cybergirl_io/">kelvinlina𖤍💜✨</a> 
for more
Arcanum Information Security (@arcanuminfosec) 's Twitter Profile Photo

𝚆𝚎 𝚑𝚊𝚟𝚎𝚗’𝚝 𝚛𝚞𝚗 𝚝𝚑𝚒𝚜 𝙻𝙸𝚅𝙴 𝚒𝚗 𝚘𝚟𝚎𝚛 𝟾 𝚖𝚘𝚗𝚝𝚑𝚜. 🔥 Now it’s back. 𝗧𝗵𝗲 𝗕𝘂𝗴 𝗛𝘂𝗻𝘁𝗲𝗿’𝘀 𝗠𝗲𝘁𝗵𝗼𝗱𝗼𝗹𝗼𝗴𝘆 (𝗧𝗕𝗛𝗠) — 𝗟𝗜𝗩𝗘 Join Jason Haddix live for three days of modern web and bug bounty tactics—updated for 2026. Inside: •

𝚆𝚎 𝚑𝚊𝚟𝚎𝚗’𝚝 𝚛𝚞𝚗 𝚝𝚑𝚒𝚜 𝙻𝙸𝚅𝙴 𝚒𝚗 𝚘𝚟𝚎𝚛 𝟾 𝚖𝚘𝚗𝚝𝚑𝚜.

🔥 Now it’s back.

𝗧𝗵𝗲 𝗕𝘂𝗴 𝗛𝘂𝗻𝘁𝗲𝗿’𝘀 𝗠𝗲𝘁𝗵𝗼𝗱𝗼𝗹𝗼𝗴𝘆 (𝗧𝗕𝗛𝗠) — 𝗟𝗜𝗩𝗘

Join Jason Haddix live for three days of modern web and bug bounty tactics—updated for 2026.

Inside:
•
Vasileiadis A. (Cyberkid) (@anastasis_king) 's Twitter Profile Photo

Claude Bug Bounty Hunter - Claude Code skill for AI-assisted bug bounty hunting - recon, IDOR, XSS, SSRF, OAuth, GraphQL, LLM injection, and report generation github.com/shuvonsec/clau…

Claude Bug Bounty Hunter - Claude Code skill for AI-assisted bug bounty hunting - recon, IDOR, XSS, SSRF, OAuth, GraphQL, LLM injection, and report generation

github.com/shuvonsec/clau…
Anton (@antonlovesdnb) 's Twitter Profile Photo

#ClaudeForBlueTeam - Day 20 Use Claude to build you a command that executes a multi-agent, cross-platform log compliance workflow that maps existing audit policies to NIST, PCI, and ATT&CK. Compliance 🤝 Detection Coverage. GRC has never been this fun!

#ClaudeForBlueTeam - Day 20

Use Claude to build you a command that executes a multi-agent, cross-platform log compliance workflow that maps existing audit policies to NIST, PCI, and ATT&amp;CK. Compliance 🤝 Detection Coverage. GRC has never been this fun!
Vasileiadis A. (Cyberkid) (@anastasis_king) 's Twitter Profile Photo

Telegram posts search tool 175,000,000+ posts 2,000,000+ channels Data range from 2026-03-09 (for free search) Partly free deaddrop.theosintconsultants.com/dashboard #socmint #telegram

Telegram posts search tool

175,000,000+ posts
2,000,000+ channels
Data range from 2026-03-09 (for free search)

Partly free

deaddrop.theosintconsultants.com/dashboard

#socmint #telegram
Javier 🇺🇾 (@javierellob0) 's Twitter Profile Photo

🚨🇮🇱 EL MOSSAD HA SIDO HACKEADO 🇮🇱🚨 Un grupo d hackers autodenominado «Anonymous for Justice» afirma haber hackeado bases d datos,laboratorios y planos d armas israelíes. El grupo también publicó archivos con documentos y fotos q pertenecen a oficiales y científicos israelíes.

$NBTC (Ø,G) 「 🖐️ ✦ 🇳🇬 」 (@richiemarley12) 's Twitter Profile Photo

🛡️ Complete SOC Analyst Course (8+ Sections | 100+ Videos | SIEM • Splunk • Blue Team • Interview Prep) Structured SOC roadmap — not random content. 📚 Covers: • Cyber Security + Networking Basics • SOC Workflow & Log Analysis • SIEM (Splunk + QRadar) • Malware Analysis

🛡️ Complete SOC Analyst Course (8+ Sections | 100+ Videos | SIEM • Splunk • Blue Team • Interview Prep)

Structured SOC roadmap — not random content.

📚 Covers: • Cyber Security + Networking Basics
• SOC Workflow &amp; Log Analysis
• SIEM (Splunk + QRadar)
• Malware Analysis