Sec_Nerd07 (@itssecuritynerd) 's Twitter Profile
Sec_Nerd07

@itssecuritynerd

🌍 Grateful

💻 Geek

💪 Fitness freak

ID: 1077596137392164865

linkhttps://sahil-security-nerd07.medium.com/ calendar_today25-12-2018 16:05:14

1,1K Tweet

283 Takipçi

161 Takip Edilen

X (@themsterdoctor1) 's Twitter Profile Photo

ChopChop - Quickly Discover Sensitive Endpoints/Files/Folders - Repo: github.com/michelin/ChopC… - Creator: @michelin_eng - #cybersecuritytips #CybersecurityNews #bugbountytips #ctf #infosec

ChopChop - Quickly Discover Sensitive Endpoints/Files/Folders
-
Repo: github.com/michelin/ChopC…
-
Creator: @michelin_eng 
-
#cybersecuritytips #CybersecurityNews #bugbountytips #ctf #infosec
Alex Xu (@alexxubyte) 's Twitter Profile Photo

Explaining 8 Popular Network Protocols in 1 Diagram. The method to download the high-resolution PDF is available at the end. Network protocols are standard methods of transferring data between two computers in a network. 1. HTTP (HyperText Transfer Protocol) HTTP is a protocol

Chris Staudinger (@chrisstaud) 's Twitter Profile Photo

API architectural styles are one of key factors behind seamless applications. Tomorrow thousands of subscribers will learn about the most prominent API architectural styles. Join us to get the issue: blog.levelupcoding.co

Aakash Kanojiya (@kanojiyaaakash1) 's Twitter Profile Photo

Free Computer Science Certifications to try in 2023: 🔸GIT simplilearn.com/learn-git-basi… 🔸Python mygreatlearning.com/academy/learn-… 🔸SQL cognitiveclass.ai/courses/learn-… 🔸DSA mygreatlearning.com/academy/learn-… 🔸Java openclassrooms.com/en/courses/566… 🔸JavaScript openclassrooms.com/en/courses/566… 🔸C alison.com/course/c-progr…

Free Computer Science Certifications to try in 2023:

🔸GIT
simplilearn.com/learn-git-basi…

🔸Python
mygreatlearning.com/academy/learn-…

🔸SQL
cognitiveclass.ai/courses/learn-…

🔸DSA
mygreatlearning.com/academy/learn-…

🔸Java
openclassrooms.com/en/courses/566…

🔸JavaScript
openclassrooms.com/en/courses/566…

🔸C
alison.com/course/c-progr…
Sahn Lam (@sahnlam) 's Twitter Profile Photo

Designing secure web API access is crucial for protecting both user data and application integrity We outline two widely used authentication methods: Token-based Authentication and HMAC Authentication. Token-based Authentication 1. The user submits their credentials through

Designing secure web API access is crucial for protecting both user data and application integrity

We outline two widely used authentication methods: Token-based Authentication and HMAC Authentication.

Token-based Authentication

1. The user submits their credentials through
Zabihullah Atal (@zabihullahatal) 's Twitter Profile Photo

GREAT NEWS FOR Cloud Computing Professionals and Career Seekers! 107-Hour AWS Cloud Project Bootcamp! It's all For FREE 😱! This is Great and an excellent resource for anyone looking to dive into the world of cloud computing. The AWS Cloud Project Bootcamp is a free

GREAT NEWS FOR Cloud Computing Professionals and Career Seekers!

107-Hour AWS Cloud Project Bootcamp!

It's all For FREE 😱!

This is Great and an excellent resource for anyone looking to dive into the world of cloud computing.

The AWS Cloud Project Bootcamp is a free
HackGit (@hack_git) 's Twitter Profile Photo

Frida-Labs The repo contains a series of challenges for learning #Frida for #Android Exploitation. github.com/DERE-ad2001/Fr… #cybersecurity #infosec

Frida-Labs

The repo contains a series of challenges for learning #Frida for #Android Exploitation.

github.com/DERE-ad2001/Fr…

#cybersecurity #infosec
Jason Haddix (@jhaddix) 's Twitter Profile Photo

GAP by / XNL -н4cĸ3r (and @xnl-h4ck3r in the new Sky), is a must-have Burp extension. It parses paths/URLs from JS and pinpoints key params via the sus_params project from Gunnar Andrews and myself. Plus, it generates targeted custom wordlists! 👨‍💻 github.com/xnl-h4ck3r/GAP… 🎥 youtube.com/watch?v=Os3bN0…

Sec_Nerd07 (@itssecuritynerd) 's Twitter Profile Photo

I just wrote a new blog on IOS pentesting after a while. I got this idea when I was stuck for an entire day while setting things up for this assessment. I noticed a lot has changed in this landscape. sahil-security-nerd07.medium.com/getting-starte… #CyberSecurity #Pentesting #IOSpentesting

Dark Web Intelligence (@dailydarkweb) 's Twitter Profile Photo

OSINT Resources by Country Here you'll find a collection of links to various OSINT tools, websites, and projects that are specific to different countries. github.com/wddadk/OSINT-f… #cybersecurity #OSINT

OSINT Resources by Country

Here you'll find a collection of links to various OSINT tools, websites, and projects that are specific to different countries.

github.com/wddadk/OSINT-f…

#cybersecurity #OSINT
InfoSec Community (@infoseccomm) 's Twitter Profile Photo

🚨 New Writeup Alert! 🚨 "Bug Hunting for Real: Tools, Tactics, and Truths No One Talks About" by Ehtesham Ul Haq is now live on IW! Check it out here: infosecwriteups.com/661f6786d5b3 #writeup #bugbounty #reconnaissance #rewards #penetrationtesting

XBOW (@xbow) 's Twitter Profile Photo

Offense at scale starts with an API. Today, we’re launching the XBOW Public API in Public Preview. Autonomous pentesting gave teams expert-level assessments in hours. But turning that capability into infrastructure required one more piece: programmatic access. Teams can now