Amadou Tidiane B Ba (@amadou_insights) 's Twitter Profile
Amadou Tidiane B Ba

@amadou_insights

Tech Enthusiast | AI & Cybersecurity Insights
Exploring the future of technology, from AI breakthroughs to cybersecurity trends.

ID: 864500578235420678

calendar_today16-05-2017 15:19:34

112 Tweet

65 Takipçi

413 Takip Edilen

Amadou Tidiane B Ba (@amadou_insights) 's Twitter Profile Photo

Here is something that i wanted to share! I assisted a presentation that talked about Business Logic flaws or vulnerabilities and I realized that using tools to automate finding bugs is not really effective. What do you think about it?

Steve · Millionaire Habits (@steveonspeed) 's Twitter Profile Photo

10 B.S. things most people believe about millionaires that keep them poor. 1: Most millionaires inherited their wealth. False. A 2018 study found that only about 9% of the world's richest people inherited the majority of their wealth. Most millionaires are self-made.

Stealthy (@stealthybugs) 's Twitter Profile Photo

One day, the technique for exploiting this vulnerability will be available. Not today, but one day. Working with other bug hunters makes a huge difference. Two minds bouncing ideas off each other leads to peak efficiency.

One day, the technique for exploiting this vulnerability will be available. Not today, but one day.

Working with other bug hunters makes a huge difference. Two minds bouncing ideas off each other leads to peak efficiency.
Daniel Kelley (@danielmakelley) 's Twitter Profile Photo

30 cybersecurity search engines for researchers: 1. DeHashed—View leaked credentials. 2. SecurityTrails—Extensive DNS data. 3. DorkSearch—Really fast Google dorking. 4. ExploitDB—Archive of various exploits. 5. ZoomEye—Gather information about targets.

David Bombal (@davidbombal) 's Twitter Profile Photo

To succeed, we must first believe that we can. #DailyMotivation #inspiration #motivation #bestadvice #lifelessons #changeyourmindset

To succeed, we must first believe that we can.

#DailyMotivation #inspiration #motivation #bestadvice #lifelessons #changeyourmindset
PentesterLab (@pentesterlab) 's Twitter Profile Photo

🎄 Want to boost your AppSec skills this season? Here’s your Advent challenge: pick a codebase and read its code for one hour every day. By the end of the month, you’ll be amazed at how much you’ve learned! 🚀

Mike Miller (@mikemillercyber) 's Twitter Profile Photo

Just Released - 29 Hands on Web Application Penetration Testing Labs - Brand New Course: If you're looking to be a web application penetration tester, today is your day. 5 new modules and 29 labs that include the following: Make sure you Bookmark 📚 these for later. 🟡 Module

Just Released - 29 Hands on Web Application Penetration Testing Labs - Brand New Course:

If you're looking to be a web application penetration tester, today is your day.  5 new modules and 29 labs that include the following:

Make sure you Bookmark 📚 these for later.

🟡 Module
PentesterLab (@pentesterlab) 's Twitter Profile Photo

🚀 Want to become a top-tier web hacker? Mastering web security is about curiosity, persistence, and hands-on experience. Here's your roadmap with 5 essential activities: 🔎 Read HTTP parser code 💻 Build a simple web app 📜 Dive into an RFC 🏆 Play CTF 🛠️ Fix a bug in an

Mario Nawfal (@marionawfal) 's Twitter Profile Photo

🔥 Think you've seen it all? Think again Get ready for game-changing innovations in AI, computing, and mobility. These 10 breakthroughs will blow your mind! 😱

🔥 Think you've seen it all? Think again

Get ready for game-changing innovations in AI, computing, and mobility.

These 10 breakthroughs will blow your mind! 😱
Intigriti (@intigriti) 's Twitter Profile Photo

Having a bug bounty methodology is crucial! Here are 4 FREE resources to help you expand your current methodology! 😎 🧵 👇

PentesterLab (@pentesterlab) 's Twitter Profile Photo

🔍 Want to level up as an Application Security Engineer? PentesterLab isn't just about finding bugs—it's about mastering code review, building custom tools, and understanding real-world vulnerabilities. 💡 Hands-on labs 💻 Create your own JWT tools 🔍 Code review on real