Cyb3rn3t1c5โœจ๐Ÿง•๐Ÿพ (@cyb3rn3t1cs) 's Twitter Profile
Cyb3rn3t1c5โœจ๐Ÿง•๐Ÿพ

@cyb3rn3t1cs

penetration tester | I play with keyboards for a living |voiceoverartist |speaks ๐Ÿ‡ซ๐Ÿ‡ท ๐Ÿ‡ธ๐Ÿ‡ฆ,Yoruba,hausa,Ebira| Cybergirl 4.0 | CAP|EJPT| |BTL1|SC-200|CNSP|SAL1

ID: 1570785650328100866

linkhttp://linkedin.com/in/humairah-adamu-sidi-31a022243 calendar_today16-09-2022 14:44:32

4,4K Tweet

2,2K Takipรงi

994 Takip Edilen

Ghost St Badmus (@commando_skiipz) 's Twitter Profile Photo

Teach your developers the shift-left approach, so yโ€™all wonโ€™t spend so much time and efforts to fix security issues later.

Teach your developers the shift-left approach, so yโ€™all wonโ€™t spend so much time and efforts to fix security issues later.
Ghost St Badmus (@commando_skiipz) 's Twitter Profile Photo

Traditional approach to development: Plan โ€”> Design โ€”> Code โ€”> Build โ€”> Test โ€”> Deploy โ€”> Maintain Shift-left approach: Administering security at every phase of the traditional approach. - During planning: Draft security requirements for the application. 1/3

Theladycalledfunmiโœจ (@lofunmilayo) 's Twitter Profile Photo

I want to fall deeply in love next year, and not hold back. Completely finished! Like, I want to see my own person and my chest will be doing gbim gbim: the sparks, the warmth >>>> I want to feel loved too. To be fully immersed in someone whoโ€™s willing and committed as I am.

Elizabeth Ekedoro (@lizettle_) 's Twitter Profile Photo

Turns out you actually can delete your old tweets in bulk. After tweeting about this yesterday, I discovered a tool that does exactly that. It lets you delete tweets in bulk, filter by time period, keywords, and more. It even goes further by letting you delete all tweets on an

Elizabeth Ekedoro (@lizettle_) 's Twitter Profile Photo

๐—จ๐—ฟ๐—ด๐—ฒ๐—ป๐˜ ๐—ฐ๐—ฎ๐—น๐—น ๐—ณ๐—ผ๐—ฟ ๐—ฎ๐—น๐—น ๐—–๐—œ๐—ฆ๐—ข๐˜€ ๐—ฎ๐—ป๐—ฑ ๐—˜๐—บ๐—ฝ๐—น๐—ผ๐˜†๐—ฒ๐—ฒ๐˜€ ๐—ช๐—ต๐—ผ ๐—จ๐˜€๐—ฒ ๐— ๐—ถ๐—ฐ๐—ฟ๐—ผ๐˜€๐—ผ๐—ณ๐˜ ๐—ง๐—ผ๐—ผ๐—น๐˜€ I read about a newly identified ๐—ฃ๐—ต๐—ถ๐˜€๐—ต๐—ถ๐—ป๐—ด ๐˜๐—ฒ๐—ฐ๐—ต๐—ป๐—ถ๐—พ๐˜‚๐—ฒ called "๐—–๐—ผ๐—ฃ๐—ต๐—ถ๐˜€๐—ต" and I thought to share. This attack exploits Microsoftโ€™s Copilot

๐—จ๐—ฟ๐—ด๐—ฒ๐—ป๐˜ ๐—ฐ๐—ฎ๐—น๐—น ๐—ณ๐—ผ๐—ฟ ๐—ฎ๐—น๐—น ๐—–๐—œ๐—ฆ๐—ข๐˜€ ๐—ฎ๐—ป๐—ฑ ๐—˜๐—บ๐—ฝ๐—น๐—ผ๐˜†๐—ฒ๐—ฒ๐˜€ ๐—ช๐—ต๐—ผ ๐—จ๐˜€๐—ฒ ๐— ๐—ถ๐—ฐ๐—ฟ๐—ผ๐˜€๐—ผ๐—ณ๐˜ ๐—ง๐—ผ๐—ผ๐—น๐˜€

I read about a newly identified ๐—ฃ๐—ต๐—ถ๐˜€๐—ต๐—ถ๐—ป๐—ด ๐˜๐—ฒ๐—ฐ๐—ต๐—ป๐—ถ๐—พ๐˜‚๐—ฒ called "๐—–๐—ผ๐—ฃ๐—ต๐—ถ๐˜€๐—ต" and I thought to share.

This attack exploits Microsoftโ€™s Copilot
Zainab Oladiti (@zainab_cyberdev) 's Twitter Profile Photo

๐Ÿšจ Opportunity Alert If you're a young woman (19-24) in the US, Mexico, India, or Nigeria with an AI idea, check out Technovation's AI Ventures Accelerator. They're offering $10K seed funding + 12 weeks of mentorship to help bring your idea to life. You can apply solo or with a

cocofelon (@donteatme_1) 's Twitter Profile Photo

Letโ€™s take a case study of the API Pentest I did on Vulnbank by Ghost St Badmus With burpsuite, I intercepted traffic and manipulated the login endpoint which gave me access to another users account, why was this, filtering on auth endpoint was bad This is a flaw a penetration