👩🏻‍💻 Jane Scott 🇦🇺 (@janescott) 's Twitter Profile
👩🏻‍💻 Jane Scott 🇦🇺

@janescott

cybersecurity geek • python herder • vuln hunter • infosec sprite • molgen/biotech nerd • ex-sysadmin • she/her • opinions (most certainly) my own • ☕️🏃‍♀️🔑

ID: 466390179

linkhttps://twitter.com/JaneScott/timelines/1178607827931324417 calendar_today17-01-2012 10:45:00

4,4K Tweet

3,3K Takipçi

366 Takip Edilen

Ignis (@ahakcil) 's Twitter Profile Photo

As promised, here it is - All the useful data i collected from 1.000.000.000 leaked credentials on the internet. And yes, it includes a wordlist of most common ones too, and it has a %80 mismatch rate with rockyou.txt. github.com/FlameOfIgnis/P… #infosec #bugbounty

Sayed Tabatabai, MD (@therealdoctort) 's Twitter Profile Photo

The elevator doors slide open. There’s already someone inside, one of the hospitalists. He moves over to one side as I enter, subconsciously distancing. I look at him and smile, “Coming or going?” He doesn’t answer right away. Instead, he pauses, as if trying to remember. 1/

C&EN (Chemical & Engineering News) (@cenmag) 's Twitter Profile Photo

For the first time, scientists are able to use X-rays and electron diffraction to visualize the dynamics of chemical reactions, down to the femtosecond. ow.ly/zQZv50AErGU

Erin Ekins (she/her) (@queerlyautistic) 's Twitter Profile Photo

Please help out my friend, this is an appalling failure heaped in a mound of others and it's not fair. She needs a new wheelchair by next week just so she can get to the hospital to access surgery she needs, because hospital transport won't take her current one. Please help!

Caitlin Duncan (@cduncs97) 's Twitter Profile Photo

Here’s part of my PhD work on the synthesis of calix[4]arenes for testing against Human Papillomavirus pentamer formation @ISMSC2020 #ISMSCPoster #macrocycles12 Mauro Mocerino There is an image in the comments if you want to zoom in 😊

zseano (@zseano) 's Twitter Profile Photo

You can read thousands of blogs detailing security vulnerabilities, for free. You can watch hundreds of hours of hacking content, for free. You can begin hacking right now, for free. The only cost is your time

fraq (@0xfraq) 's Twitter Profile Photo

oh it's simple. you write the app, then you write the dockerfile. then you write the helm chart. then you write the deployment to describe the helm chart which describes the deployment for the containerized app. In this simple tutorial, we will launch a hello world app.. 1/496

shubs (@infosec_au) 's Twitter Profile Photo

I leaked NTLM creds via an XXE last night. Underlying library this application was using was msxml3.dll. I always try and leak NTLM creds when working with XXE on windows. Works sometimes. As simple as setting up responder and requesting //ip via the XXE.

l0ss (@mikeloss) 's Twitter Profile Photo

I don’t know who needs to hear this but “we ignored those alerts because we thought it was pentesters” is not the iron-clad excuse you think jt is, even if it DID turn out to be pentesters.

Lesley Carhart (@hacks4pancakes) 's Twitter Profile Photo

Ian is right. We need some more positivity! 👩🏻‍💻💜🍸 How about you tell me what your favorite infosec talk of all time was? Bonus points for a YouTube or podcast link and bonus bonus for tagging the speaker!

Ryan Castellucci (@ryancdotorg) 's Twitter Profile Photo

Our continuing mission: To explore strange new platforms. To seek out new bugs and new software. To boldly shitpost where no one has shitposted before.