JΔCΞ (@p4lsec) 's Twitter Profile
JΔCΞ

@p4lsec

root@core:~# DAYJOB="OT/ICS Cybersecurity Engineer, mission-critical systems"; FORMER="Combat Vet, US Army"; CREDS="Black Badge @defcon"; OPINIONS="Mine"

ID: 829547530077732864

linkhttp://p0wl.com calendar_today09-02-2017 04:28:38

3,3K Tweet

1,1K Takipçi

775 Takip Edilen

Elorm Daniel (@elormkdaniel) 's Twitter Profile Photo

Nmap is free. Wireshark is free. OpenVAS is free. Kali Linux is free. OSINT Framework is free. Shodan (basic tier) is free. TryHackMe & Hack The Box (basic tiers) are free. You say you want to get into cybersecurity, but the truth is… you already have the tools at your

☣️ Mr. The Plague ☣️ (@dotnetrussell) 's Twitter Profile Photo

For those of you who have already passed the Offensive Security OSCP How did you study? If you choose Timeboxing your hacking before the walkthrough, please comment how long you timebox for before looking at a walkthrough

ched (@cheddarb0b42) 's Twitter Profile Photo

JΔCΞ nine dashboards for mortal men five dashboards for the drawven kings three dashboard for the elven kind and one dashboard to rule them all and in the single pane bind them

JΔCΞ (@p4lsec) 's Twitter Profile Photo

I miss the old infosec twitter. But the new X is pretty cool too. Much more diversity of opinion and a lot of good healthy discourse. Many of yall are incredible people too! The future is happening in real time on this hellsite.

JΔCΞ (@p4lsec) 's Twitter Profile Photo

So many agentic AI companies popping up through the ether. My favorite question - "What value do you provide, that my own cracked engineer with compute and the ability execute can't provide?"

JΔCΞ (@p4lsec) 's Twitter Profile Photo

I want a graph view of my AI chats. I want to be able to branch conversations and visualize the workflows I’m creating. Maybe node and edge summaries can be generated so you can understand the topology at a glance.

JΔCΞ (@p4lsec) 's Twitter Profile Photo

The internet will soon be fully compliant with all of your local freedom of speech violations. Governments will effectively censor speech by threat of lawfare, backed by dubious laws and risk-averse executives. Social media needs to be decentralized. People need to control the