iZZy (@n_velic) 's Twitter Profile
iZZy

@n_velic

โ€œThe greatest mistake we make
is living in constant fear
that we will make one.โ€

ID: 247480152

calendar_today04-02-2011 22:00:31

548 Tweet

111 Followers

847 Following

Admirim (@admirim) 's Twitter Profile Photo

Remarkable investigation by Rolling Stone. Serbian war criminal who kicks the dead body of a woman in Bosnia in this '92 pic is Srdjan Golubovic aka DJ Max. He walks free & has performed in Serbia's top music festival. He was on the payroll of Serbia's State Security Service.

Remarkable investigation by <a href="/RollingStone/">Rolling Stone</a>.

Serbian war criminal who kicks the dead body of a woman in Bosnia in this '92 pic is Srdjan Golubovic aka DJ Max.

He walks free &amp; has performed in Serbia's top music festival.

He was on the payroll of Serbia's State Security Service.
Daniel Kelley (@danielmakelley) 's Twitter Profile Photo

17 platforms where you can begin cybersecurity: 1. HackXpert - Free labs and training. 2. TryHackMe - Hands-on exercises and labs. 3. CyberSecLabs - High quality training labs. 4. Cybrary - Videos, labs, and practice exams. 5. LetsDefend - Blue team training platform.

X (@themsterdoctor1) 's Twitter Profile Photo

๐Ÿ”’ Explore a treasure trove of Cyber Security resources! ๐Ÿ“š๐Ÿ–ฅ๏ธ Dive into a drive filled with FREE PDFs to enhance your knowledge. Don't miss out on this valuable collection! ๐ŸŒ๐Ÿ›ก๏ธ Drive Link: drive.google.com/drive/mobile/fโ€ฆ #cybersecurity #hacking #infosecurity

๐Ÿ”’ Explore a treasure trove of Cyber Security resources! ๐Ÿ“š๐Ÿ–ฅ๏ธ

 Dive into a drive filled with FREE PDFs to enhance your knowledge. 

Don't miss out on this valuable collection! ๐ŸŒ๐Ÿ›ก๏ธ

Drive Link: drive.google.com/drive/mobile/fโ€ฆ

 #cybersecurity #hacking #infosecurity
Tech Enthusiast (@ctprecious) 's Twitter Profile Photo

: ))! Kagi - is another powerful search engine that helps investigators, researchers, and analysts navigate their hunts without noise > No ad-free, customizable results, AI assistants (opt-in), and "lenses" to filter searches. Great SE to give a try!! #OSINT #Cybersecurity

Sprinter Observer (@sprinterobserve) 's Twitter Profile Photo

Trump: We will attack Iran from land. - Trump: We will not attack Iran from land. - Trump: The Kurdish opposition will rise up against Iran. - Trump: I don't want the Kurds there. - Trump: By 2025, we will eradicate Iran's nuclear program. - Trump: By 2026, we will try to

Trump: We will attack Iran from land.
- Trump: We will not attack Iran from land.

- Trump: The Kurdish opposition will rise up against Iran.
- Trump: I don't want the Kurds there.

- Trump: By 2025, we will eradicate Iran's nuclear program.
- Trump: By 2026, we will try to
Tech Enthusiast (@ctprecious) 's Twitter Profile Photo

In OSINT, a single email is a digital fingerprint. But what if you don't have it? Email Permutation is your secret weapon. By combining names + domains, you can: - Uncover unlisted executive emails, social profiles, & breach data to find old aliases. #OSINT #CyberSecurity