ibro. (@og_senseii) 's Twitter Profile
ibro.

@og_senseii

It's the mystique materialistic misfit child of the Imperial Empress | Security @AI, exAWS | vCISO for 💊 company

ID: 1598528604

linkhttps://lazylife.tech calendar_today16-07-2013 14:38:13

13,13K Tweet

972 Followers

257 Following

Hacking Articles (@hackinarticles) 's Twitter Profile Photo

Bug Bounty Cheat Sheet Credit gowthams.gitbook.io/bughunter-hand… #infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecurity #cissp #CyberSec #networking #networksecurity #CheatSheet #infosecurity #cyberattacks #security

Bug Bounty Cheat Sheet

Credit gowthams.gitbook.io/bughunter-hand…

#infosec #cybersecurity #cybersecuritytips  #pentesting #oscp #redteam  #informationsecurity  #cissp #CyberSec #networking #networksecurity #CheatSheet #infosecurity  #cyberattacks #security
TCM Security (@tcmsecurity) 's Twitter Profile Photo

On a budget? You can learn to become an ethical hacker for $0. This video details 100% free resources that are available for learning ethical hacking and all of its foundations (basic IT, networking, Linux, Python, etc.). Check it out here 👇 youtu.be/u4VWQZ8KLmI

Luke Sophinos (@lukesophinos) 's Twitter Profile Photo

I’ve raised ~$30M for my startup, most of it through cold email. Fundraising is about WHO to email and HOW to email. My 5 step process you can copy to raise $$ (🧵). Reading Time: 5 minutes Value: Millions of $$$

Bug Bounty Reports Explained (@gregxsunday) 's Twitter Profile Photo

SSRF seems like a simple vulnerability class but in reality, there are many variables. To see how are people really making money with them, I studied 124 bug bounty reports. From this video, you will learn which functionalities are most often vulnerable. youtu.be/0GxsUS1P5xs

vx-underground (@vxunderground) 's Twitter Profile Photo

This is stolen from the vx-underground GitHub malware collection. They moved some categories around - but this is it verbatim. You're welcome for the malware source code, nerds. That is years of hard work on our end collecting them and curating them.

Mike Takahashi (@taksec) 's Twitter Profile Photo

Google Dorks - Cloud Storage: site:s3.amazonaws.com "target[.]com" site:blob.core.windows.net "target[.]com" site:googleapis.com "target[.]com" site:drive.google.com "target[.]com" Find buckets and sensitive data #recon #bugbountytips #infosec #seo

Google Dorks - Cloud Storage:

site:s3.amazonaws.com "target[.]com"
site:blob.core.windows.net "target[.]com"
site:googleapis.com "target[.]com"
site:drive.google.com "target[.]com"

Find buckets and sensitive data

#recon #bugbountytips #infosec #seo
Culture Crave 🍿 (@culturecrave) 's Twitter Profile Photo

Twitter’s new AI-powered trending tab thinks Klay Thompson is being accused of vandalizing houses with bricks This comes after shooting 0-10 against the Kings

Twitter’s new AI-powered trending tab thinks Klay Thompson is being accused of vandalizing houses with bricks 

This comes after shooting 0-10 against the Kings