ProjectDiscovery (@pdiscoveryio) 's Twitter Profile
ProjectDiscovery

@pdiscoveryio

Monitor your infrastructure. Real vulnerabilities. Zero noise.

ID: 1155568861757857792

linkhttps://projectdiscovery.io calendar_today28-07-2019 20:01:00

2,2K Tweet

34,34K Takipçi

120 Takip Edilen

ProjectDiscovery (@pdiscoveryio) 's Twitter Profile Photo

It’s here, and it's free: Credential Monitoring from ProjectDiscovery! Detect leaked credentials tied to your domains or emails from millions of malware-stealer logs. • My Leaks / Employee / Customer classification • Domain verification + API + CSV/JSON export Start monitoring

It’s here, and it's free: Credential Monitoring from ProjectDiscovery! Detect leaked credentials tied to your domains or emails from millions of malware-stealer logs.
• My Leaks / Employee / Customer classification
• Domain verification + API + CSV/JSON export
Start monitoring
Geekboy (@emgeekboy) 's Twitter Profile Photo

Your email or company passwords are probably in a malware log somewhere - we've built free cred monitoring so you find out before attackers do. Try it → cloud.projectdiscovery.io/leaks Docs → docs.projectdiscovery.io/cloud/credenti…

Your email or company passwords are probably in a malware log somewhere - we've built free cred monitoring so you find out before attackers do.

Try it → cloud.projectdiscovery.io/leaks
Docs → docs.projectdiscovery.io/cloud/credenti…
ProjectDiscovery (@pdiscoveryio) 's Twitter Profile Photo

We are now on BlueSky (bsky.app/profile/projec…) and Mastadon (infosec.exchange/@projectdiscov…) and it's too quiet! Head over to your favorite platform for security convos and hang out with us 😎

ProjectDiscovery (@pdiscoveryio) 's Twitter Profile Photo

Creating a robust defense requires thinking like an attacker. The increasing complexity of modern software and your organization's external attack surface means traditional security methods are no longer enough.  In this blog, we talk about challenges like legacy tools, manual

Creating a robust defense requires thinking like an attacker.

The increasing complexity of modern software and your organization's external attack surface means traditional security methods are no longer enough. 

In this blog, we talk about challenges like legacy tools, manual
ProjectDiscovery (@pdiscoveryio) 's Twitter Profile Photo

Your current vulnerability scanner is basically a very expensive PDF printer. Learn why current vulnerability scanners fail to stop breaches👇 projectdiscovery.io/blog/why-curre…

Your current vulnerability scanner is basically a very expensive PDF printer.

Learn why current vulnerability scanners fail to stop breaches👇
projectdiscovery.io/blog/why-curre…
ProjectDiscovery (@pdiscoveryio) 's Twitter Profile Photo

Need to integrate a tool into ProjectDiscovery? Check our technical guides for configuring third-party integrations for cloud assets, vulnerability scanning, alerts, and ticketing.👇 docs.projectdiscovery.io/cloud/integrat… #projectdiscovery #hacking

ProjectDiscovery (@pdiscoveryio) 's Twitter Profile Photo

Struggling to manage all your ProjectDiscovery tools? Simplify your workflow with the PDTM! 👇 Check out the GitHub repo here: github.com/projectdiscove…

ProjectDiscovery (@pdiscoveryio) 's Twitter Profile Photo

Tired of dealing with duplicate results in your scans? Httpx now has a cool feature for that: Filter Duplicates Tag! It allows you to filter duplicates as you scan, saving you time and giving you cleaner results. See how it works 👇 youtu.be/4BXMj3ADQ3k?fe…

ProjectDiscovery (@pdiscoveryio) 's Twitter Profile Photo

Credentials leaked in stealer logs? Find out fast (for free.) Search now, enable alerts, and monitor your whole domain (free with verification). 👇 projectdiscovery.io/blog/leaked-cr…

Credentials leaked in stealer logs? Find out fast (for free.) Search now, enable alerts, and monitor your whole domain (free with verification).
👇 projectdiscovery.io/blog/leaked-cr…
ProjectDiscovery (@pdiscoveryio) 's Twitter Profile Photo

Every day, cybercriminals deploy malicious software that quietly steals passwords from infected computers. These "stealer" programs harvest credentials from browsers and applications, bundling this data into logs that often end up publicly accessible on the internet. Your

Every day, cybercriminals deploy malicious software that quietly steals passwords from infected computers.

These "stealer" programs harvest credentials from browsers and applications, bundling this data into logs that often end up publicly accessible on the internet. Your
ProjectDiscovery (@pdiscoveryio) 's Twitter Profile Photo

Simplify your Nuclei templates with this powerful feature! Global Variables in Nuclei are a bunch of global variables that can be added to your templates to make them more efficient. Watch this one-minute video to see how they work 👇  youtu.be/wLIsRceIPz8?fe…

ProjectDiscovery (@pdiscoveryio) 's Twitter Profile Photo

Want to catch secrets, detect a WAF, and spot errors across every HTTP response? Global Matches can automatically detect all of that and more 👇 Dive deeper into Global Matchers: docs.projectdiscovery.io/templates/refe…

ProjectDiscovery (@pdiscoveryio) 's Twitter Profile Photo

Worried about sensitive data showing up in your scan output? Nuclei's Redact Support feature can hide it all with one simple flag. Watch this to learn how 👇