McSam (@themcsam) 's Twitter Profile
McSam

@themcsam

computerphile

ID: 1248159193741307904

linkhttps://themcsam.github.io/ calendar_today09-04-2020 08:02:39

1,1K Tweet

476 Followers

1,1K Following

brCTF Ghana (@brctf) 's Twitter Profile Photo

Exciting News! Registration for brCTF V2 will be open tomorrow, September 25th, 2024! Get ready to create your accounts and form your teams. Don’t miss your chance to be part of this thrilling competition!

Exciting News! 

Registration for brCTF V2 will be open tomorrow, September 25th, 2024! Get ready to create your accounts and form your teams. Don’t miss your chance to be part of this thrilling competition!
brCTF Ghana (@brctf) 's Twitter Profile Photo

Don’t forget to create your account and set up your teams for the brCTF V2 at brctf.africa Each team needs 4 members, so gather your crew and get ready to break through King Agorkoli’s wall! invite your friends to join the challenge Tech In Twi

brCTF Ghana (@brctf) 's Twitter Profile Photo

We’d love to have media partners like #TV3GH involved to help spread the word about the importance of cybersecurity in Ghana. Let’s make this a national event to remember! 🎯

We’d love to have media partners like <a href="/tv3_ghana/">#TV3GH</a>  involved to help spread the word about the importance of cybersecurity in Ghana. Let’s make this a national event to remember! 🎯
LaurieWired (@lauriewired) 's Twitter Profile Photo

What’s the difference between MOV and LEA in assembly? These instructions are often read almost interchangeably, but both serve distinct and important purposes. LEA retrieves and stores an address or pointer to the location of data. The MOV instruction is like dereferencing this

brCTF Ghana (@brctf) 's Twitter Profile Photo

Through the night, our brilliant teams have been battling it out. We introduced a lock-picking challenge at midnight, and teams leapt at the chance to earn an extra 200 points! Stay tuned as we approach the thrilling final stretch! #brCTF #Finals #CTF #EscapeTheWall #Ghana

Through the night, our brilliant teams have been battling it out. We introduced a lock-picking challenge at midnight, and teams leapt at the chance to earn an extra 200 points! Stay tuned as we approach the thrilling final stretch!
#brCTF #Finals #CTF #EscapeTheWall #Ghana
McSam (@themcsam) 's Twitter Profile Photo

We played in the Snyk Fetch The Flag CTF 2025, hosted by John Hammond and Snyk, and we put up an impressive fight! Massive shoutout to my incredible teammates Mark Uche, TroyLynx, and ~Ghost—y’all were skillful and unstoppable! #Pwn #FetchTheFlag

We played in the Snyk Fetch The Flag CTF 2025, hosted by <a href="/_JohnHammond/">John Hammond</a>  and <a href="/snyksec/">Snyk</a>, and we put up an impressive fight! 

Massive shoutout to my incredible teammates <a href="/markuche1337/">Mark Uche</a>, <a href="/TroyLynx/">TroyLynx</a>, and <a href="/QuophiZiv/">~Ghost</a>—y’all were skillful and unstoppable! 

 #Pwn #FetchTheFlag
CVE (@cvenew) 's Twitter Profile Photo

CVE-2024-57169 A file upload bypass vulnerability exists in SOPlanning 1.53.00, specifically in /process/upload.php. This vulnerability allows remote attackers to bypass upload rest… cve.org/CVERecord?id=C…

CVE (@cvenew) 's Twitter Profile Photo

CVE-2024-57170 SOPlanning 1.53.00 is vulnerable to a directory traversal issue in /process/upload.php. The "fichier_to_delete" parameter allows authenticated attackers to specify fi… cve.org/CVERecord?id=C…

InfoSec Pat (@infosecpat) 's Twitter Profile Photo

🎉 GIVEAWAY ALERT! 🎉 From InfoSec Pat and a special thanks to , The Hack The Box Cyber Apocalypse CTF is live and in full swing 🟢 I hope you are all loving it. I am enjoying all the fun challenges. To celebrate this awesome event, I’m giving away an AWESOME swag voucher 🎟️

🎉 GIVEAWAY ALERT! 🎉 From InfoSec Pat and a special thanks to ,

 The Hack The Box Cyber Apocalypse CTF is live and in full swing 🟢 I hope you are all loving it. I am enjoying all the fun challenges. 

 To celebrate this awesome event, I’m giving away an AWESOME swag voucher 🎟️
Byte Time Sessions (@bytetimesession) 's Twitter Profile Photo

Yo, hacker crew! 🚀 Join our X Space as the hackmaster 🥷 Niihack drops 7 years of epic hacking & defending secrets. 🧠 Bring your questions—this is unmissable! Let’s spark a wild discussion! 🔥💬 x.com/i/spaces/1mnGe…

Byte Time Sessions (@bytetimesession) 's Twitter Profile Photo

Hello Byte Time Ninjas! @everyone Remember our promise to host monthly knowledge-packed sessions? Well, it's that time again! This Saturday at 6 PM, we’re diving into the Basics of SIEM (Security Information and Event Management). (1/3)

Hello Byte Time Ninjas! @everyone 

Remember our promise to host monthly knowledge-packed sessions? Well, it's that time again! 

This Saturday at 6 PM, we’re diving into the Basics of SIEM (Security Information and Event Management). 
(1/3)
Byte Time Sessions (@bytetimesession) 's Twitter Profile Photo

📢 BYTE TIME SESSIONS: BINARY EXPLOITATION WEBINAR 🎯 Topic: Bending the Bytes of Software — Basics of Binary Exploitation In the world of hacking, understanding software at the binary level is essential. (1/5)

📢 BYTE TIME SESSIONS: BINARY EXPLOITATION WEBINAR
🎯 Topic: Bending the Bytes of Software — Basics of Binary Exploitation

In the world of hacking, understanding software at the binary level is essential. 

(1/5)
Bug Bounty Village (@bugbountydefcon) 's Twitter Profile Photo

To celebrate our badge launch, we're giving away FIVE free 6-month licenses to @pentesterlab. ✅ Comment BADGELIFE and retweet this post to enter. Additionally, pre-order a custom badge at shop.bugbountydefcon.com for a chance to win one of FIVE Annual VIP+ subscription to

Ryan Michael (@ryanetornam) 's Twitter Profile Photo

🧑‍💻🔎From Logs to Insights: Bridging the Gap between AI and Security Operations ⭐️ Security teams often spend hours digging through alerts, logs, and vulnerabilities. What if you could just ask a question in plain English and get the answer instantly? I’ve built an AI agent that

🧑‍💻🔎From Logs to Insights: Bridging the Gap between AI and Security Operations ⭐️

Security teams often spend hours digging through alerts, logs, and vulnerabilities. What if you could just ask a question in plain English and get the answer instantly?

I’ve built an AI agent that