Saudi (@tnsaudi) 's Twitter Profile
Saudi

@tnsaudi

Threat & Adversarial Emulation | Offensive Security | CTF player @fr334aks

ID: 1476461257054109697

linkhttp://trevorsaudi.com calendar_today30-12-2021 07:53:04

32 Tweet

277 Takipçi

225 Takip Edilen

Sir M (@ikuamike) 's Twitter Profile Photo

If you're looking to push yourself to learn CyberSecurity and have been lacking discipline. You can join the #100DaysOfHacking challenge by Jones. Good initiative!

Jones Baraza (@jonesbaraza) 's Twitter Profile Photo

I am looking to hire a junior PHP developer for an upcoming project & possibly long-term. Must be conversant with Core PHP & any other PHP framework. My DM is open. Please reach out with your Github repo(s).

SheHacks KE #SheHacks2025 (@shehacks_ke) 's Twitter Profile Photo

In this week's article Christine Wambiru takes us through her journey into Forensics using Volatility, an open-source memory forensics tool for incident response and malware analysis. The article practically shows a demo on how to use this tool. Read more below shehackske.medium.com/volatility-68a…

#BSidesNairobi2025 (@bsidesnairobi) 's Twitter Profile Photo

Today our speaker spotlight for BSides Nairobi Cyber Security Conference 2022 is Trevor Saudi @tnsaudi. Trevor will be giving a talk on Symbolic Execution and Program Analysis. Get your tickets here: bit.ly/3vQKufQ

Today our speaker spotlight for BSides Nairobi Cyber Security Conference 2022 is Trevor Saudi @tnsaudi.

Trevor will be giving a talk on Symbolic Execution and Program Analysis.

Get your tickets here: bit.ly/3vQKufQ
Pauline. (@kot_hacker) 's Twitter Profile Photo

Youtube has some of the most interesting channels for a curious mind. These are some of the best Cybersecurity and Hacking tutorial Channels I normally watch. #cybersecurity #infosecurity #HackingTutorials #WomenIntech Thread.

@iLabAfrica (@ilabafrica) 's Twitter Profile Photo

We are looking to recruit cybersecurity interns for our Cybersecurity Unit with the following experience. 1. 2nd & 3rd-year undergraduates. 2. Demonstrated knowledge, skill, or passion in cybersecurity and/or blockchain is an added advantage through certifications, blogs ...

atomiczsec (@atomiczsec) 's Twitter Profile Photo

Here is how I made $1,000 on a bug bounty program in less than 2 hours: Started off with burp suite and crawling the website. I found a page that had the directory of https://target[.]com/opt-out so I went to that page and saw there was input for an email. 1/x

Bug Bounty Village (@bugbountydefcon) 's Twitter Profile Photo

Excited to announce a new giveaway, thanks to PentesterLab. We will pick 10 winners to win 6 month (x5) and 1 month (x5) subscriptions. To enter: 1️⃣ Follow us @BugBountyDefcon and PentesterLab 2️⃣ Like this post ❤️ 3️⃣ RT this post 🔁 You've time until next Friday (10/18), GO!

Vulncure (@vulncure) 's Twitter Profile Photo

🚨 FREE OSCP Voucher Giveaway 🚨 🏆Vulncure is giving away a FREE OSCP voucher! 🎓 Boost your skills with one of the most respected certification To Enter : < 25th Oct 1️⃣ Follow @Vulncure 2️⃣ Like & RT 3️⃣ Tag 3 friends 👨‍💻👩‍💻 🎁 Bonus: Tell us why YOU want to be OSCP certified!

🚨 FREE OSCP Voucher Giveaway 🚨

🏆Vulncure is giving away a FREE OSCP voucher! 🎓 Boost your skills with one of the most respected certification

To Enter : &lt; 25th Oct 
1️⃣ Follow @Vulncure 
2️⃣ Like &amp; RT
3️⃣ Tag 3 friends 👨‍💻👩‍💻

🎁 Bonus: Tell us why YOU want to be OSCP certified!