Cyb3rn3t1c5✨🧕🏾 (@cyb3rn3t1cs) 's Twitter Profile
Cyb3rn3t1c5✨🧕🏾

@cyb3rn3t1cs

penetration tester | I play with keyboards for a living |voiceoverartist |speaks 🇫🇷 🇸🇦,Yoruba,hausa,Ebira| Cybergirl 4.0 | CAP|EJPT| |BTL1|SC-200|CNSP|SAL1

ID: 1570785650328100866

linkhttp://linkedin.com/in/humairah-adamu-sidi-31a022243 calendar_today16-09-2022 14:44:32

4,4K Tweet

2,2K Takipçi

994 Takip Edilen

Ghost St Badmus (@commando_skiipz) 's Twitter Profile Photo

Traditional approach to development: Plan —> Design —> Code —> Build —> Test —> Deploy —> Maintain Shift-left approach: Administering security at every phase of the traditional approach. - During planning: Draft security requirements for the application. 1/3

Theladycalledfunmi✨ (@lofunmilayo) 's Twitter Profile Photo

I want to fall deeply in love next year, and not hold back. Completely finished! Like, I want to see my own person and my chest will be doing gbim gbim: the sparks, the warmth >>>> I want to feel loved too. To be fully immersed in someone who’s willing and committed as I am.

Elizabeth Ekedoro (@lizettle_) 's Twitter Profile Photo

Turns out you actually can delete your old tweets in bulk. After tweeting about this yesterday, I discovered a tool that does exactly that. It lets you delete tweets in bulk, filter by time period, keywords, and more. It even goes further by letting you delete all tweets on an

Elizabeth Ekedoro (@lizettle_) 's Twitter Profile Photo

𝗨𝗿𝗴𝗲𝗻𝘁 𝗰𝗮𝗹𝗹 𝗳𝗼𝗿 𝗮𝗹𝗹 𝗖𝗜𝗦𝗢𝘀 𝗮𝗻𝗱 𝗘𝗺𝗽𝗹𝗼𝘆𝗲𝗲𝘀 𝗪𝗵𝗼 𝗨𝘀𝗲 𝗠𝗶𝗰𝗿𝗼𝘀𝗼𝗳𝘁 𝗧𝗼𝗼𝗹𝘀 I read about a newly identified 𝗣𝗵𝗶𝘀𝗵𝗶𝗻𝗴 𝘁𝗲𝗰𝗵𝗻𝗶𝗾𝘂𝗲 called "𝗖𝗼𝗣𝗵𝗶𝘀𝗵" and I thought to share. This attack exploits Microsoft’s Copilot

𝗨𝗿𝗴𝗲𝗻𝘁 𝗰𝗮𝗹𝗹 𝗳𝗼𝗿 𝗮𝗹𝗹 𝗖𝗜𝗦𝗢𝘀 𝗮𝗻𝗱 𝗘𝗺𝗽𝗹𝗼𝘆𝗲𝗲𝘀 𝗪𝗵𝗼 𝗨𝘀𝗲 𝗠𝗶𝗰𝗿𝗼𝘀𝗼𝗳𝘁 𝗧𝗼𝗼𝗹𝘀

I read about a newly identified 𝗣𝗵𝗶𝘀𝗵𝗶𝗻𝗴 𝘁𝗲𝗰𝗵𝗻𝗶𝗾𝘂𝗲 called "𝗖𝗼𝗣𝗵𝗶𝘀𝗵" and I thought to share.

This attack exploits Microsoft’s Copilot
Zainab Oladiti (@zainab_cyberdev) 's Twitter Profile Photo

🚨 Opportunity Alert If you're a young woman (19-24) in the US, Mexico, India, or Nigeria with an AI idea, check out Technovation's AI Ventures Accelerator. They're offering $10K seed funding + 12 weeks of mentorship to help bring your idea to life. You can apply solo or with a

cocofelon (@donteatme_1) 's Twitter Profile Photo

Let’s take a case study of the API Pentest I did on Vulnbank by Ghost St Badmus With burpsuite, I intercepted traffic and manipulated the login endpoint which gave me access to another users account, why was this, filtering on auth endpoint was bad This is a flaw a penetration