๐™€๐™ฏ๐™ฏ ๐™–๐™ก๐™™๐™š๐™š๐™ฃ ๐˜ผ๐™ก๐™จ๐™๐™–๐™ก๐™›๐™ž. (@y_on_2) 's Twitter Profile
๐™€๐™ฏ๐™ฏ ๐™–๐™ก๐™™๐™š๐™š๐™ฃ ๐˜ผ๐™ก๐™จ๐™๐™–๐™ก๐™›๐™ž.

@y_on_2

๐‘ช๐’š๐’ƒ๐’†๐’“ ๐‘บ๐’•๐’–(๐‘บ๐‘ป๐‘ผ)(๐’Š๐’๐’‡๐’๐’“๐’Ž๐’‚๐’•๐’Š๐’๐’ ๐’”๐’†๐’„๐’–๐’“๐’Š๐’•๐’š)|๐‘ป๐‘ถ๐‘ฌ๐‘ญ๐‘ณ ๐’Š๐‘ฉ๐‘ป | ๐‘ป๐’‰๐’† ๐’‘๐’๐’”๐’Š๐’•๐’Š๐’—๐’† ๐’‚๐’๐’… ๐’‚๐’Ž๐’ƒ๐’Š๐’•๐’Š๐’๐’–๐’” ๐‘ท๐’–๐’‘๐’Š๐’.

ID: 1538267623435259905

calendar_today18-06-2022 21:09:35

453 Tweet

125 Followers

1,1K Following

๐™€๐™ฏ๐™ฏ ๐™–๐™ก๐™™๐™š๐™š๐™ฃ ๐˜ผ๐™ก๐™จ๐™๐™–๐™ก๐™›๐™ž. (@y_on_2) 's Twitter Profile Photo

Logs never forget. Neither should you Historical log search lets analysts go back in time to trace incidents, uncover hidden threats, or validate hypotheses. Itโ€™s crucial for threat hunting, forensic analysis, and compliance audits.

๐™€๐™ฏ๐™ฏ ๐™–๐™ก๐™™๐™š๐™š๐™ฃ ๐˜ผ๐™ก๐™จ๐™๐™–๐™ก๐™›๐™ž. (@y_on_2) 's Twitter Profile Photo

See the threat before it sees you. IBM QRadar automatically collects and correlates logs, network flows, and threat intel to spot suspicious activity. It reduces noise with smart offense prioritization;you focus on real threats, not false alarms. Your SOCโ€™s early warning radar.

๐™€๐™ฏ๐™ฏ ๐™–๐™ก๐™™๐™š๐™š๐™ฃ ๐˜ผ๐™ก๐™จ๐™๐™–๐™ก๐™›๐™ž. (@y_on_2) 's Twitter Profile Photo

Turn chaos into clarity. Splunk ingests massive volumes of machine data, normalizes it, and lets you search, visualize, and correlate security events. From real-time threat alerts to historical forensics, it transforms raw logs into actionable intelligence. Data in. Insight out.

๐™€๐™ฏ๐™ฏ ๐™–๐™ก๐™™๐™š๐™š๐™ฃ ๐˜ผ๐™ก๐™จ๐™๐™–๐™ก๐™›๐™ž. (@y_on_2) 's Twitter Profile Photo

From raw logs to real insight. The ELK Stack Elasticsearch (search), Logstash (ingest/parse), and Kibana (visualize) powers open-source log management. Collect, normalize, and analyze security events with customizable dashboards and queries. Flexible and scalable

๐™€๐™ฏ๐™ฏ ๐™–๐™ก๐™™๐™š๐™š๐™ฃ ๐˜ผ๐™ก๐™จ๐™๐™–๐™ก๐™›๐™ž. (@y_on_2) 's Twitter Profile Photo

Connect the dots before the breach. Micro Focus ArcSight ingests security data from across your enterprise, applies correlation rules, and highlights high-risk events. Itโ€™s built for scalable threat detection, compliance, and forensic investigations

๐™€๐™ฏ๐™ฏ ๐™–๐™ก๐™™๐™š๐™š๐™ฃ ๐˜ผ๐™ก๐™จ๐™๐™–๐™ก๐™›๐™ž. (@y_on_2) 's Twitter Profile Photo

From raw logs to actionable insightsโ€”open source style. Explanation: ELK Stack is a free, open-source trio: Elasticsearch โ†’ stores and searches massive log data at lightning speed. Logstash โ†’ collects, parses, and normalizes logs from multiple sources.

๐™€๐™ฏ๐™ฏ ๐™–๐™ก๐™™๐™š๐™š๐™ฃ ๐˜ผ๐™ก๐™จ๐™๐™–๐™ก๐™›๐™ž. (@y_on_2) 's Twitter Profile Photo

Security with a 360ยฐ view. ArcSight specializes in real-time correlation and advanced analytics to detect complex threats across vast networks. It helps SOC teams connect the dots between logs, alerts, and incidentsโ€”before attacks escalate. Proactive. Scalable. Battle-tested.

๐™€๐™ฏ๐™ฏ ๐™–๐™ก๐™™๐™š๐™š๐™ฃ ๐˜ผ๐™ก๐™จ๐™๐™–๐™ก๐™›๐™ž. (@y_on_2) 's Twitter Profile Photo

Your first line leaves footprints. Firewalls donโ€™t just block and allow traffic, they generate logs showing every connection attempt, rule match, and denied request. Feeding these logs into your SIEM helps spot port scans, brute-force attempts, and policy violations in real time

๐™€๐™ฏ๐™ฏ ๐™–๐™ก๐™™๐™š๐™š๐™ฃ ๐˜ผ๐™ก๐™จ๐™๐™–๐™ก๐™›๐™ž. (@y_on_2) 's Twitter Profile Photo

The cloud leaves a paper trail too. Logs from AWS CloudTrail and Azure Monitor capture every action API calls, login attempts, resource changes. Feeding them into your SIEM reveals misconfigurations, unauthorized access, or insider threats. Cloud visibility =>Cloud security.

๐™€๐™ฏ๐™ฏ ๐™–๐™ก๐™™๐™š๐™š๐™ฃ ๐˜ผ๐™ก๐™จ๐™๐™–๐™ก๐™›๐™ž. (@y_on_2) 's Twitter Profile Photo

Burp Suite is a popular web security platform centered on an intercepting proxy that sits between your browser and the web app. It lets testers capture, inspect, modify, and replay HTTP(S) traffic to find vulnerabilitiesโ€”everything from broken auth to SQLi and XSS.

Abdulrahman Alamri (@abdul__alamri) 's Twitter Profile Photo

ู†ุตูŠุญุฉ ู„ูƒู„ ุดุฎุต ู…ุญุชุฑู‚ ูˆุธูŠููŠู‹ุง

Harshleen Chawla (@harshleenchawl2) 's Twitter Profile Photo

๐˜›๐˜ฉ๐˜ช๐˜ด ๐˜จ๐˜ช๐˜ต๐˜ฉ๐˜ถ๐˜ฃ ๐˜ณ๐˜ฆ๐˜ฑ๐˜ฐ๐˜ด๐˜ช๐˜ต๐˜ฐ๐˜ณ๐˜บ ๐˜ค๐˜ฐ๐˜ฏ๐˜ต๐˜ข๐˜ช๐˜ฏ๐˜ด ๐˜ข ๐˜ค๐˜ฐ๐˜ญ๐˜ญ๐˜ฆ๐˜ค๐˜ต๐˜ช๐˜ฐ๐˜ฏ ๐˜ฐ๐˜ง 150+ ๐˜ต๐˜ฐ๐˜ฐ๐˜ญ๐˜ด ๐˜ข๐˜ฏ๐˜ฅ ๐˜ณ๐˜ฆ๐˜ด๐˜ฐ๐˜ถ๐˜ณ๐˜ค๐˜ฆ๐˜ด ๐˜ต๐˜ฉ๐˜ข๐˜ต ๐˜ค๐˜ข๐˜ฏ ๐˜ฃ๐˜ฆ ๐˜ถ๐˜ด๐˜ฆ๐˜ง๐˜ถ๐˜ญ ๐˜ง๐˜ฐ๐˜ณ ๐˜ณ๐˜ฆ๐˜ฅ ๐˜ต๐˜ฆ๐˜ข๐˜ฎ๐˜ช๐˜ฏ๐˜จ ๐˜ข๐˜ค๐˜ต๐˜ช๐˜ท๐˜ช๐˜ต๐˜ช๐˜ฆ๐˜ด๐ŸŸฅ github.com/A-poc/RedTeam-โ€ฆ

๐˜›๐˜ฉ๐˜ช๐˜ด ๐˜จ๐˜ช๐˜ต๐˜ฉ๐˜ถ๐˜ฃ ๐˜ณ๐˜ฆ๐˜ฑ๐˜ฐ๐˜ด๐˜ช๐˜ต๐˜ฐ๐˜ณ๐˜บ ๐˜ค๐˜ฐ๐˜ฏ๐˜ต๐˜ข๐˜ช๐˜ฏ๐˜ด ๐˜ข ๐˜ค๐˜ฐ๐˜ญ๐˜ญ๐˜ฆ๐˜ค๐˜ต๐˜ช๐˜ฐ๐˜ฏ ๐˜ฐ๐˜ง 150+ ๐˜ต๐˜ฐ๐˜ฐ๐˜ญ๐˜ด ๐˜ข๐˜ฏ๐˜ฅ ๐˜ณ๐˜ฆ๐˜ด๐˜ฐ๐˜ถ๐˜ณ๐˜ค๐˜ฆ๐˜ด ๐˜ต๐˜ฉ๐˜ข๐˜ต ๐˜ค๐˜ข๐˜ฏ ๐˜ฃ๐˜ฆ ๐˜ถ๐˜ด๐˜ฆ๐˜ง๐˜ถ๐˜ญ ๐˜ง๐˜ฐ๐˜ณ ๐˜ณ๐˜ฆ๐˜ฅ ๐˜ต๐˜ฆ๐˜ข๐˜ฎ๐˜ช๐˜ฏ๐˜จ ๐˜ข๐˜ค๐˜ต๐˜ช๐˜ท๐˜ช๐˜ต๐˜ช๐˜ฆ๐˜ด๐ŸŸฅ
github.com/A-poc/RedTeam-โ€ฆ
Muqsit ๐• (@mqst_) 's Twitter Profile Photo

๐Ÿ‘พ Game Hacking: A Comprehensive Guide on Game Hacking Part 0: bananamafia.dev/post/cvar-hax/ Part 1: bananamafia.dev/post/multihack/ Part 2: bananamafia.dev/post/bananabot/ Part 3: bananamafia.dev/post/d3dhook/ Part 4: bananamafia.dev/post/frida-uniโ€ฆ Part 5: bananamafia.dev/post/cs-aimbotโ€ฆ Author: banane

ุนุจุฏุงู„ู…ุฌูŠุฏ ๐Ÿ‡ธ๐Ÿ‡ฆ (@abdulmajeedful) 's Twitter Profile Photo

ุงูƒุซุฑ ุงุณุจุงุจ ุฑูุถ ุงู„ู…ุชู‚ุฏู…ูŠู† ุจุงู„ู…ู‚ุงุจู„ุงุช ุงู„ุดุฎุตูŠุฉ: 1- ุงู„ุญู…ุงุณ ุงู„ุฒุงุฆุฏ (ุงู„ุทูุงู‚ุฉ) 2- ุทุฑูŠู‚ุฉ ุงู„ุชูˆุงุตู„ (ูŠู‚ุงุทุน ูƒุซูŠุฑ + ุงู†ูุนุงู„ูŠ + ูŠุฌุงุฏู„) 3- ุงู„ุงุณุชุนุฌุงู„ (ุนูƒุณ ุงู„ู‡ุฏูˆุก) 4- ุงุนุทุงุก ุงู†ุทุจุงุน ุงู„ุชุดุงุคู… (ูŠุชุญู„ุทู… ูˆุงุฌุฏ) 5- ุงู„ูŠ ูŠุชุดุฑุท ูƒุซูŠุฑ (ุงุฎุฑ ุญุจุฉ) 6- ุงุฏุนุงุก ุงู„ู…ุนุฑูุฉ (ูƒุซูŠุฑ ุนู†ุฏู‡ู… ูˆู‡ู… ุจุงู„ู…ุนุฑูุฉ) 7- ุฐูƒุฑ ุงู„ุณู„ุจูŠุงุช