Zero Day Snoop (@zerodaysnoop) 's Twitter Profile
Zero Day Snoop

@zerodaysnoop

Info about tools & resources to help identify vulnerabilities in systems before hackers do #cybersecurity #ethicalhacking #hackers #infosec #malware #pentesting

ID: 1254791423146237954

linkhttps://www.ZeroDaySnoop.com calendar_today27-04-2020 15:16:16

99 Tweet

29 Followers

0 Following

Zero Day Snoop (@zerodaysnoop) 's Twitter Profile Photo

arping – a Network Scanning Tool: arping is used to check if an IP Address is used on a network. If the IP Address is used then the associated MAC Address is returned. #pentesting #PenetrationTesting #CyberSecurity #EthicalHacking #Hacking #Networks zerodaysnoop.com/tools/apps-pac…

arping – a Network Scanning Tool:

arping is used to check if an IP Address is used on a network. If the IP Address is used then the associated MAC Address is returned.

#pentesting #PenetrationTesting #CyberSecurity #EthicalHacking #Hacking #Networks

zerodaysnoop.com/tools/apps-pac…
Zero Day Snoop (@zerodaysnoop) 's Twitter Profile Photo

DMitry – Deepmagic Information Gathering Tool: An information gathering tool that is used to collect possible data such as subdomains, email addresses, uptime info, TCP port scan, whois lookups and more. #Pentesting #EthicalHacking #CyberSecurity zerodaysnoop.com/tools/apps-pac…

DMitry – Deepmagic Information Gathering Tool:

An information gathering tool that is used to collect possible data such as subdomains, email addresses, uptime info, TCP port scan, whois lookups and more.

#Pentesting #EthicalHacking #CyberSecurity

zerodaysnoop.com/tools/apps-pac…
Zero Day Snoop (@zerodaysnoop) 's Twitter Profile Photo

ike-scan – Internet Key Exchange host scanner: ike-scan is a scanner tool for discovering IKE hosts and also fingerprinting them using the retransmission backoff pattern. #PenetrationTesting #Pentesting #CyberSecurity #EthicalHacking #WhiteHatHacking zerodaysnoop.com/tools/apps-pac…

ike-scan – Internet Key Exchange host scanner:

ike-scan is a scanner tool for discovering IKE hosts and also fingerprinting them using the retransmission backoff pattern.

#PenetrationTesting #Pentesting #CyberSecurity #EthicalHacking #WhiteHatHacking

zerodaysnoop.com/tools/apps-pac…
Zero Day Snoop (@zerodaysnoop) 's Twitter Profile Photo

Kismet – Wireless Sniffer & Monitor (part 1): A 2-part article examining #Kismet which is a #WirelessSniffer & Monitor. This tool can be used to detect wireless networks and devices. #Pentesting #PenetrationTesting #EthicalHacking #CyberSecurity zerodaysnoop.com/tools/apps-pac…

Kismet – Wireless Sniffer & Monitor (part 1):

A 2-part article examining #Kismet which is a #WirelessSniffer & Monitor. This tool can be used to detect wireless networks and devices.

#Pentesting #PenetrationTesting #EthicalHacking #CyberSecurity

zerodaysnoop.com/tools/apps-pac…
Zero Day Snoop (@zerodaysnoop) 's Twitter Profile Photo

Kismet – Wireless Sniffer & Monitor (part 2): Part 2 of an article examining #Kismet which is a #WirelessSniffer & Monitor. We look at the remaining screens & features of the tool. #Pentesting #PenetrationTesting #EthicalHacking #CyberSecurity zerodaysnoop.com/tools/apps-pac…

Kismet – Wireless Sniffer & Monitor (part 2):

Part 2 of an article examining #Kismet which is a #WirelessSniffer & Monitor. We look at the remaining screens & features of the tool.

#Pentesting #PenetrationTesting #EthicalHacking #CyberSecurity 

zerodaysnoop.com/tools/apps-pac…
Zero Day Snoop (@zerodaysnoop) 's Twitter Profile Photo

legion – Network Penetration Testing Framework: Examinating #Legion which is a #Network #PenetrationTesting Framework. This tool performs automatic #reconnaissance & #scanning plus detection of CPEs & CVEs. #Pentesting #EthicalHacking #CyberSecurity zerodaysnoop.com/tools/apps-pac…

legion – Network Penetration Testing Framework:

Examinating #Legion which is a #Network #PenetrationTesting Framework. This tool performs automatic #reconnaissance & #scanning plus detection of CPEs & CVEs.

#Pentesting #EthicalHacking #CyberSecurity 

zerodaysnoop.com/tools/apps-pac…
Zero Day Snoop (@zerodaysnoop) 's Twitter Profile Photo

Netdiscover – Network Address Discovering Tool: We examine #Netdiscover which is a #network address discovering tool. It works on both wired & wireless networks and uses ARP requests to detect devices. #Pentesting #PenetrationTesting #EthicalHacking zerodaysnoop.com/tools/apps-pac…

Netdiscover – Network Address Discovering Tool:

We examine #Netdiscover which is a #network address discovering tool. It works on both wired & wireless networks and uses ARP requests to detect devices.

#Pentesting #PenetrationTesting #EthicalHacking 

zerodaysnoop.com/tools/apps-pac…
Zero Day Snoop (@zerodaysnoop) 's Twitter Profile Photo

Nmap – Network Mapper: #Nmap is a #NetworkMapper used to determine hosts on a network together with info such as the #OperatingSystem running, #firewalls in use, available services & more. #Pentesting #PenetrationTesting #EthicalHacking #CyberSecurity zerodaysnoop.com/tools/apps-pac…

Nmap – Network Mapper:

#Nmap is a #NetworkMapper used to determine hosts on a network together with info such as the #OperatingSystem running, #firewalls in use, available services & more.

#Pentesting #PenetrationTesting #EthicalHacking #CyberSecurity 

zerodaysnoop.com/tools/apps-pac…
Zero Day Snoop (@zerodaysnoop) 's Twitter Profile Photo

recon-ng – Web Reconnaissance Framework (part 1): We examine recon-ng which is an intelligence gathering tool aimed at reducing time spent harvesting information. #CyberSecurity #EthicalHacking #Pentesting #PenetrationTesting zerodaysnoop.com/tools/apps-pac…

recon-ng – Web Reconnaissance Framework (part 1):

We examine recon-ng which is an intelligence gathering tool aimed at reducing time spent harvesting information.

#CyberSecurity #EthicalHacking #Pentesting #PenetrationTesting

zerodaysnoop.com/tools/apps-pac…
Zero Day Snoop (@zerodaysnoop) 's Twitter Profile Photo

recon-ng – Web Reconnaissance Framework (part 2): Look more at the Web Reconnaissance Framework known as recon-ng. We continue with examples of its usage as an intelligence gathering tool. #CyberSecurity #EthicalHacking #Pentesting #PenetrationTesting zerodaysnoop.com/tools/apps-pac…

recon-ng – Web Reconnaissance Framework (part 2):

Look more at the Web Reconnaissance Framework known as recon-ng. We continue with examples of its usage as an intelligence gathering tool.

#CyberSecurity #EthicalHacking #Pentesting #PenetrationTesting

zerodaysnoop.com/tools/apps-pac…
Zero Day Snoop (@zerodaysnoop) 's Twitter Profile Photo

theHarvester – Open Source Intelligence: How #theHarvester can be used to carry out #OSINT (Open Source INTelligence) in order to gather emails, names, subdomains, IP addresses and URLs. #CyberSecurity #Pentesting #PenetrationTesting #EthicalHacking zerodaysnoop.com/tools/apps-pac…

theHarvester – Open Source Intelligence:

How #theHarvester can be used to carry out #OSINT (Open Source INTelligence) in order to gather emails, names, subdomains, IP addresses and URLs.

#CyberSecurity #Pentesting #PenetrationTesting #EthicalHacking 

zerodaysnoop.com/tools/apps-pac…
Zero Day Snoop (@zerodaysnoop) 's Twitter Profile Photo

Wireshark – Network Packet Analyzer: #Wireshark is a graphical network packet analyzer. It is available on many platforms, supports multiple protocols, and can be used to capture live data that can be analyzed offline. #CyberSecurity #Pentesting zerodaysnoop.com/tools/apps-pac…

Wireshark – Network Packet Analyzer:

#Wireshark is a graphical network packet analyzer. It is available on many platforms, supports multiple protocols, and can be used to capture live data that can be analyzed offline.

#CyberSecurity #Pentesting

zerodaysnoop.com/tools/apps-pac…
Zero Day Snoop (@zerodaysnoop) 's Twitter Profile Photo

Bitcoin – is Digital Gold secure? To some #Bitcoin is risky, dangerous & used by #CyberCrime. To others it is secure, a great investment & hedge against inflation. We examine how Bitcoin works & its security. #Crypto #cryptocurrencies #cryptocurrency zerodaysnoop.com/crypto/bitcoin…

Bitcoin – is Digital Gold secure?

To some #Bitcoin is risky, dangerous & used by #CyberCrime. To others it is secure, a great investment & hedge against inflation. We examine how Bitcoin works & its security.

#Crypto #cryptocurrencies #cryptocurrency 

zerodaysnoop.com/crypto/bitcoin…
Zero Day Snoop (@zerodaysnoop) 's Twitter Profile Photo

#Ethereum – a secure Global Computer? The 2nd biggest #cryptocurrency that forms the basis of many other #AltCoins. With smart contract functionality, #dApps such as #DeFi, #DAOs & #NFTs are possible but how secure are they? #crypto #cryptocurrencies zerodaysnoop.com/crypto/ethereu…

#Ethereum – a secure Global Computer?

The 2nd biggest #cryptocurrency that forms the basis of many other #AltCoins. With smart contract functionality, #dApps such as #DeFi, #DAOs & #NFTs are possible but how secure are they?

#crypto #cryptocurrencies 

zerodaysnoop.com/crypto/ethereu…
Zero Day Snoop (@zerodaysnoop) 's Twitter Profile Photo

#Binance Smart Chain – is #BSC a secure platform? Looking at the #BinanceSmartChain #blockchain to see how it integrates with #BinanceChain & supports the development of #dApps plus security considerations. #crypto #cryptocurrencies #cryptocurrency zerodaysnoop.com/crypto/binance…

#Binance Smart Chain – is #BSC a secure platform?

Looking at the #BinanceSmartChain #blockchain to see how it integrates with #BinanceChain & supports the development of #dApps plus security considerations.

#crypto #cryptocurrencies #cryptocurrency

zerodaysnoop.com/crypto/binance…
Zero Day Snoop (@zerodaysnoop) 's Twitter Profile Photo

Stablecoins – are these #cryptocurrencies risky? #Stablecoins are #cryptocurrency tokens pegged to traditional assets such as the US Dollar. Examples are explained together with their uses covered & associated security considerations. #crypto #cryptos zerodaysnoop.com/crypto/stablec…

Stablecoins – are these #cryptocurrencies risky?

#Stablecoins are #cryptocurrency tokens pegged to traditional assets such as the US Dollar. Examples are explained together with their uses covered & associated security considerations.

#crypto #cryptos 

zerodaysnoop.com/crypto/stablec…
Zero Day Snoop (@zerodaysnoop) 's Twitter Profile Photo

Recovering Lost or Stolen #Crypto (part 1): We hear about how secure #cryptocurrency is and that it is anonymous & untraceable. We examine what are the risks of holding #cryptocurrencies and the chances of recovering it if lost or stolen. zerodaysnoop.com/crypto/recover…

Recovering Lost or Stolen #Crypto (part 1):

We hear about how secure #cryptocurrency is and that it is anonymous & untraceable. We examine what are the risks of holding #cryptocurrencies and the chances of recovering it if lost or stolen.

zerodaysnoop.com/crypto/recover…
Zero Day Snoop (@zerodaysnoop) 's Twitter Profile Photo

Recovering Lost or Stolen #Crypto (part 2): We continue to examine the risks of holding #cryptocurrencies with a focus on the chances and ways of recovering your #cryptocurrency assets if they are lost or stolen. zerodaysnoop.com/crypto/recover…

Recovering Lost or Stolen #Crypto (part 2):

We continue to examine the risks of holding #cryptocurrencies with a focus on the chances and ways of recovering your #cryptocurrency assets if they are lost or stolen.

zerodaysnoop.com/crypto/recover…
Zero Day Snoop (@zerodaysnoop) 's Twitter Profile Photo

Eth2 – making Ethereum more secure: The #Ethereum #blockchain is about to undergo a major upgrade to version 2.0. Here we look at what improvements are coming including how #Eth2 impacts security. #crypto #cryptos #cryptocurrency #cryptocurrencies zerodaysnoop.com/crypto/eth2-ma…

Eth2 – making Ethereum more secure:

The #Ethereum #blockchain is about to undergo a major upgrade to version 2.0. Here we look at what improvements are coming including how #Eth2 impacts security.

#crypto #cryptos #cryptocurrency #cryptocurrencies

zerodaysnoop.com/crypto/eth2-ma…
Zero Day Snoop (@zerodaysnoop) 's Twitter Profile Photo

Solana – does Proof-of-History improve security? #Solana offers a faster & cheaper #blockchain solution to #Ethereum by using Proof-of-History & Proof-of-Stake consensus. We look at any security implications. #crypto #cryptocurrency #cryptocurrencies zerodaysnoop.com/articles/solan…

Solana – does Proof-of-History improve security?

#Solana offers a faster & cheaper #blockchain solution to #Ethereum by using Proof-of-History & Proof-of-Stake consensus. We look at any security implications.

#crypto #cryptocurrency #cryptocurrencies 

zerodaysnoop.com/articles/solan…