Tweetovi
- Tweetovi, trenutna stranica.
- Tweetovi i odgovori
- Medijski sadržaj
Blokirali ste korisnika/cu @Hack_Explorer
Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Hack_Explorer
-
Using Memory forensics in security investigations. Watch here: http://bit.ly/hxpvolatality
#Volatality#Memoryforensics#malwareanalysis#cridex#cybersecurity#security#digitalforesicspic.twitter.com/AmnumRwOY1
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Happy birthday to the father of Linux!




Most people know Linus Torvalds for creating #Linux kernel. But he has also created#Git. Visit: http://bit.ly/2qKbKha Cyber Tips, Tools, Techniques#Git#LinusTorvalds#cybersecurity#opensource#infosec#Infographicpic.twitter.com/8Gji0DBYMW
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
HackExplorer proslijedio/la je TweetHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
EMOTET - Interactive Malware Analysis with http://any.run https://youtu.be/YLnBPNenH9k
@anyrun_app Thankyou for this awsome tool#anyrun#Emotet#malwareanalysis#phishing#CyberAttack#infosec#CyberSecuritypic.twitter.com/AZ1R0hYnV6
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Christmas tree packets are packets with the “Urgent” “Push” and “Fin” options set. Visit: http://bit.ly/2qKbKha for more Cyber Tips, Tools, Techniques
#CyberSecurity#Xmasscan#Namp#DOs#Ddos#christmas#xmastree#christmastree#DDoS#Attack#networkingpic.twitter.com/N2uP0qXTg0
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
A Raspberry Pi has one hacking advantage over other computers, it is cheap to the point of being expendable. Visit: http://bit.ly/2qKbKha for more Cyber Tips, Tools, Techniques
#Raspberrypi#CyberSecurity#hacking#MrRobot#informationsecuritypic.twitter.com/mHIlnGTQfX
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
HackExplorer proslijedio/la je Tweet
This is the latest
#infographic that I did that shows the nine elements of the Digital Forensic Process
. Feel free to share
, I hope it will be useful
#CyberSecurity#infosec#IoT#tech#ITsecurity CC@mikequindazzi#BigData#MachineLearning#AI#IoT#infographics mt:pic.twitter.com/Wmbrbikb9G
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Top malware families analyzed last week: Thankyou
@maldatabase
#Emotet
#TrickBot
#Ursnif
#njRAT
#AZORult
#HawkEye
#LokiBot
#NanoCore
#DanaBot
#AgentTesla#Malware#ThreatIntelligence#threatintel#infosec#cybersecurityHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Fake Payroll Emails Used by Phishing Campaign to Deliver
#TrickBot#EMOTET Emotet infection currently starts with a malicious macro in a Word document. Sent via#phishing#emails
Visit: http://bit.ly/2qKbKha
#CyberSecurity#infosec#Malwarepic.twitter.com/Dm87DYbVIO
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Within
#digitalforensics, Often a key challenge is to identify the types of files on a system. One method of determining the files is to look for standard signatures or#Magicbytes Visit: http://bit.ly/2qKbKha for more#CyberTips, Tools,#Techniques#CyberSecurity#forensicspic.twitter.com/XoumkouTL7
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
KALI 2019.4!! introduction of NetHunter Kex.Attach your Android device to an HDMI output along with keyboard and mouse and get a full, no compromise, Kali desktop. Visit: http://bit.ly/2qKbKha for more Cyber Tips, Tools, Techniques
#kali#kex#nethunter#androidpic.twitter.com/yAQY3Uu4lH
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Attackers are increasingly making use of tools already installed on targeted computers to conduct their attacks, known as Living off the land. Visit: http://bit.ly/2qKbKha for more Cyber Tips, Tools, Techniques
#CyberSecurity#Hacking#Tools#CMD#powershell#Net#LOTLpic.twitter.com/ohBv0gGAts
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
A worthy service from
@haveibeenpwned. Thank you.#CyberSecurity#DataBreach#Owned#Hacked#Email#passwordleakpic.twitter.com/wXZNIhOS9N
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
TIP # 001:
#Best Windows Command-line Tools for Hacking ---NET USER: Manage Windows users from CMD. Visit: http://bit.ly/2qKbKha for more CyberSecurity Tips, Tools, Techniques...#CyberSecurity#Hacking#Windows#CMDpic.twitter.com/HN2AvP7Hfz
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
The most essential mobile hacking toolkit for IT security Geeks / Experts. A must have on your
#Rooted#Android 1)#Turmux- Terminal emulator 2)#NetHunter-Kali on mobile 3)#Zanti - Scan/ MITM 4)#Csploit - Metasploit on mobole#CyberSecurity#HackLearning#Hacking#ITSecuritypic.twitter.com/jYnaMghc0j
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
The Red team view of the Cyber Kill Chain.
#CyberSecurity#RedTeam#Killchain#Infosecpic.twitter.com/9eGNafR7gu
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
HackExplorer proslijedio/la je Tweet
Scattered thoughts for those new to web apps & bug bounties: 1)
@Hacker0x01 lists ~150 vulnerability types that you can submit for. I've quickly compiled those here: https://pastebin.com/qmtyiaXp . See a vuln you don't recognize? Research it and try to find it on a public program.Prikaži ovu nitHvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
The first
#BlueKeep attacks are going around#NOW!!!. Here's how you can protect yourself.#Ransomware#Cryptojacking#Cyberattack#Malware#worm#vulnerability#RDPpic.twitter.com/W6MD2riyME
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
Learn how to use API's in IT security Projects, here we will be using the Virustotal API with Google sheets. Watch here: https://youtu.be/VjYhi9BHhfY
#cybersecurity#beginner#api#securitytools#ITsecuritypic.twitter.com/AbpYwiol71
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi -
It's time for Hack in the Box - Cyber Week UAE
#hackexplorer#HITBCyberWeek#infosec#CyberSecurityAwarenessMonthpic.twitter.com/g9UnLETj0j
Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.
