HackExplorer

@Hack_Explorer

We explore the tools and techniques and concepts used in the cybersecurity world.

Vrijeme pridruživanja: travanj 2019.

Tweetovi

Blokirali ste korisnika/cu @Hack_Explorer

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Hack_Explorer

  1. 24. sij
    Poništi
  2. 28. pro 2019.

    Happy birthday to the father of Linux! 🐧♥️🎂5️⃣⭕ Most people know Linus Torvalds for creating kernel. But he has also created . Visit: Cyber Tips, Tools, Techniques

    Poništi
  3. proslijedio/la je Tweet
    26. pro 2019.
    Poništi
  4. 25. pro 2019.
    Poništi
  5. 25. pro 2019.

    Christmas tree packets are packets with the “Urgent” “Push” and “Fin” options set. Visit: for more Cyber Tips, Tools, Techniques

    Poništi
  6. 20. pro 2019.

    A Raspberry Pi has one hacking advantage over other computers, it is cheap to the point of being expendable. Visit: for more Cyber Tips, Tools, Techniques

    Poništi
  7. proslijedio/la je Tweet
    8. pro 2019.

    This is the latest that I did that shows the nine elements of the Digital Forensic Process 🔬💻. Feel free to share 🔁, I hope it will be useful 📖 CC mt:

    Poništi
  8. 16. pro 2019.
    Poništi
  9. 16. pro 2019.

    Fake Payroll Emails Used by Phishing Campaign to Deliver Emotet infection currently starts with a malicious macro in a Word document. Sent via 🖥 Visit:

    Poništi
  10. 5. pro 2019.

    Within , Often a key challenge is to identify the types of files on a system. One method of determining the files is to look for standard signatures or Visit: for more , Tools,

    Poništi
  11. 26. stu 2019.

    KALI 2019.4!! introduction of NetHunter Kex.Attach your Android device to an HDMI output along with keyboard and mouse and get a full, no compromise, Kali desktop. Visit: for more Cyber Tips, Tools, Techniques

    Poništi
  12. 24. stu 2019.

    Attackers are increasingly making use of tools already installed on targeted computers to conduct their attacks, known as Living off the land. Visit: for more Cyber Tips, Tools, Techniques

    Poništi
  13. 15. stu 2019.
    Poništi
  14. 13. stu 2019.

    TIP # 001: Windows Command-line Tools for Hacking ---NET USER: Manage Windows users from CMD. Visit: for more CyberSecurity Tips, Tools, Techniques...

    Poništi
  15. 11. stu 2019.

    The most essential mobile hacking toolkit for IT security Geeks / Experts. A must have on your 1)- Terminal emulator 2)-Kali on mobile 3) - Scan/ MITM 4) - Metasploit on mobole

    Poništi
  16. 10. stu 2019.

    The Red team view of the Cyber Kill Chain.

    Poništi
  17. proslijedio/la je Tweet
    8. stu 2019.

    Scattered thoughts for those new to web apps & bug bounties: 1) lists ~150 vulnerability types that you can submit for. I've quickly compiled those here: . See a vuln you don't recognize? Research it and try to find it on a public program.

    Prikaži ovu nit
    Poništi
  18. 4. stu 2019.

    The first attacks are going around !!!. Here's how you can protect yourself.

    Poništi
  19. 29. lis 2019.

    Learn how to use API's in IT security Projects, here we will be using the Virustotal API with Google sheets. Watch here:

    Poništi
  20. 13. lis 2019.
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·