Tweetovi

Blokirali ste korisnika/cu @Jacob_Wilkin

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Jacob_Wilkin

  1. proslijedio/la je Tweet
    Poništi
  2. proslijedio/la je Tweet

    Fun week ahead - speaking at event tomorrow in Manchester about creepy nexus of cybercrime, govt hacks and media, then on Wed it's at for talk on and border security with !

    Poništi
  3. proslijedio/la je Tweet

    People should really come along to this if they're in London on evening of Sep 25th. I'll be showing off facial recognition tech with and you REALLY need to see it....

    Poništi
  4. 2. ruj 2019.

    Just finished and coined on the amazing SEC660 course taught by , he really brought the material to life! Would recommend Tim & the course to anyone wanting to improve their infrastructure attacks and exploit dev skills.

    Poništi
  5. proslijedio/la je Tweet
    1. ruj 2019.

    Congratulations to the winners at . Thank you everyone for a great week. If you’ve never been to Copenhagen I highly recommend it! ⁦

    Poništi
  6. 8. kol 2019.

    Today I'll be talking at BlackHat about Phishing on Social Media, and releasing my new open source tool Social Attacker, the first automated multi-site phishing framework for social media.

    Poništi
  7. 6. kol 2019.

    Really excited to present our new OSINT tool AttackSurfaceMapper tomorrow with @Mr_AndreasGeo. Come by Black Hat Arsenal booth 6 tomorrow at 13:00 to learn about how you can expand your attack surface on engagements. Find hard actionable data such as subd…

    Poništi
  8. 23. srp 2019.

    The first episode of my new blog series 'Stories from the Shell', a look at some of the more interesting hacks of my penetration testing career! Username enumeration is a low risk issue right?

    Poništi
  9. 30. lip 2019.

    Just released an update for Social Mapper () upgrading it from Python2.7 to Python3. Also removed one of the social media sites, RIP Google Plus! Managed to make it before the deadline!

    Poništi
  10. proslijedio/la je Tweet
    21. lip 2019.

    Social Attacker is the first open-source, multi-site, automated social media phishing framework. It allows you to automate the phishing of users on a mass scale by handling the connecting & messaging of targets. leads a demo at Arsenal

    Poništi
  11. 19. lip 2019.

    Really excited to have been asked to speak at by . I'll be going over how you can set up Social Media Phishing campaigns and demoing Social Attacker; a brand new, free, open source tool to automate the entire process on multiple sites

    Poništi
  12. proslijedio/la je Tweet
    17. lip 2019.

    At will demo how new tools can automate social media intelligence gathering, correlating profiles across sites and scraping data at a mass scale. Businesses can use these tools to understand who's at risk for social media-based attacks

    Poništi
  13. proslijedio/la je Tweet
    26. svi 2019.

    Attack Surface Mapper aims to simplify the OSINT process by taking a target domain as input & then analyzing it using passive OSINT techniques and active reconnaissance methods – See a demo by & at Arsenal

    Poništi
  14. proslijedio/la je Tweet
    23. tra 2019.

    During the weekend I've released HostHunter, a 🔨 which discovers hostnames using OSINT techniques.

    Poništi
  15. 25. tra 2019.

    A new lightweight python3 tool for defenders to monitor for DNS Hijacking, designed by myself and . Set it up on your servers and get email notifications if your DNS is hijacked!

    Poništi
  16. 10. tra 2019.

    A Practical Introduction to Security Linting (Static Javascript Analysis), helping you identify DOM flaws such as XSS. Thanks to for initial inspiration!

    Poništi
  17. proslijedio/la je Tweet
    8. tra 2019.

    Thank you, and for the super interesting class at . Also perfect facilitating from ! Team „Management“ earned this Shiny!

    Poništi
  18. proslijedio/la je Tweet
    Poništi
  19. 20. ožu 2019.

    Check out my review of SANS's Advanced Web App Penetration Testing course(SEC642), Facilitating an event and the NetWars CTF:

    Poništi
  20. 18. ožu 2019.

    CVE-2018–19386 - Reflected XSS in SolarWinds Database Performance Analyzer.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·