Time for another giveaway!
We are going to send a t-shirt and a few goodies to one person who follows @PentesterLab and retweets this tweet!!
And we are going to give a 12-month voucher to someone who follows @PentesterLab and likes this tweet!!
Took a long time but managed to put up all of my notes I created for the OSCP Exam: github.com/bittentech/osc…
These aren't really the lab notes, this is a curated gist of everything I learnt throughout the journey of preparation and didn't want to lose.
#oscp#infosec
I want to keep track of the latest cybersecurity news.
I also don't want to rely solely on Twitter.
Here are 5 great cybersecurity news outlets that I rely on daily! 👇
Bug Bounty Hint
How to test for SQL injection
1) Select params for testing in:
🔹 URL query
🔹 POST body
🔹 Headers
🔹 Cookies
It can be any parameter. Typically, I test integer parameters first.
🧵 1/8
GPT-4 is Spectacular.
But you can't miss out these 5 AI tools:
1. AI Meeting Summarizer
tldv.io
3. AI code debugger
debugcode.ai
2. AI resume builder
resumaker.ai
3. AI images
stockimg.ai
5. AI assistent…
YouTube has more than 38,000,000 channels.
Most are weird vlogs, TV show montages, music videos, and memes.
But if you’re interested in cybersecurity, these 7 channels will teach you more than a 4-year college degree:
ChatGPT is amazing.
But don't skip these AI tools.
1. Remove watermarks:
watermarkremover.io
2. Voice generation with AI:
you.com
3. Photo editing with AI:
clipdrop.co
4. Call summaries:
tldv.io
Here is a list of 100 tools that an ethical hacker should know about:
Nmap
Metasploit Framework
Wireshark
John the Ripper
Aircrack-ng
Hydra
Burp Suite
SQLMap
Nessus
Nikto
Cain and Abel
THC Hydra
THC SSL DoS
Maltego
Netcat
OpenVAS
Social Engineering Toolkit (SET)…
8 pieces of free software for cybersecurity enthusiasts:
1. Training: Hack The Box
2. Curated News: Feedly
3. Web Hacking: Burp Suite
4. Data Modification: Cyber Chef
5. Port Scan: Nmap
6. Operating System: Kali Linux
7. Debugging: Ghidra
8. Email Security: DeHashed
21K Followers 9K FollowingThe wildest cybersecurity stories you can imagine, told by experts & hackers. Lock your door, wipe your drive, and listen to a history you never knew existed.
814 Followers 2K FollowingPenssei e resolvi continuar já que o governos mundias não faz nós faremos, vamos fazer com ideias livres garantir que os humanos não será extintos aguardem
192K Followers 416 FollowingSANS is the most trusted and by far the largest source for information & cyber security training, certification and research in the world.
183K Followers 144 FollowingA high-level Python Web framework that encourages rapid development and clean, pragmatic design. Tweets by Django Software Foundation
48K Followers 2K FollowingSpecializing in pen testing, red teaming, and Active SOC. We share our knowledge through blogs, webcasts, open-source tools, and Backdoors & Breaches game.
4K Followers 4K FollowingElevating businesses with enriched digital experiences through unparalleled #productdevelopment, #dataengineering, #machinelearning, #AI, and more.
232K Followers 537 FollowingI help businesses build MVP, Web, Mobile apps with mix of AI and Code.
Founder https://t.co/FHMNUJ2QLs, https://t.co/NQpyDeCOD2, https://t.co/rADKQliPyq 🚀
286K Followers 72 FollowingPart of @CISAgov, we respond to major incidents, analyze threats, and exchange critical cybersecurity information with partners around the world.
242K Followers 869 FollowingThe only magazine dedicated to the strategy and technology of information security, delivering critical business and technical information for IT professionals.
2K Followers 4 FollowingNumber one vulnerability management and threat intelligence platform. Explaining vulnerabilities and exploits since 1970. 🐘 https://t.co/9XHyl1R64r
5K Followers 75 FollowingWe Serve Best Tips for Bug Bounty from Across the Social Platforms and servers Best For you.
Join Us : https://t.co/AiSAngZGTE
3K Followers 3K FollowingBug Bounty Hunter.
The https://t.co/11fvDW8SRb is a free, open and unlimited dns query tool. It makes easy to query subdomains or sites of the same.
56K Followers 3 FollowingOfficial account maintained by the CVE™ Program to notify the community of new CVE IDs. Posts contain abbreviated details. Full CVE Records on https://t.co/ALn4YvUtom
35 Followers 0 FollowingGovernment Engineering College(GEC), Jamui is a government engineering college in Jamui district of Bihar. It was established in the year 2018 under Department
65K Followers 2 FollowingThis is an unofficial HackerOne public disclosure watcher who keeps you up to date about the recently disclosed bugs. By @NOBBD
224K Followers 6K FollowingFounder @Binary_Defense @TrustedSec Co-Owner https://t.co/HQC75WhdJh. @WeHackHealth Pod. God + Family/Hacker/CSO/USMC/Intel/Fitness. Make the world a better place.
241K Followers 202 FollowingBreaking cybersecurity and technology news, guides, and tutorials that help you get the most from your computer. DMs are open, so send us those tips!
145K Followers 215 FollowingWe are the Microsoft Security Response Center. To report security vulnerabilities or abuse in Microsoft products, visit https://t.co/kxEbdfMny1.
349K Followers 325 FollowingWe are prioritizing security above all else through our Secure Future Initiative (SFI). Explore SFI principles, pillars, and progress here ⬇️
524K Followers 18 FollowingFollow us to join conversations on how to #NavigateYourNext! We help clients navigate transformation with #AI powered core, #AgileDigital & lifelong #Learning
No recent Favorites. New Favorites will appear here.