I’ve officially completed the @CiscoNetAcad Ethical Hacker course and earned the certificate 🎉
It built a solid foundation in ethical hacking and offensive security.
Excited to keep learning and growing in cybersecurity.
#CyberSecurity#EthicalHacking#Cisco
Day 57: Post-Exploitation, Persistence & Evasion
Today’s focus in my ethical hacking journey was on what happens after gaining access to a system: staying in, moving around, and avoiding detection. 🧵
#EthicalHacking#RedTeam
Day 56: Penetration Testing Tools & Exploit Code Analysis. ✍️
Today, I focused on understanding when, why, and how different tools are used across four major categories of a penetration test.
#Cybersecurity#LearningInPublic
Day 55: Understanding Scripting Logic in Cybersecurity.
Today was all about the fundamentals of scripting and how they tie directly into cybersecurity tasks like automation, analysis, and tool building. 🧵
#CyberSecurity#BlueDotLogs#Day55
Day 53–54 of My Cybersecurity Journey: From Vulnerability Discovery to Strategic Remediation
During a pentest on a vulnerable DVWA server (10.6.6.13), I shifted focus from just scanning to what separates beginners from professionals:
Let’s break it down. 👇🧵
Day 52 of My Cybersecurity Journey – The Power of Reporting:
Let’s talk about something that separates script kiddies from professionals.
How we report findings after a penetration test.
It’s not just what you find - it’s how you communicate it.🧵👇
#CyberSecurityJourney
Day 50 – 51 of My Cybersecurity Journey: Post-Exploitation, Persistence & Lateral Movement.
Happy New Month, everyone! 🫂
Initial access is the start. The real challenge begins with maintaining control, moving across systems, and avoiding detection.
Let’s break it down. 🧵👇
Day 49 of My Cybersecurity Journey: Post-Exploitation, Footholds & Persistence
After gaining access to a system, what comes next?
Today, I explored how attackers maintain access after a successful compromise. Here's what I learned:
👇🧵
#CyberSecurity#EthicalHacking#InfoSec
Day 46: Cont'd – Cloud, Mobile & IoT Security.
Today’s deep dive into offensive cloud security techniques was packed. Here's what I explored, practiced, and documented 👇🧵
#CyberSecurity#CloudSecurity#EthicalHacking
Day 44: Exploiting Security Misconfigurations
Today I tackled a common but dangerous topic in cybersecurity: Security Misconfigurations.
These are setup mistakes that leave web apps vulnerable.
Here’s what I learned 🧵👇
#CyberSecurity#WebAppSecurity
Day 43: CSRF, SSRF & Clickjacking Attacks
Security is often broken not by what users do, but by what their browsers or servers are tricked into doing.
Today’s deep dive covered 3 trust-based web attacks 👇🧵
#CyberSecurity#WebSecurity#CSRF#SSRF#Clickjacking
Day 42: Practicing Reflected & Stored XSS on DVWA
Today I got hands-on with one of the most overlooked but powerful web attack vectors: Cross-Site Scripting (XSS).
This lab wasn’t theory. It was full-on testing at multiple security levels.
🧵👇
In August 2024, I committed to learning cybersecurity the right way.
By March 2025, I completed the Google Cybersecurity Certification.
A journey marked by consistency, discipline, and deep learning from network security to incident response.
#Cybersecurity#GoogleCertificate
Day 41: Cross-Site Scripting (XSS)
XSS remains one of the most dangerous and underestimated injection attacks in web security. Here's a deep dive into how it works, modern evasion techniques, and how to stop it.
🧵
#CyberSecurity#xss#LearningInPublic
Day 40: Unpacking Authorization-Based Vulnerabilities
🔵Parameter Pollution & IDOR Exploitation
Authorization isn’t just about access, it’s about boundaries. Today’s deep dive showed just how easily these boundaries can be crossed when systems trust too much.
🧵👇
Day 39 – Inside the Mind of an Attacker: Cracking Passwords, Hijacking Sessions & Hardening Authentication
Authentication flaws aren’t theoretical—they’re everyday exploits.
Here’s what I learned today by thinking like the attacker.
👇
#CyberSecurity#LearningInPublic
Day 38: Business Logic Flaws & Injection Vulnerabilities - The Silent Killers of App Security.
In today’s threat landscape, these aren't just bugs, they’re backdoors waiting to be exploited.
Let’s break it down. 👇
#AppSec#CyberSecurity#OWASP
Day 36–37 of My Cybersecurity Journey with Cisco Networking Academy 🧵
🔵Topic: Web App Attacks & the OWASP Top 10
After a much-needed break to reset and recharge, I’m back digging deep into web app security. Let’s go! 👇
#Cybersecurity#EthicalHacking#Nikto#LearningInPublic
12 Followers 384 FollowingIf any of my bae head big and cum dry add I go broke ahm check water dey inside
Because no time for bae why are like this again
183K Followers 143 FollowingA decentralized social communication tool. Absolute privacy and security.
No centralized data backup. No personal info leaks.
https://t.co/FW6sEgomYV
44K Followers 111 FollowingYou may say I'm a dreamer, but I'm not the only one. I hope someday you'll join us. And the world will live as one. -John Lennon
134K Followers 19 FollowingBattle of AI Agent introduces an innovative platform where artificial intelligence meets competitive debate. Powered by @0G_Labs.
163K Followers 55 FollowingThe first NFT collection made for 0G, the largest DeAI L1 ecosystem. OG collection powered by @0G_Labs. 1,888 NFTs ready to defy gravity!
995K Followers 268 FollowingBringing the real world onchain. Backed by @BHDigitalAssets, @HaunVentures, @galaxyhq, @yzilabs, and others. Account managed by @plumefndn.
531K Followers 109 FollowingCollaborative intelligence of AI Agent & Model Network co-created and co-owned by everyone. A full-stack AI connecting users, agents, models, data, & GPUs.
86K Followers 104 FollowingYour favorite Monanimal on @monad
Community-powered collection, created with the blessing of the original Molandak creator.
(REDACTED) is coming 👀
91K Followers 141 FollowingA next-gen hybrid crypto exchange, we make crypto trading easy & secure through self-custody. Your crypto, your control 🛡️
Join $MONY presale 👇
99K Followers 22 FollowingFirst and largest Native DEX and Aggregator backed by @Storyprotocol. Swap to win exclusive IP Alpha Rewards. Join our community: https://t.co/eNNxMJC04T.
505K Followers 1K FollowingProtect Your Every Transaction.
User App: https://t.co/FHHKZyzH1j 🛡️
Dev Integration: Security Intelligence & SafeToken Protocol 🛡️
133K Followers 7 FollowingThe HY Foundation is a dedicated entity established in the Cayman Islands, tasked with managing HYTOPIA’s new ecosystem token— $HYBUX.
41K Followers 1 FollowingIt all started with @zerion. Now we're building a L2 network to make onchain more enjoyable & rewarding w/ zero gas fees. Not intended for UK residents.
61K Followers 92 FollowingEngineering Digital Infrastructure for Global Transformation!
The World's First Permissioned Cross-Chain Ecosystem, Regulated By Design
35K Followers 555 Followingdumb memecoin built by @0xhoneyjar the biggest cult org in the @berachain ecosystem. crypto is hard, henlo is easy 💸🐼 https://t.co/s6G3X8GasQ
107K Followers 455 Following▪️ Marketing Advisor and Threadoor
▪️ Decoding The Tokens of Tomorrow
▪️ Exclusive Alpha in Discord https://t.co/QoCcs5n7PJ
148K Followers 736 FollowingGod's Son || Pure Alpha || Content writer & Marketing Strategist || Space-Host🎙️|| My tweets are Alpha || 6yrs+ in crypto.
I miss my mum🕯
TG: @princejba1
153K Followers 2K FollowingCrypto since 16, Marketing Consultant | Helping Web 3 projects grow | Airdrop Maxi | Started from $0 Not afraid to try new things | Trying to build for Millions