30 cybersecurity search engines for researchers:
1. Dehashed—View leaked credentials.
2. SecurityTrails—Extensive DNS data.
3. DorkSearch—Really fast Google dorking.
4. ExploitDB—Archive of various exploits.
5. ZoomEye—Gather information about targets.
VIRTUAL LANs
• Virtual LAN (VLAN) is a concept in which we can divide the devices logically on layer 2 (data link layer)
• Creating the appearance and functionality of network traffic, that is physically on a single network but acts as if it is split be…lnkd.in/dJZBwkUP
COLLISION DOMAIN
• Scenario in which when a device sends out a message to the network, all other devices which are included in its collision domain have to pay attention to it , no matter if it was destined for them or not
• The part of a network where…lnkd.in/d_-BwATK
ADDRESS RESOLUTION PROTOCOL
• ARP finds the hardware address, also known as Media Access Control (MAC) address, of a host from its known IP address
• Each IP node (Host, Router) on LAN has ARP table
• It is used when IP Protocol is used over Ethernet…lnkd.in/dwBcGwVz
MAC Addresses
• Media Access Control
• In order to communicate or transfer the data from one computer to another computer we need MAC address
• MAC addresses are unique 48-bits hardware number, embedded into network card (known as Network Interface Car…lnkd.in/dh-DvYek
ALOHA
• Earliest random access method, designed for a radio(wireless) LAN, but it can be used on any shared medium
• The idea is that each station sends a frame whenever it has a frame to send
• Relies on acknowledgements from the receiver
• If the ac…lnkd.in/dtP7fim3
CARRIER SENSE MULTIPLE ACCESS/ COLLISION DETECTION (CSMA/CD)
• Used in early ethernet technology/LANs, when there used to be shared channel (Bus topology)
• Problem arises when more than one station transmits the data at the moment, results in collision…lnkd.in/dJQeitsm
1K Followers 2K FollowingDevoted Security Researcher specializing in analyzing and Identifying web vulnerabilities.
Threat hunter | CTI | OSINT
Try to make a safer World.
3K Followers 25 FollowingWe offers Cyber Security Training 📚✏, Penetration Testing, and Bug Bounty Tips💰 to protect businesses and individuals from cyber attacks.
Feel Free to Ask.
22K Followers 0 FollowingAI-Powered Penetration Testing Assistant for offensive security testing, focused on web applications and network penetration testing.
65K Followers 2 FollowingThis is an unofficial HackerOne public disclosure watcher who keeps you up to date about the recently disclosed bugs. By @NOBBD
56K Followers 3 FollowingOfficial account maintained by the CVE™ Program to notify the community of new CVE IDs. Posts contain abbreviated details. Full CVE Records on https://t.co/ALn4YvUtom
8K Followers 206 Following#1 Hacker at BugCon LHE Mexico 2021 & 2022 | Top Ranked in H1 Mexico Leaderboard 2021, 2022, 2023, 2024 | Offensive Security Engineer | Tweets are my own
4K Followers 63 FollowingOfficial account of WSTG, the most comprehensive open source guide for testing web apps and services since 2004. That's right, I was around before Twitter.
128 Followers 588 Following🚀 Elevating digital safety with IARM. We turn complex threats into secure solutions. Join us on the journey to a safer cyber world. #InfoSec #CyberSecurity
37 Followers 149 FollowingHolistic Security for Cloud-Native Apps and API's
Observe and secure your Software Supply Chain with DevSecOps CI CD Pipeline
16K Followers 781 Following🔍 Top 100 Bug Bounty Hunter @ Bugcrowd | 🇩🇴 Dominican | Ethical hacking fanatic | 🎮🎵 Lover | Keeping the digital world safe. opinions are that of my own
12K Followers 35 FollowingHacksplained is an intro to hacking by @PascalSec
📺 https://t.co/pVsQptuz2d
💖 https://t.co/uQl641e6Li
🥨 https://t.co/qh5mPse7N5
7K Followers 2K FollowingGlobal leader in hands-on learning for enterprise and cloud security education. Join 40000+ infosec professionals from 130+ countries
37K Followers 125 FollowingDetect real, exploitable vulnerabilities. Harness the power of Nuclei for fast and accurate findings without false positives.
6K Followers 389 FollowingSemi-Consciously simplifying bug bounties for myself and others | Slaying Bugs Full Time with My Nichirin Sword (aka Burp) since Aug 2023 | INFJ
146K Followers 32 FollowingMakers of Devin, the first AI software engineer. We are an applied AI lab building end-to-end software agents. Join us: https://t.co/JZDd4Vik4P
2K Followers 272 FollowingSenior Security Tester | Former Content Creator and Community Manager for @RealTryHackMe | OSCE³, OSCP, CRTO,OSWP
~~
Opinions are my own
349K Followers 325 FollowingWe are prioritizing security above all else through our Secure Future Initiative (SFI). Explore SFI principles, pillars, and progress here ⬇️