@blackfprints Profile picture

Black Fingerprints

@blackfprints

#OSINT #Security #Forensic #Training Trying to help people to have a more secure world.

Similar User
Manu photo

@mp2077

La Forja del Minotauro photo

@dsrt666

Jonathan photo

@0xJOQUI23

Yoince Servicios Informáticos photo

@yoince_it

Edin Ramírez photo

@edinsl6

Tollan prototipo photo

@EliosBlack

Jam Pg photo

@Jam_Pg

Hector photo

@hectodrigz

Black Fingerprints Reposted

👾 Web Fuzzing Guide: Fuzzing Web Apps to Find Bugs with Burp Suite Blog: hackers-arise.net/2023/12/12/web… #infosec #fuzzing

Tweet Image 1
Tweet Image 2

Black Fingerprints Reposted

☁️ Cloud Security VM Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments. Includes over 30 tools! By @WithSecure github.com/WithSecureLabs…

Tweet Image 1

Black Fingerprints Reposted

Beginners intro to cryptography concept with practical examples in Linux (openssl) (@sergioprado) Part 1: sergioprado.blog/introduction-t… Part 2: sergioprado.blog/a-hands-on-app… Part 3: sergioprado.blog/asymmetric-key… Part 4: sergioprado.blog/what-are-rando… #cryptography #infosec

Tweet Image 1
Tweet Image 2

Black Fingerprints Reposted

OSINT Mind Map!!

Tweet Image 1

Black Fingerprints Reposted

HOW CYBERSECURITY REALLY WORKS! Download Now! drive.google.com/file/d/1qYpvXB…

Tweet Image 1

Black Fingerprints Reposted

Disponible Red Hat Enterprise Linux 9.5 con el foco puesto en la automatización y la integración muylinux.com/2024/11/13/red…


Black Fingerprints Reposted

Las bandas de ransomware mejoraron sus técnicas para evadir los Antivirus y EDR´s. La CISA, dentro de su iniciativa STOP RANSOMWARE, ha publicado las tácticas más usadas por estos delincuentes y basadas en ellas hemos creado este Top 10 Técnicas de Bypass de EDR en Ransomware:

Tweet Image 1
Tweet Image 2
Tweet Image 3
Tweet Image 4

Black Fingerprints Reposted

Have you been hacked? Hacker explains how to find out! youtu.be/bf-4ipD2S1M?si… via @YouTube


Black Fingerprints Reposted

🚨 Microsoft warns of actively exploited flaws in NTLM (CVE-2024-43451) & Task Scheduler (CVE-2024-49039), allowing NTLMv2 hash disclosure and privilege escalation to restricted RPC functions. Find details on the November Patch Tuesday update: thehackernews.com/2024/11/micros… #infosec


Black Fingerprints Reposted

Cryptography

Tweet Image 1

Black Fingerprints Reposted

🚀 Here are the top 25 parameters that could be vulnerable to code injection and similar RCE vulnerabilities (from link): ?cmd={payload} ?exec={payload} ?command={payload} ?execute{payload} ?ping={payload} ?query={payload} ?jump={payload} ?code={payload} ?reg={payload}…


Black Fingerprints Reposted

15 Ways To Avoid Phone Hacking 1.Use VPN on Public Wi-Fi 2.Avoid Clicking Suspicious Links 3.Limit App Permissions 4.Avoid Downloading Apps from unsecured platforms 5.Avoid Suspicious Websites 6.Enable MFA 7.Install Antivirus 8.Keep OS Up to Date 9.Disable Password…


Black Fingerprints Reposted

🎉 Let's celebrate 4 years of #HTB Academy 🎉 join our #giveaway on Linkedin and be one of the lucky Academy students to win a Golden Annual subscription! Will you be the one to solve our riddle and win? okt.to/pYLOMv


Black Fingerprints Reposted

New breach: Hot Topic had 57M email addresses breached last month. Data also included physical address, name, phone, DoB, gender, purchases and partial credit card data. 66% were already in @haveibeenpwned Read more: au.pcmag.com/security/10792…


United States Trends
Loading...

Something went wrong.


Something went wrong.