Black Fingerprints
@blackfprints#OSINT #Security #Forensic #Training Trying to help people to have a more secure world.
Similar User
@mp2077
@dsrt666
@0xJOQUI23
@yoince_it
@edinsl6
@EliosBlack
@Jam_Pg
@hectodrigz
👾 Web Fuzzing Guide: Fuzzing Web Apps to Find Bugs with Burp Suite Blog: hackers-arise.net/2023/12/12/web… #infosec #fuzzing
☁️ Cloud Security VM Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments. Includes over 30 tools! By @WithSecure github.com/WithSecureLabs…
Beginners intro to cryptography concept with practical examples in Linux (openssl) (@sergioprado) Part 1: sergioprado.blog/introduction-t… Part 2: sergioprado.blog/a-hands-on-app… Part 3: sergioprado.blog/asymmetric-key… Part 4: sergioprado.blog/what-are-rando… #cryptography #infosec
HOW CYBERSECURITY REALLY WORKS! Download Now! drive.google.com/file/d/1qYpvXB…
Debian 12.8, nueva actualización de mantenimiento para ‘Bookworm’ muylinux.com/2024/11/11/deb…
Disponible Red Hat Enterprise Linux 9.5 con el foco puesto en la automatización y la integración muylinux.com/2024/11/13/red…
Las bandas de ransomware mejoraron sus técnicas para evadir los Antivirus y EDR´s. La CISA, dentro de su iniciativa STOP RANSOMWARE, ha publicado las tácticas más usadas por estos delincuentes y basadas en ellas hemos creado este Top 10 Técnicas de Bypass de EDR en Ransomware:
Have you been hacked? Hacker explains how to find out! youtu.be/bf-4ipD2S1M?si… via @YouTube
🚨 Microsoft warns of actively exploited flaws in NTLM (CVE-2024-43451) & Task Scheduler (CVE-2024-49039), allowing NTLMv2 hash disclosure and privilege escalation to restricted RPC functions. Find details on the November Patch Tuesday update: thehackernews.com/2024/11/micros… #infosec
Semi-automatic OSINT framework and package manager github.com/kpcyrd/sn0int
pandora: A red team tool to extract credentials from password managers meterpreter.org/pandora-a-red-…
Attacking APIs using JSON Injection danaepp.com/attacking-apis…
🚀 Here are the top 25 parameters that could be vulnerable to code injection and similar RCE vulnerabilities (from link): ?cmd={payload} ?exec={payload} ?command={payload} ?execute{payload} ?ping={payload} ?query={payload} ?jump={payload} ?code={payload} ?reg={payload}…
Best of Nmap Scan Host Discovery hackingarticles.in/nmap-for-pente… Output Scan hackingarticles.in/nmap-for-pente… Vulnerability Scan hackingarticles.in/nmap-for-pente… Password Cracking hackingarticles.in/nmap-for-pente… Packet Trace hackingarticles.in/understanding-… #infosec #cybersecurity #cybersecuritytips #pentesting…
RustiveDump: dump the memory of the lsass.exe process meterpreter.org/rustivedump-du…
15 Ways To Avoid Phone Hacking 1.Use VPN on Public Wi-Fi 2.Avoid Clicking Suspicious Links 3.Limit App Permissions 4.Avoid Downloading Apps from unsecured platforms 5.Avoid Suspicious Websites 6.Enable MFA 7.Install Antivirus 8.Keep OS Up to Date 9.Disable Password…
🎉 Let's celebrate 4 years of #HTB Academy 🎉 join our #giveaway on Linkedin and be one of the lucky Academy students to win a Golden Annual subscription! Will you be the one to solve our riddle and win? okt.to/pYLOMv
New breach: Hot Topic had 57M email addresses breached last month. Data also included physical address, name, phone, DoB, gender, purchases and partial credit card data. 66% were already in @haveibeenpwned Read more: au.pcmag.com/security/10792…
United States Trends
- 1. $MAYO 9.936 posts
- 2. Tyson 388 B posts
- 3. Pence 44,1 B posts
- 4. Laken Riley 39,5 B posts
- 5. Dora 22,3 B posts
- 6. Ticketmaster 16,6 B posts
- 7. Kash 72 B posts
- 8. Mike Rogers 8.415 posts
- 9. #LetsBONK 5.993 posts
- 10. Cenk 10,8 B posts
- 11. Pirates 18,8 B posts
- 12. #FursuitFriday 15,5 B posts
- 13. Debbie 15,8 B posts
- 14. Mr. Mayonnaise 1.376 posts
- 15. Iron Mike 16,1 B posts
- 16. The UK 436 B posts
- 17. Gabrielle Union N/A
- 18. Scholars 10,7 B posts
- 19. Oscars 13,9 B posts
- 20. Al Gore 3.306 posts
Something went wrong.
Something went wrong.