Hackstack Security
@hackstacksec
We're a dedicated Team of Cyber Security Professionals providing quality VAPT , IT Auditing and IT Security Consultancy. 📩 DM To Get Your Pentest Done.
Vous pourriez aimer
Practical Thick Client Pentesting Checklist 1. Dump process memory; grep for session tokens or credentials 2. Analyze clipboard contents after key application operations 3. Extract SQLite/LevelDB/custom databases for orphaned secrets 4. Scan update and installer config files…
hetmehta.com
Thick Client Pentesting Checklist | Het Mehta
A practical thick client pentesting checklist by Het Mehta covering environment setup, static analysis, dynamic analysis, network, and reporting, with detailed commands and tools.
I shared my take on CTFs, and you blew up my notifications! You want real resources for skills companies pay for? Here’s a no-fluff list to get you hired👇
Breaking Security AMA A weekly series featuring top hackers and cybersecurity professionals. This edition: @PayloadArtist will answer your questions on AppSec, bug bounties, and web hacking right here in the comments! Ask below in comments or by using #InfosecAMA Hurry,…
We're hiring interns for Cybersecurity Business Development! DM for more details.
BRUTAL TRUTH: 83% of Pentest candidates fail interviews despite having solid technical skills After conducting 50+ security interviews and helping dozens land their dream roles, here's why most fail (and the exact fix) 🧵 #CyberSecurity #InfoSec #TechCareers
#Infosec Hiring
We’re hiring a Senior Security Analyst (Remote)! Focus areas: SCA, VAPT, Cloud Security, and Threat Modeling. Looking for 4+ years of hands-on infosec experience. ( Product Security ) DMs are Open!
Powershell For Hackers: Exploitation Essentials Practical guide on how to use PowerShell for hacking and penetration testing. #PowerShell #RedTeam #CyberSecurity #PostExploitation #Hacking hetmehta.com/posts/powershe…
Free SOC 2 TSC Checklist Map your Security, Availability, Integrity, Confidentiality & Privacy controls with this simple, practical guide. How to get? Comment SOC2 and I'll share you the link for the checklist. #SOC2 #CyberSecurity #Checklist
Check out my latest article: Data Security Isn't Just an IT Problem – It's Our Responsibility linkedin.com/pulse/data-sec…
Take a look at my blog w/ @Bugcrowd where I talk about RCE and one of the ways it landed me a critical payout! bugcrowd.com/blog/remote-co…
bugcrowd.com
Remote code execution (RCE) 101 | @Bugcrowd
I like to think of RCE not just as a bug but as an impact. Why? Because there are numerous ways—literally 1001—to achieve RCE. The initial foothold for an RCE attack can vary significantly, ranging...
Master subdomain takeover vulnerabilities! 😎 A thread 🧵 👇
List of Windows Directories you should know about
Cybersecurity Compliance in 2025 hetmehta.com/posts/complian…
United States Tendances
- 1. Good Sunday 52.5K posts
- 2. #sundayvibes 4,516 posts
- 3. #FrancisLibiran 98K posts
- 4. #SB19FastZoneConcert 76.3K posts
- 5. #sundaymotivation 2,064 posts
- 6. Barcelona 129K posts
- 7. Talus Labs 13.7K posts
- 8. #한이_첫OST_축하해 11.8K posts
- 9. Cambodia 30.7K posts
- 10. HAN SOLO OST OUT NOW 11.9K posts
- 11. Madrid 255K posts
- 12. Malaysia 145K posts
- 13. Brian Kelly 18.5K posts
- 14. Mayu 18.8K posts
- 15. Gronk 1,934 posts
- 16. Thailand 134K posts
- 17. Oprah 4,595 posts
- 18. Deion 2,653 posts
- 19. Emiru 25.5K posts
- 20. Hurricane Melissa 21.5K posts
Vous pourriez aimer
-
RedOps Cyber
@nmkannans -
Srinivas Batchu
@SrinivasBatchu_ -
Bogdan Bodisteanu
@xalerafera -
Harsh Tandel
@H4r5h_T4nd37 -
Argal Rawat Atul Singh Gautam ⚔️ 𝕏
@kunwaratulhax0r -
Harsh D Ranjan
@HarshDRanjan1 -
Amal Murali
@amalmurali47 -
现任明教教主
@cq_bomb -
tushar_recon
@ReconTushar -
0xPratyaksh
@mr_fr3qu3n533 -
வீப்பியார் (ᴠ ᴇ ᴇ ᴘ ᴘ ɪ ᴀ ᴀ ʀ)
@veeppiaar -
Ranjan
@Ranjan22555 -
Arpit Borawake
@_venom26
Something went wrong.
Something went wrong.