Hackstack Security
@hackstacksec
We're a dedicated Team of Cyber Security Professionals providing quality VAPT , IT Auditing and IT Security Consultancy. 📩 DM To Get Your Pentest Done.
おすすめツイート
Practical Thick Client Pentesting Checklist 1. Dump process memory; grep for session tokens or credentials 2. Analyze clipboard contents after key application operations 3. Extract SQLite/LevelDB/custom databases for orphaned secrets 4. Scan update and installer config files…
hetmehta.com
Thick Client Pentesting Checklist | Het Mehta
A practical thick client pentesting checklist by Het Mehta covering environment setup, static analysis, dynamic analysis, network, and reporting, with detailed commands and tools.
I shared my take on CTFs, and you blew up my notifications! You want real resources for skills companies pay for? Here’s a no-fluff list to get you hired👇
Breaking Security AMA A weekly series featuring top hackers and cybersecurity professionals. This edition: @PayloadArtist will answer your questions on AppSec, bug bounties, and web hacking right here in the comments! Ask below in comments or by using #InfosecAMA Hurry,…
We're hiring interns for Cybersecurity Business Development! DM for more details.
BRUTAL TRUTH: 83% of Pentest candidates fail interviews despite having solid technical skills After conducting 50+ security interviews and helping dozens land their dream roles, here's why most fail (and the exact fix) 🧵 #CyberSecurity #InfoSec #TechCareers
#Infosec Hiring
We’re hiring a Senior Security Analyst (Remote)! Focus areas: SCA, VAPT, Cloud Security, and Threat Modeling. Looking for 4+ years of hands-on infosec experience. ( Product Security ) DMs are Open!
Powershell For Hackers: Exploitation Essentials Practical guide on how to use PowerShell for hacking and penetration testing. #PowerShell #RedTeam #CyberSecurity #PostExploitation #Hacking hetmehta.com/posts/powershe…
hetmehta.com
PowerShell for Hackers: Exploitation Essentials | hetmehta.com
A red teamer’s guide to PowerShell for post-exploitation: enum, privesc, persistence, and C2
Free SOC 2 TSC Checklist Map your Security, Availability, Integrity, Confidentiality & Privacy controls with this simple, practical guide. How to get? Comment SOC2 and I'll share you the link for the checklist. #SOC2 #CyberSecurity #Checklist
Check out my latest article: Data Security Isn't Just an IT Problem – It's Our Responsibility linkedin.com/pulse/data-sec…
Take a look at my blog w/ @Bugcrowd where I talk about RCE and one of the ways it landed me a critical payout! bugcrowd.com/blog/remote-co…
bugcrowd.com
Remote code execution (RCE) 101 | @Bugcrowd
I like to think of RCE not just as a bug but as an impact. Why? Because there are numerous ways—literally 1001—to achieve RCE. The initial foothold for an RCE attack can vary significantly, ranging...
Master subdomain takeover vulnerabilities! 😎 A thread 🧵 👇
List of Windows Directories you should know about
Cybersecurity Compliance in 2025 hetmehta.com/posts/complian…
United States トレンド
- 1. Halo 76.2K posts
- 2. #CashAppPools 1,388 posts
- 3. PlayStation 35K posts
- 4. Canada 445K posts
- 5. #CostumeInADash N/A
- 6. #HitTheBuds N/A
- 7. Reagan 204K posts
- 8. Immigration 159K posts
- 9. Megan 66.5K posts
- 10. West Ham 8,503 posts
- 11. Ashley 155K posts
- 12. #CashAppFriday N/A
- 13. Lukas Reichel 1,222 posts
- 14. #WorldSeries 45.9K posts
- 15. Letitia James 62.3K posts
- 16. Kyler Gordon N/A
- 17. Tish 16.3K posts
- 18. rod wave 3,601 posts
- 19. $ASST 9,087 posts
- 20. Revis N/A
おすすめツイート
-
RedOps Cyber
@nmkannans -
Srinivas Batchu
@SrinivasBatchu_ -
Bogdan Bodisteanu
@xalerafera -
Harsh Tandel
@H4r5h_T4nd37 -
Argal Rawat Atul Singh Gautam ⚔️ 𝕏
@kunwaratulhax0r -
Harsh D Ranjan
@HarshDRanjan1 -
Amal Murali
@amalmurali47 -
现任明教教主
@cq_bomb -
tushar_recon
@ReconTushar -
0xPratyaksh
@mr_fr3qu3n533 -
வீப்பியார் (ᴠ ᴇ ᴇ ᴘ ᴘ ɪ ᴀ ᴀ ʀ)
@veeppiaar -
Ranjan
@Ranjan22555 -
Arpit Borawake
@_venom26
Something went wrong.
Something went wrong.