cloud_mavinCC Profile Banner
Cloud_Mavin's Cyber Academy Profile
Cloud_Mavin's Cyber Academy

@cloud_mavinCC

Followers
2K
Following
395
Media
489
Statuses
908

#1 Cyber Academy for beginners in Cybersecurity #cybersecurity #cyber

Joined June 2023
Don't wanna be here? Send us removal request.
@cloud_mavinCC
Cloud_Mavin's Cyber Academy
2 years
Are you a Cybersecurity Analyst or beginner in the field?. Join our WhatsApp community through the link below and connect with like minded individuals today!. Retweet to get this to someone it will benefit!.
7
15
55
@cloud_mavinCC
Cloud_Mavin's Cyber Academy
22 days
- Detecting Malicious Code Changes โ€“ Monitoring repositories for changes with Repo Hunt. - Tracking Developer Footprints โ€“ Investigating commit histories with GHunt. Donโ€™t forget to like and follow for more๐Ÿ˜‡.
0
0
1
@cloud_mavinCC
Cloud_Mavin's Cyber Academy
22 days
Hard-on with OSINT p.5. ๐—–๐—ผ๐—ฑ๐—ฒ & ๐—ฅ๐—ฒ๐—ฝ๐—ผ๐˜€๐—ถ๐˜๐—ผ๐—ฟ๐˜† ๐—œ๐—ป๐˜๐—ฒ๐—น๐—น๐—ถ๐—ด๐—ฒ๐—ป๐—ฐ๐—ฒ.- Leaked API Keys & Secrets โ€“ Finding exposed credentials with GitLeaks. - Searching open GitHub repositories for sensitive data using GitHub Dorking.
Tweet media one
1
1
2
@cloud_mavinCC
Cloud_Mavin's Cyber Academy
24 days
- DNS Hijacking Detection โ€“ Checking for DNS changes with DNSTwist. - Certificate Transparency Logs โ€“ Searching for newly issued SSL certificates using CertSpotter. Donโ€™t forget to like and follow for more๐Ÿ˜‡.
0
0
0
@cloud_mavinCC
Cloud_Mavin's Cyber Academy
24 days
Hands-on with OSINT P.4. ๐——๐—ผ๐—บ๐—ฎ๐—ถ๐—ป & ๐—ฆ๐˜‚๐—ฏ๐—ฑ๐—ผ๐—บ๐—ฎ๐—ถ๐—ป ๐—˜๐—ป๐˜‚๐—บ๐—ฒ๐—ฟ๐—ฎ๐˜๐—ถ๐—ผ๐—ป.- Subdomain Enumeration โ€“ Discovering subdomains using Subfinder. - Brute Force DNS Records โ€“ Resolving domains using MassDNS.
Tweet media one
1
0
1
@cloud_mavinCC
Cloud_Mavin's Cyber Academy
24 days
Hunting Dark Web Activity โ€“ Searching TOR hidden services using OnionSearch. - Passive DNS Lookups โ€“ Identifying related infrastructure with PassiveTotal. Donโ€™t forget to like and follow for more๐Ÿ˜‡.
0
0
0
@cloud_mavinCC
Cloud_Mavin's Cyber Academy
24 days
Hands-on with OSINT P.3. ๐—ก๐—ฒ๐˜๐˜„๐—ผ๐—ฟ๐—ธ, ๐——๐—ฎ๐—ฟ๐—ธ ๐—ช๐—ฒ๐—ฏ & ๐—œ๐—ป๐—ณ๐—ฟ๐—ฎ๐˜€๐˜๐—ฟ๐˜‚๐—ฐ๐˜๐˜‚๐—ฟ๐—ฒ ๐—œ๐—ป๐˜๐—ฒ๐—น๐—น๐—ถ๐—ด๐—ฒ๐—ป๐—ฐ๐—ฒ.- Using AlienVault OTX for real-time threat intelligence. - Investigating domain name changes with SecurityTrails.
Tweet media one
1
1
3
@cloud_mavinCC
Cloud_Mavin's Cyber Academy
28 days
- Analyzing Phishing Domains โ€“ Investigating suspicious URLs with . - Fake Account & Bot Detection โ€“ Detecting inauthentic social media accounts using Botometer. Donโ€™t forget to share & follow for more๐Ÿ˜‡.
0
0
0
@cloud_mavinCC
Cloud_Mavin's Cyber Academy
28 days
Hands-on with OSINT P.2. ๐—ฆ๐—ผ๐—ฐ๐—ถ๐—ฎ๐—น ๐—˜๐—ป๐—ด๐—ถ๐—ป๐—ฒ๐—ฒ๐—ฟ๐—ถ๐—ป๐—ด & ๐—ฃ๐—ต๐—ถ๐˜€๐—ต๐—ถ๐—ป๐—ด ๐—ฅ๐—ฒ๐—ฐ๐—ผ๐—ป.- User Account Enumeration โ€“ Check breached passwords with Have I Been Pwned (HIBP). - Extracting social media profiles using Holehe.
Tweet media one
1
2
2
@cloud_mavinCC
Cloud_Mavin's Cyber Academy
28 days
- Infrastructure Fingerprinting โ€“ Gather TLS certificate data with Censys to uncover related assets. - Finding Exposed Cloud Storage โ€“ Use Grayhat Warfare to identify open Amazon S3 buckets. Donโ€™t forget to share & follow for more.
0
0
1
@cloud_mavinCC
Cloud_Mavin's Cyber Academy
28 days
Hands-on with OSINT p.1. ๐—”๐˜๐˜๐—ฎ๐—ฐ๐—ธ ๐—ฆ๐˜‚๐—ฟ๐—ณ๐—ฎ๐—ฐ๐—ฒ ๐— ๐—ฎ๐—ฝ๐—ฝ๐—ถ๐—ป๐—ด.- Using Shodan to map exposed services & misconfigured assets. - Leveraging Amass for passive & active reconnaissance of domains & subdomains. Cc: Rajneesh Gupta
Tweet media one
1
1
3
@cloud_mavinCC
Cloud_Mavin's Cyber Academy
1 month
Cybersecurity Analyst vs. Ethical Hacker vs. Security Engineer . Do you agree?. What would you add or subtract from this infographic?๐Ÿค”
Tweet media one
0
0
2
@cloud_mavinCC
Cloud_Mavin's Cyber Academy
1 month
Recon & Attack Surface Mapping.- ZoomEye โ€“ Discover exposed online infrastructure.- GrayHatWarfare โ€“ Search public S3 buckets.- LeakIX โ€“ Find misconfigured web servers.- DNSDumpster โ€“ Map DNS data & exposure.- FullHunt โ€“ Full view of external attack surfaces.
0
0
0
@cloud_mavinCC
Cloud_Mavin's Cyber Academy
1 month
Cybersecurity Search Engines II. Threat Intelligence.- Pulsedive โ€“ Analyze IOCs & threat feeds.- PolySwarm โ€“ Scan files & URLs for malware.- Fofa โ€“ Cyber mapping & threat tracking.- AlienVault โ€“ Threat detection & correlation tools.- Onyphe โ€“ Big data for cyber risk analysis. ๐Ÿงต
Tweet media one
1
2
4
@cloud_mavinCC
Cloud_Mavin's Cyber Academy
1 month
Tweet media one
0
0
0
@cloud_mavinCC
Cloud_Mavin's Cyber Academy
1 month
Search Techniques & Dorking.DorkSearch โ€“ Use Google dorks to uncover vulnerabilities. DNS & Domain Info.- Security Trails โ€“ Get in-depth DNS & domain intelligence.
0
0
1
@cloud_mavinCC
Cloud_Mavin's Cyber Academy
1 month
Cybersecurity Search Engines III. OSINT / Internet Scanning.- Shodan โ€“ Scan the internet for connected devices.- WayBackMachine โ€“ Retrieve archived website content. ๐Ÿงต
Tweet media one
1
2
3
@cloud_mavinCC
Cloud_Mavin's Cyber Academy
1 month
Tweet media one
0
0
0
@cloud_mavinCC
Cloud_Mavin's Cyber Academy
1 month
Source Code & Git Search.- SearchCode โ€“ Explore open source code repositories.- Grep App โ€“ Hunt through GitHub repositories for secrets. Vulnerability & Exploit Databases.- ExploitDB โ€“ Access known exploits and PoCs.- Vulners โ€“ CVE and vulnerability intelligence database.
0
0
0
@cloud_mavinCC
Cloud_Mavin's Cyber Academy
1 month
Cybersecurity Search Engines I. Leaked Data & Credentials.- Dehashed โ€“ Find leaked credentials from data breaches.- IntelligenceX โ€“ Search Tor, I2P, & deep web leaks. ๐Ÿงต
Tweet media one
1
1
4
@cloud_mavinCC
Cloud_Mavin's Cyber Academy
1 month
๐—ง๐—ผ๐—ฝ ๐Ÿฎ๐Ÿญ ๐——๐—ฎ๐—ฟ๐—ธ ๐—ช๐—ฒ๐—ฏ ๐—ฅ๐—ฒ๐˜€๐—ผ๐˜‚๐—ฟ๐—ฐ๐—ฒ๐˜€ ๐—ณ๐—ผ๐—ฟ ๐—ข๐—ฆ๐—œ๐—ก๐—ง ๐—ฃ๐—ฟ๐—ผ๐—ณ๐—ฒ๐˜€๐˜€๐—ถ๐—ผ๐—ป๐—ฎ๐—น๐˜€. By: Ethical Hacking Academy
Tweet media one
0
0
2