Instructor
@Cisco
x
@Cyblack
| 20 | NG 🇳🇬 | Speaks 🇩🇪🇷🇺 sometimes | eJPTv2 | Web application and Network Pentester | INTJ | Refuses to elaborate further
Wrote a blog on getting started in cybersecurity. It was needed. I have way too many people asking this in my DMs and my cs.
I've got other stuff in the drafts, but what else would you like to see?
I'm currently in a Telegram GC/Channel for Yahoo boys. I've once again confirmed how they operate. I'd like to reiterate that these guys are indeed not fit for anything hacking related.
The call to turn these guys to the government to become Ethical Hackers is a joke, pure buffoonery. Quite frankly, it is bullshit.
We should not reward people who defraud hard-working individuals.
They're are criminals trying to make money through fraud in the least technical way possible; they are unable to perform any relatively simple task of an Ethical Hacker.
THREAD do not open if you haven't watched:
The scouts after reaching shignshina had titans, along with Zeke transform where they passed through to get there. It was really confusing, but then, I found out about this pipe. They used it as a breathing pole.
1/
Your whataboutism argument about how the country is hard will not fly with me, though I understand.
My solution to this is to show them that there is another way out of this hell our imbecilic leaders have created for us.
@FirstFlightCapt
@WakaWakaTailor
Luke 22:36
"But now", Jesus said, "whoever has a purse or a bag must take it; and whoever does not have a sword must sell his coat and buy one.
Nonsense is nonsense.
I can not deny that they may have the potential to turn a new leaf (however unlikely) and earn money in another way.
So if you do know someone, talk to them. See what you can do for them. Some will take the opportunity.
Bertholdt's weird asf sleeping position.
On the right is a tarot card called "the hangman" depicting a punishment for traitors used in Italy a long time ago.
Bertholdt seems to be sleeping in that position as well, which I believe indicates him betraying the scouts.
END.
@Ejikehimself
Their "best tool" is a series of documents detailing EXACTLY what to say. Most of them, as far as I've witnessed, are incapable of finding the right words to use themselves.
Someone needed resources to get started in Cybersecurity last night. He didn't have a laptop, so I guessed correctly that he may not have a solid grasp of computer basics. Then, I told him about the A+ certification.
Here's how that went:
THREAD do not open if you haven't watched:
The scouts after reaching shignshina had titans, along with Zeke transform where they passed through to get there. It was really confusing, but then, I found out about this pipe. They used it as a breathing pole.
1/
I have
- Trained 50 women to become Ethical hackers.
- Created a Discord server to train hundreds to become an Ethical Hacker, on my own.
- Currently an Instructor at the
@Cyblackorg
×
@Cisco
academy to teach Cybersecurity and Networking Basics.
All for FREE. Stop lying!
Mikasa shows her training and why she's an Ackerman with her spectacular aim. In an attempt to blind Reiner, Mikasa and Hange both fire thunder spears at his eyes.
By the left is Mikasa's and the right, Hange's.
7/
@DearMirabel
Drop his number. One of the reasons I got into hacking is because I hate scammers.
Do your best to report to the authorities as well (which may not really help, but try).
@schetty
@ItsTaz1989
There's nothing "racist" about this. It's talking about the history of my country, Nigeria and yeah, it's true and it's still happening.
Eren's mum was capping about her legs being in bad shape to convince the kids to run away and leave her. You could see her legs kicking as she was held by the "smiling titan".
6/
This year was pretty nice to me.
- Did VAPT on a Fintech company.
- Trained 50 women on Ethical Hacking (
@Cyblackorg
/
@TDatakirk
).
- Currently building an IT Security company.
- Currently facilitating the sept-2023 batch of CyBlack interns' Pentesting task.
@DearMirabel
@DearMirabel
his name's 'Argiroudis Samuel Damilare'.
Number seems to be registered at Osun as well. Check Facebook for this name. If you find anything, don't hesitate to show the authorities.
Did you know if you put a space after a Linux command before hitting enter, that command would not be registered in the shell history?
It's quite useful when entering sensitive information. One other thing I use it for is during Pentesting, not to leave traces of what I have…
Do you know the amount of insanity and bigotry that exists in you if the first thing you do when someone needs help is to go and find if they have tweeted anything against Igbos?
Omoooooooo this is madness!!! Never seen this sort of vileness before
@SirNewtonNG_
@Redmadewine3
First of all, remove "newton" from your username, olodo.
Secondly, that's the same person.
Now, let's get into how you're so focused on race obsessed you overlooked the kindness this woman showed to this boy who was actually left to die.
I will be training beginners in my server and they will start immediately with a task.
Wanna be a part of it? Join up, it's FREE. 🫵🔥
Link to join my server:
I completed the Web Security Academy lab:
Exploiting a mass assignment vulnerability
In this lab, I got a discount of 100% for a jacket by exploiting a Mass Assignment vulnerability.
I added the jacket to my cart, but didn't have enough credit in my wallet to purchase it.…
I'm Damian, an Ethical Hacker/Web Application Penetration Tester. I'm versed in various security concepts, network & web-app attack methods. I also compete in hacking competitions (CTFs) nationally and globally.
My other cysec interests are Malware analysis & Cloud security.
Hi everyone, I'm Jemimah. A frontend developer currently proficient in HTML, CSS, Tailwind CSS, JavaScript and React. I'd like to use my skills to build scalable products and solve problems facing the smallest unit of society and the world as a whole. What about you?
How the Office 365 phishing scam (what this guy is about to teach people in this community) works so you can avoid falling for it:
You'll be sent an email with a link to download a document. After clicking it, you'll be directed to a page where you have to input your Office 365…
This time last year, I was a
@Cyblackorg
intern. Today, I just finished a meeting session with the sept-2023 set as their Ethical Hacking/Pentesting Task Facilitator.
Each team presented their report to
@SebolatanX
and I.
Their tasks were:
1/4
Passed the Certified Appsec Practitioner (CAP) by
@TheSecOpsGroup
Thanks
@BowTiedCyber
, there was a lot of procrastination before taking this a second time after my first attempt. All I needed to do was study properly. Your tweets helped me realise that. LOL
#CyberSecurity
In early 2022, my HOD gave every Computer science and Cybersecurity student this exact task. I created a Python code that does this, gets the meaning and then translates that to any language you want. My HOD gave me money for it. Lmao
We don't use MacBooks here. These are your options:
- Remove Windows and install Linux
- Windows with Linux Dualbooted
- Windows with Linux Virtual Machine (VM)
- Window Subsystem For Linux (WSL)
MacBook users in this space:
They tried to infect my phone with malware. This is how I figured it out. Social Engineering is tricky, but in this case, I knew it was a scam, easily. Just wanted to figure out what exactly it is they wanted. Hope you find this helpful.
THREAD 🧵
#CybersecurityAwarenessMonth
Yesterday, my students graduated. It was fun training them to become hackers.
At the very beginning, I didn't think I could do it. Not because I can't teach, but the time was really small.
But I did it.
1/6
Tomorrow, we will be celebrating our new graduates of the just concluded "Ethical Hacking Training" by Cyblack and DataKirk, we are proud of everyone graduating and we wish them all the best going forward in their career.
kindly drop your best wishes for our graduands.