sudosheggs Profile Banner
Segun Profile
Segun

@sudosheggs

Followers
322
Following
5K
Media
99
Statuses
661

God First 💭| ethical hacking in progress | pentester in training. sharing my journey in cybersecurity, tools and tactics. gymxtech= discipline.

Root
Joined April 2022
Don't wanna be here? Send us removal request.
@sudosheggs
Segun
12 days
with tears of Joy in my eyes 😭😭🤩🤩 Thank you for the amazing update @Cyblackorg . I’m pleased to have advanced to the next stage of the internship process and appreciate the opportunity, i look forward for what comes next. Thank you Dr @ireteeh , @segoslavia @TemitopeSobulo
19
7
55
@sudosheggs
Segun
8 hours
☑️ day 61/100 of my cybersecurity journey. completed the cryptography and endpoint protection exams. #100DaysOfCyberSecurity. @ireteeh @TemitopeSobulo @segoslavia @OnijeC @cyberjeremiah @real_nuelOj @h4ruk7
2
7
16
@sudosheggs
Segun
21 hours
Thank you Dr @ireteeh 🙇🏾 i received the data. God bless you Ma for all you do.
@ireteeh
Dr Iretioluwa Akerele
2 days
Form closed
0
3
5
@ireteeh
Dr Iretioluwa Akerele
2 days
Hello Cyber friends in Nigeria, if you need internet data to support your learning, fill this form. https://t.co/qJvUs3G9zK The form will be closed once we hit our target. Your information will be deleted within 48 hours…
Tweet card summary image
docs.google.com
Kindly note that this is only for those in NIGERIA
61
35
187
@sudosheggs
Segun
2 days
☑️ day 60/100 of my cybersecurity journey. knocked off modules 24> technologies and protocols. #100DaysOfCyberSecurity @ireteeh @TemitopeSobulo @OnijeC @segoslavia @cyberjeremiah @h4ruk7 @real_nuelOj
1
3
14
@sudosheggs
Segun
3 days
endpoint vulnerability assessment is a process used to find and fix security weaknesses on endpoint devices such as computers, servers, phones, and tablets. It helps ensure that attackers cannot exploit these devices to gain access to the network.
0
0
0
@sudosheggs
Segun
3 days
☑️ day 58-59 / 100 of my cybersecurity journey. knocked off modules 23> endpoint vulnerability assessment.#100DaysOfCyberSecurity @ireteeh @TemitopeSobulo @segoslavia @OnijeC @cyberjeremiah @real_nuelOj @h4ruk7
2
4
14
@d4rk_intel
D4rk_Intel
5 days
OSINT 109: LinkedIn Recon In this video, I share a simple manual technique you can use to extract data like "pictures, mutual connections, contact info" - etc from a POI on LinkedIn > Inspect. #OSINT #Cybersecurity
0
51
347
@sudosheggs
Segun
4 days
Facts 👏🏿
@lady_sheraz
••oxRaz••
5 days
For 2 years, cybersecurity wasn’t my career. it was my hobby, and that experience has shaped me in incredible ways. But this is the part many people never talk about. I didn’t start with a high-paying role. I started with volunteering one of which was with @Cyblackorg, an
1
0
1
@sudosheggs
Segun
4 days
☑️ day 57/100 of my cybersecurity journey. knocked off modules 22> endpoint protection #100DaysOfCyberSecurity @ireteeh @TemitopeSobulo @OnijeC @segoslavia @cyberjeremiah @h4ruk7 @real_nuelOj
1
2
11
@sudosheggs
Segun
5 days
😂😂😂
@SecurityTrybe
Security Trybe
5 days
How DHCP Works 😂😂
0
0
1
@sudosheggs
Segun
5 days
☑️ day 56/100 of my cybersecurity journey. knocked off modules 21> cryptography #100DaysOfCyberSecurity @ireteeh @TemitopeSobulo @OnijeC @segoslavia @cyberjeremiah @real_nuelOj
2
0
5
@sudosheggs
Segun
5 days
FACTS
1
0
4
@sudosheggs
Segun
6 days
❤️❤️❤️
@ireteeh
Dr Iretioluwa Akerele
6 days
Monday Motivation ✨ Momentum is built from small, intentional actions. Every email sent, every page written, every idea explored, it all adds up 💪
0
0
0
@TemitopeSobulo
Temitope Sobulo🛡️
6 days
May the Lord direct our steps this month. Happy new month 🥰🥰🥰
7
8
30
@sudosheggs
Segun
6 days
☑️ day 55/100 of my cybersecurity journey. knocked off modules 20> threat intelligence #100DaysOfCyberSecurity @ireteeh @TemitopeSobulo @OnijeC @segoslavia @cyberjeremiah @h4ruk7
2
3
17
@sudosheggs
Segun
6 days
This was a great session. Thank you, Sir @cyber_rekk , your speech was truly mind blowing and insightful..I really appreciate it, and I don’t take it for granted. thank you Sir @cyberjeremiah for great session.
1
2
12
@Officialwhyte22
Winston Ighodaro
7 days
I found malware that embedded itself into an audio driver. It silently recorded from the system microphone and uploaded the compressed .wav files every 20 minutes. Using memory forensics and strings, I discovered a hidden process writing to a staged audio cache in %Temp%.
357
1K
13K
@d4rk_intel
D4rk_Intel
8 days
OSINT 106: Who Owns This Email? In this video, I made a quick demo using different methodology and tools to build a richer profile of my target email address > advanced search operators > data aggregation > Google > Bing > Yandex, etc. #OSINT #Cybersecurity
0
109
736
@sudosheggs
Segun
7 days
😂👏🏿
0
0
10
@sudosheggs
Segun
7 days
cooking…😌
0
0
1