home.social

#pentesters β€” Public Fediverse posts

Live and recent posts from across the Fediverse tagged #pentesters, aggregated by home.social.

  1. 😱 In just one week, over 500,000 people learned how to use #OSINT to prepare for physical #intrusions!

    ⛓️‍πŸ’₯ With several years of experience in physical security audits, Sylvain Hajri, CEO of Epieos, shared his expertise during his interview on #Underscore_ , the leading French #IT and #hacking talk show hosted by #Micode.

    Watch the full video here ( πŸ‡¨πŸ‡΅ and πŸ‡ΊπŸ‡² versions available):
    πŸ‘‰ youtube.com/watch?v=L7dnmHnJbw\_channel=Underscore\_

    πŸ₯· This video, it’s an excellent way for #pentesters and #cybersecurity professionals to educate those around them, both individuals and organizations, about what #redteams are and how they operate.

  2. 😱 In just one week, over 500,000 people learned how to use #OSINT to prepare for physical #intrusions!

    ⛓️‍πŸ’₯ With several years of experience in physical security audits, Sylvain Hajri, CEO of Epieos, shared his expertise during his interview on #Underscore_ , the leading French #IT and #hacking talk show hosted by #Micode.

    Watch the full video here ( πŸ‡¨πŸ‡΅ and πŸ‡ΊπŸ‡² versions available):
    πŸ‘‰ youtube.com/watch?v=L7dnmHnJbw\_channel=Underscore\_

    πŸ₯· This video, it’s an excellent way for #pentesters and #cybersecurity professionals to educate those around them, both individuals and organizations, about what #redteams are and how they operate.

  3. 😱 In just one week, over 500,000 people learned how to use #OSINT to prepare for physical #intrusions!

    ⛓️‍πŸ’₯ With several years of experience in physical security audits, Sylvain Hajri, CEO of Epieos, shared his expertise during his interview on #Underscore_ , the leading French #IT and #hacking talk show hosted by #Micode.

    Watch the full video here ( πŸ‡¨πŸ‡΅ and πŸ‡ΊπŸ‡² versions available):
    πŸ‘‰ youtube.com/watch?v=L7dnmHnJbw\_channel=Underscore\_

    πŸ₯· This video, it’s an excellent way for #pentesters and #cybersecurity professionals to educate those around them, both individuals and organizations, about what #redteams are and how they operate.

  4. 😱 In just one week, over 500,000 people learned how to use #OSINT to prepare for physical #intrusions!

    ⛓️‍πŸ’₯ With several years of experience in physical security audits, Sylvain Hajri, CEO of Epieos, shared his expertise during his interview on #Underscore_ , the leading French #IT and #hacking talk show hosted by #Micode.

    Watch the full video here ( πŸ‡¨πŸ‡΅ and πŸ‡ΊπŸ‡² versions available):
    πŸ‘‰ youtube.com/watch?v=L7dnmHnJbw\_channel=Underscore\_

    πŸ₯· This video, it’s an excellent way for #pentesters and #cybersecurity professionals to educate those around them, both individuals and organizations, about what #redteams are and how they operate.

  5. 😱 In just one week, over 500,000 people learned how to use #OSINT to prepare for physical #intrusions!

    ⛓️‍πŸ’₯ With several years of experience in physical security audits, Sylvain Hajri, CEO of Epieos, shared his expertise during his interview on #Underscore_ , the leading French #IT and #hacking talk show hosted by #Micode.

    Watch the full video here ( πŸ‡¨πŸ‡΅ and πŸ‡ΊπŸ‡² versions available):
    πŸ‘‰ youtube.com/watch?v=L7dnmHnJbw\_channel=Underscore\_

    πŸ₯· This video, it’s an excellent way for #pentesters and #cybersecurity professionals to educate those around them, both individuals and organizations, about what #redteams are and how they operate.

  6. #Hacking is not just #OldSchool tooling and techniques. Modern #MobileApps are a fun target for #ReverseEngineers and #Pentesters alike. A fundamental tool to properly hack mobile apps is @fridadotre by @oleavr.

    We continue our tour of my @github projects with my humble contributions to this field:
    github.com/0xdea/frida-scripts

    For a well-maintained project that includes some of my #Frida scripts, check out #Brida by @apps3c and Piergiovanni Cipolloni:
    github.com/federicodotta/Brida

    And even after many years, if you search for well-crafted Frida scripts to bypass certificate pinning or root detection, there’s a very good chance that you’ll stumble upon the work of some of my colleagues… Very proud of my team at @hnsec!