Discover and read the best of Twitter Threads about #100daysofhacking

Most recents (11)

🐍Python is easy!

You can learn enough #Python in 8-10 hours to pick the rest up with active practice.

Here are my top 5 #free places to catch the basics:

🧵👇
1/ Codeacademy (where I first learnt Python) -
lnkd.in/eZnqKD_x
2/ MITx 6.0001 (this series is a brilliant intro to CS) -
lnkd.in/eeBXsQqr
Read 7 tweets
In this Mega thread, you will find 10 FREE online courses with a certificate of completion from :

1 - ISC ²
2 - Cisco Academy
3 - Fortinet
4 - EC-Council
5 - AWS

#CyberSecurity #Cisco #AWS #dfir #infosec #infosecurity #threats #Python #100DaysOfHacking
1⃣ Free Cybersecurity Training

- Information Security Awareness
- The Evolution of Cybersecurity
- NSE 2 Cloud Security
- NSE 2 Endpoint Security
- NSE 2 Threat Intelligence
- NSE 2 Security Information & Event Management
- Security Operations &
🖇️
training.fortinet.com
2⃣ Introduction to Dark Web, Anonymity, and Cryptocurrency

Learn to access Dark Web, and Tor Browser and know about Bitcoin cryptocurrency

🖇️
codered.eccouncil.org/course/introdu…
Read 12 tweets
Hacking APIs: You need to learn this in 2022!

Checkout these FREE resources 🧵

#hacking #infosec #Python #100daysofcoding #100DaysOfHacking #API #learning #informationsecurity #web3 #API3 #coding #Linux
#CyberSecurity
How to Hack API in 60 minutes

🖇️
wallarm.com/what/how-to-ha…
A collection of awesome API Security tools and resources. The focus goes to open-source tools and resources that benefit the community.

🖇️
github.com/arainho/awesom…
Read 9 tweets
Hey #OSINT #100daysofcodingchallenge #100DaysOfHacking #CodeNewbie

Code Search Engines are dedicated search engines for finding source codes on the Internet.

Here's an awesome list of 22 'Code search engines' for digital investigators, hackers, programmers & all.

A thread🧵
1. Android Code Search - cs.android.com

2. Chromium Code Search - source.chromium.org/chromium

3. Ember Observer: Code
Search - emberobserver.com/code-search

4. CodeSeek - codeseek.co

5. Codota - codota.com/code

#OSINT #cybersecurity #100daysofcodechallenge
6. Debian Code Search - codesearch.debian.net

7. Google Code Search - code.google.com

8. krugle - krugle.com

9. JExample - jexamples.com

10. Libraries - libraries.io

#OSINT #programmer #100DaysOfCode #100daysofcodechallenge
Read 7 tweets
🔰 MS Ninja Trainings 🔰
Azure Network Security: techcommunity.microsoft.com/t5/azure-netwo…

Microsoft 365 Advanced eDiscovery: techcommunity.microsoft.com/t5/security-co…

Microsoft 365 Defender: techcommunity.microsoft.com/t5/microsoft-3…

Microsoft Defender for Cloud: techcommunity.microsoft.com/t5/microsoft-d…

#100DaysOfHacking #learning #infosec
Microsoft Defender for Cloud Apps: techcommunity.microsoft.com/t5/security-co…

Microsoft Defender for Endpoint: techcommunity.microsoft.com/t5/microsoft-d…

Microsoft Defender for Identity: techcommunity.microsoft.com/t5/security-co…

Microsoft Defender for IoT: techcommunity.microsoft.com/t5/microsoft-d…
Microsoft Defender for Office 365: techcommunity.microsoft.com/t5/microsoft-d…

Microsoft Purview Insider Risk Management: techcommunity.microsoft.com/t5/security-co…

Microsoft Sentinel: techcommunity.microsoft.com/t5/microsoft-s…

Microsoft Sentinel Notebooks: techcommunity.microsoft.com/t5/microsoft-s…
Read 3 tweets
Continue...

Bug Bounty Checklist for Web App - Part - 2

Risky Functionality - File Uploads:
- Test that acceptable file types are whitelisted
- Test that file size limits, upload frequency and total file counts are defined and are enforced
- Test that file contents match the defined file type
- Test that all file uploads have Anti-Virus scanning in-place.
- Test that unsafe filenames are sanitised
- Test that uploaded files are not directly accessible within the web root
- Test that uploaded files are not served on the same hostname/port
- Test that files and other media are integrated with the authentication and authorisation schemas
Read 7 tweets
A short Thread about Online Password Security.

More than 80% of the global population have at least two online passwords and more than 80% of that 80% use insecure passwords or simply reuse a single password for multiple websites/apps.

#BlackTechTwitter #100DaysOfHacking #Web3
That’s a problem in this age of modern cybercrime: The theft/exposure of one password could open you up to cascade of account breaches leading to data, identity, and financial losses.

#BlackTechTwitter #100DaysOfHacking #Web3
Talk to a cybersecurity pro about passwords, and they’ll tell you two things: Every password should be unique (You can hardly achieve that) and secure (The more secure it is, the higher the chance you will forget them).

#BlackTechTwitter #100DaysOfHacking #Web3 #CyberSecurity
Read 5 tweets
Golden Tips + Resources To get Job/Internships + For self Development

Only these Best Resources you need to start 📈
Opensource, Web Development, Programming, DevOps and all Cyber Security Resources Included ⬇
🧵🔥
[ Open-source ]
Open Source Plays Important role in Self Development + in Job/Internships resume.

What is Open Source & How to Start?
by @kunalstwt

25+ Paid Open Source Programs and Internships
by @kunalstwt
Best Open Source Guidance Channel + My Fav Channel On youtube

youtube.com/c/eddiejaoude/… by @eddiejaoude

Website: eddiehub.org
Read 27 tweets
- #100DaysOfHacking with
- 📒Notes (included in the last).
- Day - 4
- Viewing Creating Editing Files.
1. print the "hello"
┌──(root💀kali)-[~/twt]
└─ echo "hello"
>> hello
2. Save "hello" into the files
┌──(root💀kali)-[~/twt]
└─ echo "hey" > hey.txt

┌──(root💀kali)-[~/twt]
└─ cat hey.txt
Read 7 tweets
- #100DaysOfHacking with
- 📒 Notes (included in the last).
- Day - 3 (must checkout)
- 2. File Permission-modifications (in detail). ⬇
File permissions can be viewed using the `ls` command.
Here is an example:

┌──(root💀kali)-[~/twt]
└─ # ls -l filename.txt Image
The write, read, and execute permissions have the following number value: Image
Read 6 tweets
- #100DaysOfHacking with 📒Notes (included in the end).
- Day - 3
- 1. Users and Privileges. ⬇
~# ls -la
List for checking permissions ⬇ Image
`d` - directory
`-` - file Image
Read 10 tweets

Related hashtags

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3.00/month or $30.00/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!