Pwn & Security Research 🔍 🏗️ Hunting threats in the wild⚡ Opinions are solely mine
Mar 31 • 6 tweets • 2 min read
If you, like many, think relying just on `cat` command's output is enough to be sure about the integrity of a bash file. Think twice, you could get hacked. Read below 👇
(2/n) Reading the file using `cat` seems fine, right? Definitely, nothing suspicious there, right?
Jul 9, 2023 • 9 tweets • 1 min read
Foundational roadmap for Cyber Threat Intelligence (CTI) 🧵👇
1/n: Start with learning the basic concepts of cybersecurity such as types of cyber attacks, malware, phishing, social engineering, etc. This will give you a foundation to build upon.
Apr 26, 2022 • 34 tweets • 9 min read
A thread of some of the most common, yet effective Solidity Gas Optimization Tips (taken from various sources) 🧵👇
1- Use of Bit shift operators
Feb 19, 2022 • 20 tweets • 6 min read
A thread 🧵 on DNS misconfigurations/resources/articles/tools 👇