Forrest KaslerinPosts By SpecterOps Team MembersDrink Like a PhishHow to Make Your Phishing Sites Blend In2d ago
Christina LekatiOSINT Techniques for Sensitive Documents That Have Escaped Into The Clear WebI have been working full-time in this industry for about 8 years. Part of my work involves conducting vulnerability assessments for…Mar 6
Akshay WaghmareinNyblesExploring Android Hacking with Metasploit FrameworkIn today’s digital age, where smartphones have become an integral part of our lives, ensuring the security of mobile devices is paramount…Apr 161Apr 161
Maria Writes 📝Shoulder Surfing and Insider Threats👀💼Ever pondered the real impact of shoulder surfing on security?1d ago1d ago
Forrest KaslerinPosts By SpecterOps Team MembersDrink Like a PhishHow to Make Your Phishing Sites Blend In2d ago
Christina LekatiOSINT Techniques for Sensitive Documents That Have Escaped Into The Clear WebI have been working full-time in this industry for about 8 years. Part of my work involves conducting vulnerability assessments for…Mar 6
Akshay WaghmareinNyblesExploring Android Hacking with Metasploit FrameworkIn today’s digital age, where smartphones have become an integral part of our lives, ensuring the security of mobile devices is paramount…Apr 161
Maria Writes 📝Shoulder Surfing and Insider Threats👀💼Ever pondered the real impact of shoulder surfing on security?1d ago
Aviv YanivinCourisity is a DrugWalkthrough Solutions for Gandalf AIGandalf AI is a chatbot game where you want to get the secret key from a wizard bot while he knows he should keep it secret🧙♂️🤫Aug 5, 20231
Christina LekatiCorporate OSINT for Social Engineering: Physical SecurityThere are many reasons why a threat actor may want to access an organization’s premises. They most usually boil down to installing…Oct 11, 20233