Jump to content

TheHermit

Active Members
  • Posts

    35
  • Joined

  • Last visited

  • Days Won

    3

Contact Methods

  • Website URL
    https://techanarchy.net
  • ICQ
    0

Profile Information

  • Gender
    Male
  • Location
    https://ducktoolkit.com
  • Interests
    CyberSec, Electronics, PenTesting, DFIR, Malware

Recent Profile Visitors

4,653 profile views

TheHermit's Achievements

Newbie

Newbie (1/14)

  1. @andrewcottrell @immersivelabsuk Just completed it myself with no issues. Can you email me support@immersivelabs.co… https://t.co/h8ENrjRYhJ

  2. RT @immersivelabsuk: #FridayFour @immersivelabsuk Fridays Labs are now live covering #FileCarving #Powershell #PEDA #Exploits #DFIR #Linux…

  3. @verovaleros @sudosev @James_inthe_box @JAMESWT_MHT @malwrhunterteam @Jan0fficial Don't recognise but talking a closer look at it now

  4. @ClareOnTheRun @lyndonwatkins @immersivelabsuk Glad you are liking it. We have a new round of labs on exploit devel… https://t.co/rYdEDef7uT

  5. RT @ClareOnTheRun: Rather chuffed to have got the Bug Hunter badge from @immersivelabsuk #cybersecurity :D https://t.co/rsIUuAkePx

  6. Test your technical skill in our live labs and unlock jobs to join the immersive labs team. https://t.co/ZrT1tkBepO

  7. RT @immersivelabsuk: #FridayFour @immersivelabsuk Fridays Labs are now live covering #OSINT #twitter #Hydra #bruteforce #informationassura…

  8. . @immersivelabsuk are in the running for the #peopleschoice award with #pitchatpalace and our new #veterans academ… https://t.co/w1YQD8KAdl

  9. RT @immersivelabsuk: #FridayFour @immersivelabsuk Fridays Labs are now live covering #maldoc #sift #passthehash #mimikatz #pentest #dfir #…

  10. @phr33fall @immersivelabsuk we are also looking for people to help build it and create new labs.

  11. @SANSEMEA That's the wrong team photo #awks

  12. Another set of labs this friday for #immersivelabs #fridayfour #freeforstudents https://t.co/aCH2lTrFJr

  13. @HECFBlog I moved from dfir team lead to a startup delivering cyber training. I wouldn't choose to go back from dfi… https://t.co/tEEWaDW18g

  14. @wxs @Mao_Ware @spontiroli @bartblaze Used this to great affect. Also use the same technique to extract user_strings from a .NET Binary

  15. @wxs Awesome thanks I was playing with yara but couldn't figure out how to get the offset. This makes sense now i s… https://t.co/qz5DZ3Ziyc

×
×
  • Create New...