Open in app

Sign In

Write

Sign In

RoddyT3ch
RoddyT3ch

101 Followers

Home

About

Published in System Weakness

·Pinned

Advanced Searching with Google Dorking

What is Google Dorking? “Google Dorking,” also known as “Google hacking” is an advanced search query technique used by newsrooms, investigative organizations, security researchers as well as BlackHats to query the google search engine. …

Cybersecurity

6 min read

Advanced Searching with Google Dorking
Advanced Searching with Google Dorking
Cybersecurity

6 min read


Pinned

What is OSINT?(Part 1): A practical introduction!🕵️

I assume you’re here because you are a curious individual like ourselves who wants to know more about Open Source Intelligence (OSINT). In this article, I will explain some common, beginner-friendly use cases for OSINT practice, and the techniques and methodology behind them. While I put a little challenge for…

Osint

20 min read

What is OSINT?(Part 1): A practical introduction!🕵️
What is OSINT?(Part 1): A practical introduction!🕵️
Osint

20 min read


Pinned

How to uncover the identity of an unknown Email Address: OSINT🔍

When encountering an unknown Email address it may seem like a dauting task to reveal the identity/owner of said email but in reality it can be a simple task to complete. As they are many simple tricks/techniques. That will help unmasked the owner of your mysterious email account. So let…

Osint

5 min read

How to uncover the identity of an unknown Email Address: OSINT🔍
How to uncover the identity of an unknown Email Address: OSINT🔍
Osint

5 min read


Pinned

What is OSINT(Part 2): Dangers of Oversharing

After The introduction to basic OSINT tools and techniques, you know how easy it is to get information about someone or something on the Internet, and how your social media activity can be weaponized by malicious actors. …

Social Media

10 min read

What is OSINT(Part 2): Dangers of Oversharing
What is OSINT(Part 2): Dangers of Oversharing
Social Media

10 min read


Published in System Weakness

·Dec 4, 2022

| Useful Browser Extensions for OSINT Practitioners |

While modern browsers are robust and provide a lot of functionality, they can be unlocked to do some pretty spectacular things with the right browser extensions. These tools can be used to defeat online tracking, elevate your investigation workflow, and also allow you to search through the internet for clues…

Cybersecurity

9 min read

| Useful Browser Extensions for OSINT Practitioners |
| Useful Browser Extensions for OSINT Practitioners |
Cybersecurity

9 min read


Aug 20, 2022

Essential Security Awareness Training Topics for any Organization 🐱‍💻🏢

One question that you might ask yourself, what are the essential security awareness training topics that you need to know for 2022? In this article, I will discuss Some Essential Security Awareness training topics for any Organization even yours. Let’s jump right into it! Phishing Attacks

Cybersecurity

7 min read

Essential Security Awareness Training Topics for any Organization 🐱‍💻🏢
Essential Security Awareness Training Topics for any Organization 🐱‍💻🏢
Cybersecurity

7 min read


Feb 18, 2022

OSINT: How To Extract Text From an Image or Video

Did every wonder what a piece of foreign text means on a sign, banner, or in a video. Sure you can type it into google translate or speak the language. But what can you do if you don’t know the language? And also what can you do if the language…

Ocr

4 min read

OSINT: How To Extract Text From an Image or Video
OSINT: How To Extract Text From an Image or Video
Ocr

4 min read


Published in System Weakness

·Jan 26, 2022

OWASP Top 10: Injection — What are they? And how to prevent them!

What is an Injection? How is it Related to OWASP? Injection is a type of cyberattack type that transmits data to change the way commands are interpreted in the system. During an injection, an attacker will transmit malicious data to an interpreter. Most sources of data can be used for injection, including environment variables, parameters, web services, user types, etc. …

Owasp Top 10

5 min read

OWASP Top 10: Injection — What are they? And how to prevent them!
OWASP Top 10: Injection — What are they? And how to prevent them!
Owasp Top 10

5 min read


Jan 20, 2022

Introduction to SIEM and SOAR

SOC analyst might receive thousands of alerts every minute, from numerous different network and appliances and across many protocols and activity types. Handling all this by yourselves is impossible for any human, but we can use a centralized repository to manage all this. Security Information and Event management (SIEM) is…

Cybersecurity

7 min read

Introduction to SIEM and SOAR
Introduction to SIEM and SOAR
Cybersecurity

7 min read


Published in System Weakness

·Dec 23, 2021

A Short Introduction to Firewalls:

Introduction: In the broadest sense, firewall is a mechanism that allows you to govern the traffic that goes through it, thereby allow you to dictate what what kind of traffic is allowed, or denied between firewalled infrastructure such as your computer and the outer network. To ensure that it’s working effectively…

Technology

7 min read

A Short Introduction to Firewalls:
A Short Introduction to Firewalls:
Technology

7 min read

RoddyT3ch

RoddyT3ch

101 Followers

Cybersecurity Professional and OSINT & Tech Enthusiast

Following
  • InfoSecSherpa

    InfoSecSherpa

  • Tom Jarvis

    Tom Jarvis

  • David G

    David G

  • CyberGuy

    CyberGuy

  • @DFRLab

    @DFRLab

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech