Claim 35 Post Templates from the 7 best LinkedIn Influencers

Get Free Post Templates
Gabrielle B.

Gabrielle B.

These are the best posts from Gabrielle B..

3 viral posts with 3,390 likes, 124 comments, and 774 shares.
3 image posts, 0 carousel posts, 0 video posts, 0 text posts.

๐Ÿ‘‰ Go deeper on Gabrielle B.'s LinkedIn with the ContentIn Chrome extension ๐Ÿ‘ˆ

Best Posts by Gabrielle B. on LinkedIn

[๐…๐‘๐„๐„ ๐‘๐„๐’๐Ž๐”๐‘๐‚๐„๐’ - ๐๐”๐† ๐๐Ž๐”๐๐“๐˜]

Want to get into Bug Bounty? Here is a list of resources

๐Ÿ‘‰ A great introduction on how to get into bug bounty by Katie Paxton-Fear
https://lnkd.in/eEf6b5AN

๐Ÿ‘‰ A list of bug bounty platforms by Bughacking
https://lnkd.in/eQk9jk7M

๐Ÿ‘‰ A list of bug bounty programs by vpnmentor:
https://lnkd.in/eECUuYgp

๐Ÿ‘‰ Want to apply to theย Synack Red Teamย Artemis program?
An exclusive community open to security professionals who identify as women, trans and nonbinary people, and others who identify as a gender minority. See this link:
https://lnkd.in/eD_XDm4j

๐Ÿ‘‰ Farah Hawa has a great video about bug bounty resources:
https://lnkd.in/ea-Nn2KB

๐Ÿ‘‰ The Bug Hunter Handbook by Gowthams
https://lnkd.in/eW6awYWU

๐Ÿ‘‰ A repo โ€œAllAboutBugBountyโ€ by daffainfo
https://lnkd.in/evPuwGKZ

๐Ÿšจ๐Ÿšจ ๐’๐‡๐€๐‘๐„ - Do you know other resources? Please share them in the comment๐Ÿšจ๐Ÿšจ

โžก๏ธ ๐…๐Ž๐‹๐‹๐Ž๐– ๐Œ๐„ on github for more pentest tips:ย https://github.com/CSbyGBย โฌ…๏ธ

โš ๏ธDisclaimers:ย 
*1 This is provided for educational and informational purpose only
*2 Please note that the term โ€œpentestingโ€œ (or โ€œhacking,โ€œ โ€œbug bounty,โ€œ โ€œred teaming,โ€œ etc.) is used in a legal context as a type of intrusion test to identify vulnerabilities and improve security measures. It is not intended for malicious purposes but rather for the greater good of enhancing cybersecurity.โš ๏ธ

#cybersecurityย #cybersรฉcuritรฉย #bugbounty
Post image by Gabrielle B.
[๐…๐‘๐„๐„ ๐‘๐„๐’๐Ž๐”๐‘๐‚๐„๐’ - ๐’๐„๐‚๐”๐‘๐„ ๐‚๐Ž๐ƒ๐„ ๐‘๐„๐•๐ˆ๐„๐–]

For any pentest methodologies, it is always useful to know about code.
Furthermore, for white box pentest, you will need to do secure code review and be able to find vulnerabilities by reading the code.
Want to know more about this subject?
This post is for you.

๐Ÿ‘‰ ๐—ช๐—ต๐—ฎ๐˜ ๐—ถ๐˜€ ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ฒ ๐—ฐ๐—ผ๐—ฑ๐—ฒ ๐—ฟ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„?
๐ŸŒŸ How to Identify Vulnerabilities in code โ€“ Manual Code Review on Hackingloops
https://lnkd.in/eGdQrB_Q

๐ŸŒŸ Security Code Review 101 by Paul Ionescu:
https://lnkd.in/en6gKsfJ

๐ŸŒŸย OWASPยฎ Foundationย Secure Coding Practice
https://lnkd.in/eEAA7Jcf

๐Ÿ‘‰ ๐—œ๐—ป๐˜๐—ฟ๐—ผ๐—ฑ๐˜‚๐—ฐ๐˜๐—ถ๐—ผ๐—ป ๐˜๐—ผ ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ฒ ๐—ฐ๐—ผ๐—ฑ๐—ฒ ๐—ฟ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„
๐ŸŒŸ Farah Hawaโ€™s post about the subject:
https://lnkd.in/eE_zZqdx

๐ŸŒŸ Introduction to Secure Code Review onย PentesterLab:ย 
https://lnkd.in/gXjm_MbJ

๐ŸŒŸ Freddy Machoโ€™s Code review checklist
https://lnkd.in/e2vcqR4M

๐ŸŒŸ Check out the dedicated section on Secure Code Review on my pentips
https://lnkd.in/ehp4M9rp

๐Ÿ‘‰ ๐—ฃ๐—ฟ๐—ฎ๐—ฐ๐˜๐—ถ๐—ฐ๐—ฒ ๐—ฎ๐—ป๐—ฑ ๐˜€๐—ต๐—ฎ๐—ฟ๐—ฝ๐—ฒ๐—ป ๐˜†๐—ผ๐˜‚๐—ฟ ๐—ฟ๐—ฒ๐˜ƒ๐—ถ๐—ฒ๐˜„๐—ฒ๐—ฟ ๐˜€๐—ธ๐—ถ๐—น๐—น๐˜€
๐ŸŒŸ Security training platform for devs Hacksplaining:
https://lnkd.in/gqrXr544

๐ŸŒŸ Join the We Hack Purple Community to talk about secure code practice and more
https://lnkd.in/e2FCKTx5

๐Ÿ‘‰ ๐—ง๐—ผ๐—ผ๐—น๐˜€
๐ŸŒŸ ย Code Review and Static Code Analysis onย We Hack Purple
https://lnkd.in/er3qnSd7

๐ŸŒŸ Code Review tools on HackTricks
https://lnkd.in/e93pWfni

๐ŸŒŸ Awesome DevSecOps by TaptuIT
https://lnkd.in/eWSpZWN6

๐Ÿšจ๐Ÿšจ ๐’๐‡๐€๐‘๐„ - Do you know other resources? Please share them in the comment๐Ÿšจ๐Ÿšจ

โžก๏ธ ๐…๐Ž๐‹๐‹๐Ž๐– ๐Œ๐„ on github for more pentest tips:ย https://github.com/CSbyGBย โฌ…๏ธ

โš ๏ธDisclaimers:ย 
*1 This is provided for educational and informational purpose only
*2 Please note that the term โ€œpentestingโ€œ (or โ€œhacking,โ€œ โ€œbug bounty,โ€œ โ€œred teaming,โ€œ etc.) is used in a legal context as a type of intrusion test to identify vulnerabilities and improve security measures. It is not intended for malicious purposes but rather for the greater good of enhancing cybersecurity.โš ๏ธ

#cybersecurityย #cybersรฉcuritรฉย #pentest
Post image by Gabrielle B.
[๐—™๐—ฅ๐—˜๐—˜ ๐—ฅ๐—˜๐—ฆ๐—ข๐—จ๐—ฅ๐—–๐—˜๐—ฆ - ๐—ฃ๐—˜๐—ก๐—ง๐—˜๐—ฆ๐—ง ๐—ง๐—ข๐—ข๐—Ÿ๐—ฆ]

There are many different tools for each phase of a pentest. But how to choose?
These resources can help you:

๐Ÿ‘‰ See Rajneesh G.โ€™s post about some of the Practical web Pentesting tools. He even shared them according to the pentest steps:
https://lnkd.in/ei7R8gsx
๐Ÿšจ Follow Rajneesh he offers amazing content ๐Ÿšจ

๐Ÿ‘‰ You know the Nmap project? Well they have a list of the top 125 Network Security Tools:
https://sectools.org/

๐Ÿ‘‰ You want Open Source?
๐ŸŒŸDrew Robb shared a Top 24 on eSecurity Planet:
https://lnkd.in/ezNgTvfF

๐ŸŒŸAnd SANS has a list of tools including plenty of pentest tools:ย 
https://lnkd.in/eHmusQYg

๐Ÿ‘‰ Finally arch3rPro has an amazing amount of tools listed on github:
https://lnkd.in/eA988c_k

๐’๐‡๐€๐‘๐„ - Do you know other resources? Please share them in the comment

โžก๏ธ ๐…๐Ž๐‹๐‹๐Ž๐– ๐Œ๐„ on github for more pentest tips:ย https://github.com/CSbyGBย โฌ…๏ธ

โš ๏ธDisclaimers:ย 
*1 This is provided for educational and informational purpose only
*2 Please note that the term โ€œpentestingโ€œ (or โ€œhacking,โ€œ โ€œbug bounty,โ€œ โ€œred teaming,โ€œ etc.) is used in a legal context as a type of intrusion test to identify vulnerabilities and improve security measures. It is not intended for malicious purposes but rather for the greater good of enhancing cybersecurity.โš ๏ธ

#cybersecurityย #cybersรฉcuritรฉย #pentest
Post image by Gabrielle B.

Related Influencers