CtPrecious Profile Banner
Tech Enthusiast Profile
Tech Enthusiast

@CtPrecious

Followers
13K
Following
14
Statuses
9K

OSINT Enthusiast | Security Analyst | Writer | Philomath | Partner - @Anyrun_app | @TheCyberJob_Hub | https://t.co/px16Z3zM1W

The Cyber World
Joined March 2022
Don't wanna be here? Send us removal request.
@CtPrecious
Tech Enthusiast
5 months
Here is an excellent opportunity for you to establish a successful career in Cybersecurity through personalized mentorship designed to fit your schedule. This well-tailored mentorship is designed to give you the ideal foundation required to ignite great career success!
Tweet media one
Tweet media two
Tweet media three
14
43
178
@CtPrecious
Tech Enthusiast
13 hours
@daveedtimi @Cyblackorg @ireteeh @CiscoNetAcad @allenharper @roodmurat @KevTechSupport Big congratulations to you, brother. All the best. 🎉🙏🏾
1
0
2
@CtPrecious
Tech Enthusiast
14 hours
@ToniTheMaker Ideally, I used Forensically for my metadata extraction.
0
0
0
@CtPrecious
Tech Enthusiast
22 hours
A clear illustration is below: Make: Apple Model: iPhone XS Max DateTime: 2022:01:23 And much more information in line! You can also achieve this using a command line in your Kali machine: "exiftool -FileName test. jpg"
Tweet media one
Tweet media two
Tweet media three
0
0
0
@CtPrecious
Tech Enthusiast
1 day
Check out this comprehensive "Open Source Intelligence" tools by @nixintel. #CyberSecurity #OSINT
0
2
14
@CtPrecious
Tech Enthusiast
2 days
@Ahmed___khaan @Cyblackorg @SecurityTrybe @tosinraj @IamTheCyberChef This is beautiful @Ahmed___khaan. Keep it up. Rooting for you, big!! 🎉🙏🏾
1
0
3
@CtPrecious
Tech Enthusiast
2 days
@sAintNagat All the best, Sir. 🙏🏾
0
0
1
@CtPrecious
Tech Enthusiast
2 days
@vicky_uiux Hi Vicky, check out some of your X footprints:
Tweet media one
1
0
2
@CtPrecious
Tech Enthusiast
2 days
@sAintNagat Yeah. I had the same problem from the onset! But with constant practice comes my mastery! Such is applicable to all areas of life. Keep pushing!
1
1
1
@CtPrecious
Tech Enthusiast
2 days
@ManuelBot59 Hi @ManuelBot59 - this is very beautiful.
0
0
1
@CtPrecious
Tech Enthusiast
2 days
Site - search operator is very powerful! You can use this to focus your search on your POI and access information about them; the same with websites - index pages within their domain. A look at my X footprint - ranging from my past and present posts. An illustration:
@CtPrecious
Tech Enthusiast
2 days
GOOGLE DORKING - Investigator Cheat Sheet Knowledge of Google Dorking is very important in cybersecurity especially in the offensive side of it. Save this piece and practice its usage. #Cybersecurity
Tweet media one
Tweet media two
Tweet media three
Tweet media four
0
0
3
@CtPrecious
Tech Enthusiast
2 days
@DiyaCodes Same with my HP laptop. Once full, I can use it for a maximum of 6 to 7 hours a day.
0
0
1
@CtPrecious
Tech Enthusiast
2 days
You can have the soft copy ( PDF ) of this piece by following the link below:
Tweet media one
0
1
1
@CtPrecious
Tech Enthusiast
2 days
@Hackanji_ @LearningatCisco @credly @ireteeh @BowTiedCyber @OnijeC @seg Big congratulations to you, Sir. Keep it up! Proud of you. 🎉🙏🏾
1
0
1
@CtPrecious
Tech Enthusiast
2 days
@real_nuelOj @nixintel @nixintel - did a great job. It was well-detailed and easy to comprehend.
1
0
1
@CtPrecious
Tech Enthusiast
2 days
Summary - Each cybersecurity job is unique, so it's important to customize your resume for each application. Look for key skills and requirements in the job description and make sure to highlight those on your resume.
0
0
1