๐Briefing
Linux & OSINT
What do the hackers in the movies type into their computers?
If you looked, what could you find online?
Bonus: Social Engineering
๐Case 2: Vulnerable PeopleLast updated