- ๐ฅ Looking for Entry-level roles in Cybersecurity or IT
- โ๏ธ I'm ISC2 Certified in Cybersecurity
- ๐ฏ Iโm looking to collaborate on open-source projects
- โก Fun fact: I'm an avid FiFa & Call of Duty gamer ๐คฃ
- Unmasking Cyber Threats An Offensive Security Approach for Nigerian Businesses: Demonstrated and explained how limit overrun race condition can be exploited in web applications in the fintech space in Nigeria.
- Fehris : built the notification service with Aly Hassan
- Pentest Resources
- Python 3 Pentesting Tools
- Telstra Cybersecurity Virtual Experience Program
- Active Directory Explained: Part 3 โ Kerberos Authentication Protocol
- Steganography: Hiding Messages in Plain Sight
- Social Engineering #2: Recognizing and Defending against common Phishing attacks
- Social Engineering #1: The Sneaky Tactics Targeting Everyday People
- OSI Model
- Hack Your Way into Cybersecurity
- Mastering Active Directory Part 2
- Mastering Active Directory Part 1
โก๏ธ more blog posts...