Soon == 4 years
I am delighted to announce that I have become a Google Developer Expert for Google Cloud.
I am genuinely excited about the awesome community contributions that I will be making in the future 😁.
Over 70% of asset value remains untapped by DeFi across all chains.
Imagine the endless passive income possibilities you can unlock by joining a DeFi ecosystem.
We aim to grow the DeFi ecosystem in Africa through free/paid bootcamps, courses and guides
Follow for more updates
Red teamers: Early on in my offensive security career, I relied heavily on popular C2 frameworks like Metasploit, PowerShell Empire, Cobalt Strike, etc. during my engagements. I’m sure this is probably fairly common for many of us in this space. However, somewhere along the way, it began to bother me that I didn’t really understand how C2 frameworks worked “under the hood”. So, I set out to address that. For better or worse, I decided that the solution to the problem was to write my own (very basic) C2 framework. I didn’t do this because I felt that the community needed yet another C2 framework (it doesn’t, and it definitely doesn’t need mine). I did it so that I could better understand key, foundational C2 concepts and improve my own personal red team tradecraft. The process of designing and coding a simple C2 framework actually helped me more than I had planned, and I wish I had done it sooner.
Takeaway: if you are in the offensive security space and using OSTs created by others, I would highly encourage you to carve out time to learn how these tools work under the hood. I can promise you that you will learn a lot by doing this.
If you want to check out my C2 framework or use it has a starting point for developing your own, please feel free. You can find the "Most Average C2 Ever" on GitHub, here: github.com/nickvangilder/…. If I can do it, you can do it. (And yes, I'm a terrible coder, but it works!)
#KBTC23 was a huge success! 🙏🏾
A heartfelt thank you to our incredible sponsors, partners, organizers, volunteers, hosts, and outstanding participants.
Your feedback made us better this year. Let's keep pushing innovation! 💡👏🏽
#innovateNow
Are you interested in freelancing in cybersecurity and automation services?
I'm on the lookout for people who are interested in freelancing in Cybersecurity &/OR Automation of business processes within the IT industry with training starting immediately.
If this sounds like you, please get in touch with me!
#cybersecurity#freelancing#freelancer#automation#ai#workfromanywhere
Who needs a 0-click when you have MITM? ✨ Working with @billmarczak & @citizenlab we discovered 3 iOS and 1 Chrome 0-day from Intellexa, used to install Predator spyware in Egypt 🇪🇬
blog.google/threat-analysi…
0-days exploited by #Predator spyware were delivered via man-in-the-middle (MITM) attack and 0-click vulnerability against #iOS and #Android
In the video below, I demonstrated how an attacker - using just smartphone - can trigger DNS spoofing attack to redirect device on the same wi-fi network to attacker controlled website. Such domain could deliver phishing or 0-day as in the case of Predator's browser exploit
blog.google/threat-analysi…
Attention all #cybersecurity professionals and enthusiasts!
Join us for an exciting webinar on "Bug Reporting for Responsible Disclosure: A Guide to Ethical Hacking and Vulnerability Disclosure."
In this webinar, we will explore the importance of bug reporting for responsible
Very happy to see the Qakbot malware knocked offline! Also happy to be able to assist the @FBI by making the data searchable in @haveibeenpwned, here's the full story: troyhunt.com/data-from-the-…
4 Distinctions and 19 College Prizes later, including:
⁃Preclinicals
⁃Pathology
⁃O & G
⁃Paediatrics
⁃Surgery &
⁃Community Health
Allow me to reintroduce myself, Dr. Muritala A.O
MB;BS Hons (Ilorin)
Best Graduating Student, Unilorin Medical Class of 2021.