Nana Sei Anyemedu (@redhatpentester) 's Twitter Profile
Nana Sei Anyemedu

@redhatpentester

Black Excellence | Amanfo) | Penetration Testing | Digital Forensics & Incidence Response| Offensive Security | Security Researcher | Man Unitedโค

ID: 1347880806082097153

calendar_today09-01-2021 12:20:12

10,10K Tweet

24,24K Followers

538 Following

Nana Sei Anyemedu (@redhatpentester) 's Twitter Profile Photo

One of the most concerning aspects of radio hacking or radio pentesting is the ability to intercept and decode communications. GSM encryption, despite its intended security measures, has been compromised through various means. This intelligence power was only limited to Law

24 (@twenty4_io) 's Twitter Profile Photo

Just like yesterday, I put together this #Cybersecurity Study Jam which was filled with a lot of enthusiasts and professionals in the field to share knowledge and experience. Capacity development is never to be underestimated. Today some of these guys thriving. Most grateful!

Nana Sei Anyemedu (@redhatpentester) 's Twitter Profile Photo

Faraday bags, or Faraday cages, are important in cybersecurity because they can block electromagnetic fields. They protect against unauthorised remote access by shielding devices from signals such as Wi-Fi, Bluetooth, and cellular networks. Furthermore, they safeguard against

Daniel J. Ampofo (@theveterann) 's Twitter Profile Photo

Overwhelmed to have achieved this feat in my Cybersecurity journey. I'd like to acknowledge the support of Tech Enthusiast rodney_ and Nana Sei Anyemedu. ๐Ÿ˜๐Ÿ˜View my verified achievement from @learningatcisco. credly.com/badges/2bd2808โ€ฆ via Credly

Overwhelmed to have achieved this feat in my Cybersecurity journey. I'd like to acknowledge the support of <a href="/CtPrecious/">Tech Enthusiast</a> <a href="/CrentsilRodney/">rodney_</a> and <a href="/RedHatPentester/">Nana Sei Anyemedu</a>. ๐Ÿ˜๐Ÿ˜View my verified achievement from @learningatcisco. credly.com/badges/2bd2808โ€ฆ via <a href="/credly/">Credly</a>
Dr Iretioluwa Akerele (@ireteeh) 's Twitter Profile Photo

I got a life changing opportunity last year. I have successfully recommended two people for the same opportunity. The goal is for everyone to win together ๐Ÿ™๐Ÿพ

Daniel J. Ampofo (@theveterann) 's Twitter Profile Photo

โ€œIf they send a phishing link, reply with a ransomwareโ€ฆโ€ slowly slowly, Iโ€™ll get there๐Ÿ™๐Ÿพ

Nana Sei Anyemedu (@redhatpentester) 's Twitter Profile Photo

Replaceable parts such as Battery, Display, Camera, etc., in iPhone 12 and later can now be linked to your Apple Account and activate Activation Lock if they are installed in another iPhone. This feature is now active in iOS 18 RC. Beta Profiles ๐Ÿ™Œ๐Ÿฝ๐Ÿ™Œ๐Ÿฝ. So those who steal

Replaceable parts such as Battery, Display, Camera, etc., in iPhone 12 and later can now be linked to your Apple Account and activate Activation Lock if they are installed in another iPhone.

This feature is now active in iOS 18 RC. <a href="/BetaProfiles/">Beta Profiles</a> ๐Ÿ™Œ๐Ÿฝ๐Ÿ™Œ๐Ÿฝ. 

So those who steal
Elorm Daniel (@elormkdaniel) 's Twitter Profile Photo

Day 1๏ธโƒฃ7๏ธโƒฃ/100โœ… #100DaysOfCybersecurity with TheCyberChef๐Ÿ‘จโ€๐Ÿณ| Cybersecurity | Educator๐Ÿ‡ฌ๐Ÿ‡ญ๐ŸŽ“ and Nana Sei Anyemedu on @cisconetacad from scratch Today, I Learned about ๐Ÿ  Home Network Basics: I explored how home networks are set up, including the roles of routers, modems, and wireless access points.

Coffin ๏ฃฟ (@coffinxp7) 's Twitter Profile Photo

๐˜ผ ๐™ก๐™ค๐™ฉ ๐™˜๐™–๐™ฃ ๐™๐™–๐™ฅ๐™ฅ๐™š๐™ฃ ๐™ž๐™ฃ ๐™Ÿ๐™ช๐™จ๐™ฉ ๐™– ๐™›๐™š๐™ฌ ๐™ข๐™ค๐™ฃ๐™ฉ๐™๐™จ.๐™‰๐™š๐™ฌ ๐™—๐™ค๐™™๐™ฎ,๐™ฃ๐™š๐™ฌ ๐™ข๐™ž๐™ฃ๐™™๐™จ๐™š๐™ฉ,๐™ฃ๐™š๐™ฌ ๐™ข๐™ค๐™ฃ๐™š๐™ฎ,๐™ฃ๐™š๐™ฌ ๐™˜๐™ž๐™ง๐™˜๐™ก๐™š,๐™ฃ๐™š๐™ฌ ๐™š๐™ซ๐™š๐™ง๐™ฎ๐™ฉ๐™๐™ž๐™ฃ๐™œ. ๐™Ÿ๐™ช๐™จ๐™ฉ ๐™ ๐™š๐™š๐™ฅ ๐™œ๐™ค๐™ž๐™ฃ๐™œ..

KiLLERVMs (@killervms) 's Twitter Profile Photo

We've been testing EVE-NG on windows 10 and Debian and it's really nice The only major drawback is that we can't switch network interfaces when devices are on. We can do that on GNS3 though... Subscribe to our YouTube channel youtube.com/@KiLLERVMs

Nana Sei Anyemedu (@redhatpentester) 's Twitter Profile Photo

I developed a wireless pentesting tool called ZAHEER. The name comes from an inspiration of the air bender zaheer in Legend of Korra. Just as Zaheer mastered the art of airbending to break boundaries, this tool pushes the boundaries of security, making it a fitting tribute to a

Winston Ighodaro (@officialwhyte22) 's Twitter Profile Photo

Day 15 #30daysofhacking Gained SYSTEM privileges using Capcom.sys exploit! ๐Ÿ”ฅ Successfully executed shellcode and launched a SYSTEM shell on the target. Always fascinating to see the power of kernel vulnerabilities. ๐Ÿง‘๐Ÿผโ€๐Ÿ’ป

Day 15  #30daysofhacking

Gained SYSTEM privileges using Capcom.sys exploit! ๐Ÿ”ฅ  
Successfully executed shellcode and launched a SYSTEM shell on the target. Always fascinating to see the power of kernel vulnerabilities. ๐Ÿง‘๐Ÿผโ€๐Ÿ’ป
Hacksparo ๐Ÿฅท๐Ÿ‘พ (@hack_sparo) 's Twitter Profile Photo

Before starting in cybersecurity, you need: - Linux fundamentals - Networking basics - An introduction to web applications Thatโ€™s exactly what weโ€™ll cover in our upcoming bootcamp! If youโ€™re interested, please reach out to Olรบmรกyรฒwรก.dev.