Nana Sei Anyemedu
@RedHatPentester
Black Excellence | Amanfo) | CEO - HIVE Consult | Penetration Testing | Digital Forensics | Offensive Security | Security Researcher | Man United❤
FARADAY BAG vs FLIPPER ZERO Today, I demonstrated the necessity of carrying a Faraday bag by using my Flipper Zero to read my bank card and access card. Without the Faraday bag, I successfully accessed both cards. However, when the cards were placed inside the Faraday bag, I…

Two cybersecurity companies are effectively using my TERMINATOR data wiping tool I designed in their day to day operations 🫡. Good God⚡️
You ignored “Tech” Sir😅 Just as professionals use tech for innovation and development, criminals also exploit the same tech for covert communication, tracking, manipulation, and execution of crimes. Criminals now use GPS trackers to follow high-value targets and plan abductions.…
We have to talk about this fraud and human trafficking issue as well as the increased kidnappings, and ritualistic murders going on.
I've made over 5 posts on yapping..... Value should be prioritized not giving farmers the opportunity to game the system. Imagine bragging about making it to the leaderboard with just one post, a day before the end date...That alone says a lot.
Ask tough questions 🌚🌚. 1. The absence of logs does not imply the absence of an attack. Log deletion itself is evidence: If audit trails are wiped or logs are missing entirely while logging was expected, that anomaly is itself a red flag. Actions like log deletion often leave…
2. If an attacker deletes all their logs, did è breach ever happen? How do you prove the absence of evidence isn't evidence of absence 3. Your smart TV isn’t allowed on the corporate network, but it listens all day and has Wi-Fi. What security boundary does it really belong to?
This is a testament that most at times those that can actually do the job are sidelined or overlooked or not seen. This often happens in the tech industry. When decision-making prioritizes appearances or politics over real skill, companies often risk hiring less competent people…
Define coding Deputy minister of communications designate:
How can you tell me Pegasus will infect my laptop. Some of these tech content creators errr.
Appreciate that and you're right, MITRE flagged certutil years ago. But that doesn’t mean attackers stopped using it or that it’s always caught. It’s still been used in real attacks: PipeMagic Ransomware (2025): logpoint.com/en/blog/emergi…
MITRE has had it detailed since 2017, defender isn’t ignoring something using it as a lolbin. Saying defender trusts it is bad faith engagement farming. attack.mitre.org/software/S0160/
Introducing Mrs. Habib 👸 A'udhu bi kalimatil-Lahil-taammati min sharri ma khalaq. Last Ramadan, I asked Allah to help me perfect my religion and draw closer to Him, to help me with my Salat, and “Rabbi inni lima anzalta ilayya min khayrin faqir” was my watchword. Allah indeed…
My greatest achievement is to fail And I am not ashamed about it I keep failing till my failure leads to success 😭
There's this project we were assigned as cybersecurity trainers the project will be rounding up 8 Aug 2025 after 4month. Just yesterday we got to know we have DSS as a trainee shock wan kpai me. If we have taught one wrong thing we for don dey explain for headquarter.
The replies to this blew me away 😅 lots of sharp minds here. The real answer? OAuth Consent Phishing + Token Replay APT-grade tradecraft used by the big dogs like APT29. Even Microsoft got hit with this. 🧵Here’s how it works:
Scenario: You’re targeting a cloud-native org: • EDR on all endpoints • PowerShell, macros, WMI blocked • Azure AD SSO enforced • USB + EXEs restricted • DNS, proxy, OAuth logs monitored Yet you gain persistent access, no endpoint touched. What’s your method? #RedTeam #APT
I saw my boss @RedHatPentester posted something about using mobileedit to carry out a digital forensic examination, As a digital forensic investigator, this tool among many others such as Cellibrite UFD, Magnet Axiom, Autopsy among many others are used to uncover critical…
Ross Ulbricht was the founder and operator of the Silk Road, a darknet marketplace launched in 2011 on the Tor network. It allowed people to buy and sell illegal goods primarily drugs anonymously using Bitcoin. Ulbricht was arrested on October 1, 2013, at a public library in…
Wow! I like your story and i also wonder what the man Ulbritch has to do with the darkweb creation. Are there differences between freenet,darknet and the darkweb? Just curious
How the Darkweb was born? In 1999, Ian Clarke, a computer science student at the University of Edinburgh, submitted a final-year project titled: “A Distributed Decentralised Information Storage and Retrieval System” His idea? To create a censorship resistant network where…
Customized PC Builds 👨🔧🧑🔧available prioritize my service to enjoy 😉 the best PC experience. @RedHatPentester he can testify 👏🏽 WhatsApp me directly for more info👉👉 wa.me/233501459191
Nigeria get port 21 and Ghana get SS7😂. That reverse engineering video I pray eno come out or we are cooked😂
I sell hacking tools. I’ve been selling since. Any Pentester or Redteamer who needs a hardware for their operations. You can dm.
The wireless adapter successfully got to Nigeria after 2 days shipment. From Ghana to Delta State. Thank you @Phosenterprise for trusting me. Please if you’re in Nigeria and you need a wireless adapter let me know. @IamTheCyberChef @akintunero @marshalwahlexyz…
Chelsea thinks we are mad. You sold mount us over 60m now Jackson? No no😂😂😂
Yes I’m thinking what you’re thinking: bad man😂😂🫡
@RedHatPentester @elormkdaniel are you thinking what I'm thinking? Should we tell them? 👿🦹💉💉😂 "When it's free, you're the product!". Someone tell them.
There are many ways an attacker can get in. The best strategy? Always assume you could be targeted anytime, anywhere. This mindset keeps you alert, cautious, and less likely to take unnecessary risks. The truth is, new attack methods emerge daily, and it's not slowing down.…