Skip to content
View JustNunuz's full-sized avatar
🔒
Locked In
🔒
Locked In

Block or report JustNunuz

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
JustNunuz/README.md

💬whoami

Nunudzai, commonly known as Nunu, is a dedicated cybersecurity professional with a passion for exploring cutting-edge technologies that enhance device security. As a skilled Cybersecurity Analyst, Nunu thrives in collaborative environments and enjoys working with diverse teams to protect organizations from cyber threats.

Nunu's experience includes serving as the Founding IT Security Engineer and Trainer at Twenty8 Labs in Malaysia, where he conducted numerous penetration tests, awareness training sessions, and client engagements. Currently, Nunu is employed as a Cybersecurity Professional at the Pumpkin Hotel in Zimbabwe.

Nunu's expertise lies in cybersecurity, with a particular focus on penetration testing for web and networks, security awareness, and malware analysis. He possesses a strong understanding of both the technical and non-technical aspects of the field and stays informed about industry developments through continuous learning and networking with other professionals.

giphy

Services

Penetration Testing Security Awareness Training Vulnerability Assessments
I provide comprehensive penetration testing services to identify vulnerabilities in your web applications, networks, and infrastructure. By simulating real-world attacks, I help you uncover weaknesses in your security posture and provide actionable recommendations for remediation. I offer engaging and interactive security awareness training programs tailored to your organization's unique needs. My courses educate employees about potential cyber threats and best practices for safeguarding sensitive information, helping you build a strong security culture and reduce the risk of data breaches. I perform thorough vulnerability assessments to identify and prioritize security risks within your IT environment. My assessments cover a wide range of assets, including servers, workstations, network devices, and cloud infrastructure.
Incident Response Planning Security Architecture Review Security Consulting
I help organizations develop comprehensive incident response plans to minimize the impact of security breaches and ensure business continuity. My plans include detailed procedures for detecting, containing, and recovering from cyber incidents, as well as guidance for post-incident analysis and improvement. I analyze your organization's security architecture to identify areas for improvement and ensure alignment with industry best practices. My reviews cover various aspects of your security infrastructure, including access controls, encryption, network segmentation, and identity and access management. I provide expert advice and guidance on a wide range of cybersecurity topics, including threat modelling, risk management, and security governance. I work closely with your team to understand your unique challenges and develop tailored solutions that address your specific needs.

To learn more about my services and how I can help protect your organization from cyber threats, please feel free to contact me via email or connect on LinkedIn.

Projects

As a cybersecurity professional, I have been involved in various research and blogging projects that demonstrate my expertise in the field. Here are some highlights of my work:

  1. Research: "Optimizing Medical IoT Disaster Management with Data Compression"

In this research project, I investigated the potential of data compression techniques to optimize the performance of Medical IoT devices during disaster management scenarios. By analyzing various compression algorithms and strategies, I proposed a novel approach to reduce data transmission latency and improve the overall efficiency of Medical IoT systems in high-stress situations. This research has been published in a peer-reviewed journal and presented at the annual Digital Futures International Congress (DIFCON 2023) conference.

  1. Blog: "Absolute Z3r0 Exploits"

I am the creator and chief editor of "Absolute Z3r0 Exploits," a popular cybersecurity blog that covers various topics related to the field. Through my blog, I share my insights, experiences, and opinions on a wide range of subjects, including penetration testing, malware analysis, and security awareness. My goal is to provide readers with engaging and informative content that helps them stay up-to-date with the latest developments in the cybersecurity landscape.

Some of my most popular blog posts include:

a. "From Theory to Practice: The Mechanics of DDoS Attacks"
b. "Exploring the Possibilities of an AI Government"
c. "Exploring Malcore: A New Approach to Understanding Malware"

To explore my research and blogging projects further, please visit the following links:

🌐 Socials:

LinkedIn Medium X (formerly Twitter) URL

💻 Tech Stack:

Python Nginx Docker Terminal Kali Ubuntu SUSE

📊 GitHub Stats:




💰 You can help me by Donating

BuyMeACoffee

Pinned Loading

  1. Beyond_Orion Beyond_Orion Public

    Unmatched compression.

    Python

  2. JustNunuz.github.io JustNunuz.github.io Public

    Welcome to my portfolio website, where you can explore my professional journey, discover the services I offer, and learn how I can help you achieve your goals.

    JavaScript

  3. Ciphers Ciphers Public

    Python Implementation of Ciphers

    Python

  4. Compound_P Compound_P Public

    Leaked Credentials + Commonly used phrases + Popular baby names = Compound P

  5. Pico-W Pico-W Public

    A collection of beginner-friendly projects on the Raspberry Pi Pico W, covering Wi-Fi connectivity, API integration, LED controls, and web server functionality. This repository serves as a space fo…

    Python

  6. Python-beginner-workshop Python-beginner-workshop Public

    Forked from Kudzmat/Python-beginner-workshop

    Python Workshop Conducted by Bam and I at Uncommon

    Python