Francis Sam
@Fran_cisSam
Cybersecurity Enthusiast || AI Enthusiast || Book Advocate
You might like
How to Securely Wipe Your Mobile Phone Before Getting a New One When switching to a new phone, properly securing your old device's data is crucial to protect your privacy and prevent data recovery by unauthorized parties. Here are all the methods available for secure mobile data…
How often do you properly wipe your data before selling or giving away an electronic device? I recently visited Accra Circle to purchase a second-hand phone for teaching advanced mobile forensics to my students. The device looked brand new. However, once I got home, I had a…
I’m finally ready to honor my promise I’ll be taking complete beginners in Cybersecurity and guiding them from scratch… and for those that have already started but feeling lost, I’ll help you find your path and specialize. 100% FREE mentorship no excuses, just growth. But…
At the surface, the decision to send the remains abroad may appear as a practical step to ensure accurate forensic results; besides it proves we do not have the facility. This is a good move for now. However, this situation reveals a worrying gap in Ghana’s disaster preparedness…
Samples of the remains of all passengers aboard the GAF Z9 that crashed enroute to Obuasi, are about to be transported to South Africa for a forensic analysis.
My company is building a virtual Airport for Ethical hackers and Penetration Testers to test their capabilities. The goal is to encourage offensive security in a controlled environment 🇬🇭. We have builtone for the Navy and another one for the Hospital. Check them in my…
FARADAY BAG vs FLIPPER ZERO Today, I demonstrated the necessity of carrying a Faraday bag by using my Flipper Zero to read my bank card and access card. Without the Faraday bag, I successfully accessed both cards. However, when the cards were placed inside the Faraday bag, I…
Triggerfish is eavesdropping equipment that allows law enforcement to intercept cellular conversations in real time. Its use extends the basic capabilities of StingRay, which are more oriented to device location monitoring and gathering metadata.
WEB APPLICATION HACKING Resources: -Real-World Bug Bounty -Web Hacking 101 -Bounty TIPS -JavaScript Cheatsheet Download: mega.nz/folder/QjFXyYh… Enjoy❤️
I used Cellibrite UFED today for Advanced Logical Extraction on an Iphone 12 Pro. Cellebrite UFED (Universal Forensic Extraction Device) is a comprehensive mobile forensic solution used by law enforcement agencies, intelligence organizations, and corporate security teams…
OSINT TOOLS 1. Google Search: A powerful search engine for finding publicly available information on the web. 2. Social Media Platforms: Platforms like Twitter, Facebook, LinkedIn, and Instagram provide valuable insights into individuals, organizations, and events. 3. Maltego:…
If you are looking for Public Datasets to work on Data Analysis or Data Science. Here are 5 Free Data Sources where you can find one for your next Project: Rt
My Mega folder is updated. My cybersecurity people. These are 20 Offensive and Bug Bounty tools for Ethical Hacking and Penetration Testing. Download link: mega.nz/folder/Ro9zna5… Follow @RedHatPentester for more. #Retweet
Machine Learning Tools 🤖 Development • PyCharm • VScode • Jupyter Training • PyTorch Lightning • Scikit-Learn • TensorFlow • LightGBM • XGBoost • PyTorch Tuning • Keras tuner • Hyperopt • Optuna Optimization • SparseML Deployment / Packaging • Hugging Face…
Dear Cyber Security Wannabe, Here are 10 Top Jobs in Cyber. Not sure which direction you want to go? This should solve it for you. Learning = Job Security 1. CISO - you be da' person in charge of the entire security posture of an organization. 2. Security Analyst - Ain't…
[Download FREE 379-page eBook] #Python #DeepLearning — Techniques, #NeuralNetwork Architectures, and #GANs with PyTorch, Keras and TensorFlow: alvarestech.com/temp/deep/Pyth… or Get print copy here: amzn.to/3Ge53qi —————— #BigData #DataScience #AI #MachineLearning #100DaysOfCode
Secure Your Laptop #cybersecurity #cyberattack #hacked #infosec
Get into cybersecurity NOW. There is room for everyone No matter your educational background This should be your roadmap👇🏽👇🏽👇🏽 🚨Study CompTIA A+, Network+ & Security+ 🚨Skills Linux, Python, Active Directory, Packet Analysis Happy Learning💪
United States Trends
- 1. #WWERaw 56.4K posts
- 2. Packers 43.4K posts
- 3. John Cena 58.1K posts
- 4. Eagles 67.4K posts
- 5. #RawOnNetflix 1,426 posts
- 6. #GoPackGo 4,594 posts
- 7. GRAND SLAM CENA 15.6K posts
- 8. Jalen 14.4K posts
- 9. Jordan Love 3,452 posts
- 10. Matt LaFleur N/A
- 11. Tush Push 10.3K posts
- 12. Cade Horton 1,173 posts
- 13. Shipley N/A
- 14. Green Bay 10.5K posts
- 15. Drake Baldwin 5,296 posts
- 16. Dirty Dom 1,602 posts
- 17. Go Birds 17.5K posts
- 18. Monday Night Football 6,358 posts
- 19. Triple H 5,554 posts
- 20. Dominik Mysterio 11.2K posts
Something went wrong.
Something went wrong.