Skip to content
View shemfuture's full-sized avatar
๐Ÿ 
Working from home
๐Ÿ 
Working from home
  • Nairobi,Kenya
  • 14:49 (UTC +03:00)

Block or report shemfuture

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this userโ€™s behavior. Learn more about reporting abuse.

Report abuse
shemfuture/README.md
  • ๐Ÿ‘‹ Hi, Iโ€™m shemfuture
  • ๐Ÿ‘€ Iโ€™m interested in Penetraton Testing & Learning New Stuffs
  • ๐ŸŒฑ Iโ€™m currently learning Cybersecurity
  • ๐Ÿ’ž๏ธ Iโ€™m looking to collaborate on creating Security Tools
  • ๐Ÿ“ซ How to reach me shemkuria95@gmail.com
  • โšก Fun fact: you know that the average cost of a data breach is around $3.9 million? This amount is crippling for the majority of firms, both financially and reputationally 1. As cyber security technology is on the rise, so is the technology of hackers. The increasing dependency of businesses on technology is an opportunity for hackers to devise innovative ways to steal critical information 1.

Stay safe online! ๐Ÿ’ป๐Ÿ”’

Pinned Loading

  1. Nmap-Commands-Reference Nmap-Commands-Reference Public

    reference to nmap commands

    1