Skip to content
View JustNunuz's full-sized avatar

Block or report JustNunuz

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
JustNunuz/README.md

💬whoami

Nunudzai, commonly known as Nunu, is a cybersecurity professional driven by curiosity and a strong focus on solving real-world security challenges. He is particularly interested in how emerging technologies can be applied to strengthen systems, improve resilience, and enhance overall security posture.

Currently serving as Cybersecurity Lead and Data Protection Officer at Compulink Systems in Zimbabwe, Nunu plays a key role in aligning security practices with business operations. His work spans implementing secure systems, improving user awareness, and ensuring compliance with frameworks such as ISO 27001 and the Cyber and Data Protection Act. He has also led the development of internal policies and processes that support a more mature and compliant data protection environment.

Nunu’s experience includes configuring and managing security infrastructure such as firewalls, supporting vulnerability assessments and penetration testing initiatives, and deploying internal systems that improve efficiency and reduce operational bottlenecks. His approach combines technical depth with practical implementation, ensuring that security solutions are both effective and usable within real organisational environments.

He also has a strong interest in research and innovation, currently working on projects that explore the intersection of AI, language, and cybersecurity. Outside of his core role, Nunu actively contributes to the tech community through knowledge sharing, talks, and collaboration within platforms such as PyCon, Google Developer Groups, and cybersecurity-focused forums.

giphy

Projects

As a cybersecurity professional, I have been involved in various research and blogging projects that demonstrate my expertise in the field. Here are some highlights of my work:

  1. Research: "Optimizing Medical IoT Disaster Management with Data Compression"

In this research project, I investigated the potential of data compression techniques to optimize the performance of Medical IoT devices during disaster management scenarios. By analyzing various compression algorithms and strategies, I proposed a novel approach to reduce data transmission latency and improve the overall efficiency of Medical IoT systems in high-stress situations. This research has been published in a peer-reviewed journal and presented at the annual Digital Futures International Congress (DIFCON 2023) conference.

  1. Blog: "Absolute Z3r0 Exploits"

I am the creator and chief editor of "Absolute Z3r0 Exploits," a popular cybersecurity blog that covers various topics related to the field. Through my blog, I share my insights, experiences, and opinions on a wide range of subjects, including penetration testing, malware analysis, and security awareness. My goal is to provide readers with engaging and informative content that helps them stay up-to-date with the latest developments in the cybersecurity landscape.

Some of my most popular blog posts include:

a. "From Theory to Practice: The Mechanics of DDoS Attacks"
b. "Exploring the Possibilities of an AI Government"
c. "Exploring Malcore: A New Approach to Understanding Malware"

To explore my research and blogging projects further, please visit the following links:

🌐 Socials:

LinkedIn Medium X (formerly Twitter) URL

💻 Tech Stack:

Python Nginx Docker Terminal Kali Ubuntu SUSE

💰 You can help me by Donating

BuyMeACoffee

Pinned Loading

  1. PayloadParadise PayloadParadise Public

    A collection of proof-of-concept scripts exploring "what could go wrong" with unflagged script execution vulnerabilities, using the WhatsApp for Windows vulnerability that allows Python execution w…

    Python 2

  2. Corrupt-PDF Corrupt-PDF Public

    This repository contains materials from my talks at PyCon Zimbabwe 2024 and PyCon Namibia 2025, where I delve into the often-overlooked security risks of PDF files in cybersecurity and forensics.

    Python 1

  3. honeypy honeypy Public

    HoneyPy is a Python-based honeypot project designed to be a proof of concept for a basic honeypot system. It provides a simple framework for creating and deploying honeypots to detect, analyze, and…

    Python

  4. Beyond_Orion Beyond_Orion Public

    Unmatched compression.

    Python

  5. Shona-Rockyou Shona-Rockyou Public

    Python 3

  6. device-activity-tracker device-activity-tracker Public

    Forked from gommzystudio/device-activity-tracker

    This repository was evaluated as a practical exploration of the academic research on delivery receipt timing side-channels in end-to-end encrypted messaging platforms, with a focus on WhatsApp.

    TypeScript