Software Engineering & Cybersecurity

Building robust software solutions and safeguarding the digital landscape.

Core Skills

Tools & Languages that I Use

Kali Kali Linux Metasploit Metasploit Burp Burp Suite Nmap Nmap Wireshark Wireshark linux Linux Gobuster Gobuster Wazuh Wazuh Python Python
Parrot Parrot OS Nessus Nessus John John the Ripper Hydra Hydra OpenVAS OpenVAS Docker Docker Splunk Splunk Hashcat Hashcat Cisco Cisco Packet Tracer OWASP OWASP Kali Kali Linux SQLmap SQLmap
Fedora Fedora OS OWASP OWASP SQLmap SQLmap Aircrack Aircrack-ng Windows Windows Oracle VM Oracle VM Ubuntu Ubuntu ELK ELK THC Hydra
Parrot Parrot OS Cisco Cisco Packet Tracer Hydra Hydra OpenVAS OpenVAS Docker Docker Splunk Splunk Metasploit Metasploit Burp Burp Suite Nmap Nmap Wireshark Wireshark John John the Ripper SQLmap SQLmap Nessus Nessus Hashcat Hashcat OWASP OWASP Kali Kali Linux


JavaScript JavaScript HTML HTML5 CSS CSS Rust Rust Python Python Node.js Node.js Nginx Nginx MySQL MySQL C++ C++ PHP PHP MariaDB MariaDB Bash Bash github GitHub Express.js Express.js Apache Apache APIs APIs

Projects & Certifications

Hands-on experience in software engineering and cybersecurity research and implementation

CTF Challenges

Proud to have placed in the top 3 of the inaugural Moringa Cyber Knights CTF!, specializing in web exploitation, SQL injection exploitation,Hash cracking, and privilege escalation techniques.

Web Exploitation Reverse Engineering Privilege Escalation

Metasploitable 3 CTF

Demonstrated expertise in exploiting Metasploitable 3 vulnerabilities, including privilege escalation and post-exploitation strategies.

CTF Metasploitable Privilege Escalation
Download My Report PDF

JavaScript Essentials 1

Acquired foundational JavaScript skills, enabling dynamic web development and interactive user experiences.

JavaScript Cisco Programming

JavaScript Essentials 2

Enhanced JavaScript expertise with advanced concepts, including asynchronous programming and object-oriented design.

JavaScript Cisco Advanced Programming

Cisco Packet Tracer Certification

Gained hands-on experience in network design, troubleshooting, and simulation using Cisco Packet Tracer.

Networking Cisco Packet Tracer Badge Packet Tracer Certification

API Security Certification

Validated skills in API security, including authentication, authorization, and protection against common vulnerabilities.

API Security Authentication Vulnerability Mitigation API Security Badge

Express Server and JavaScript API Lab

Created a functional Express.js server to manage HTTP requests and responses, showcasing middleware usage and RESTful API design. Designed and implemented a JavaScript API for managing data operations with a focus on secure and efficient endpoint handling.

Express.js JavaScript API CRUD Middleware

IBT Full Stack Software Engineering Certification

Validated skills in full stack development, including building dynamic web applications, managing databases, and deploying scalable solutions.

Full Stack Software Engineering Front-End Back-End Certification

ARXC Cybersecurity Certificate

Validated skills in security fundamentals, risk analysis, and policy controls.

ARXC Certification Cybersecurity Cyber Threat Intelligence Risk Management Security Policies

SIEM Dashboards

Monitored real-time security threats and anomalies using Splunk and ELK stack for enterprise environments.

Splunk ELK Stack Threat Monitoring

Packet Analysis with Wireshark

Performed in-depth traffic analysis to identify suspicious activity, troubleshoot networks, and gain insights into application-layer communications.

Wireshark Packet Analysis Network Security

Web Application Testing with Burp Suite

Utilized Burp Suite for web app security testing, including request interception, scanning, fuzzing, and vulnerability exploitation.

Burp Suite Web Security Pentesting

Heartbleed Attack Demonstration

Explored the Heartbleed OpenSSL flaw by testing its impact on vulnerable systems and extracting sensitive data from memory.

Heartbleed OpenSSL Exploitation

Penetration Test Lab

Built a comprehensive home laboratory with Kali Linux, Metasploitable, and Windows VMs for red team and blue team security simulations.

Red Team Report writing Blue Team Virtualization

Vulnerability Assessment

Conducted comprehensive security assessments using automated scanning tools and manual testing methodologies to identify critical vulnerabilities.

OWASP OpenVAS Nessus Manual Testing

Security Policies

Developed comprehensive security policies and incident response procedures following industry best practices and compliance frameworks .

Policy Development Compliance Risk Management

Network Hardening

Implemented security configurations and hardening procedures for enterprise networks, reducing attack surface and improving overall security posture.

Network Security Firewall Configuration System Hardening

TryHackMe Progress

Contact Me

Get in touch with me via social media or send me an email.😉