- 🥅 Looking for web app/network penetration tester roles and/or security engineer roles
- ✔️ I hold the PJPT and ISC2 CC certifications
- 👯 I’m looking to collaborate on open-source projects
- ⚡ Fun fact: I'm an avid FiFa & Call of Duty gamer 🤣
- Through the Hacker's Lens - 2024 Learnings and 2025 Cybersecurity Vision 2025: Discussed top vulnerabilities identified in 2024 IT infrastructures, exploitation methods, remediation, and predictions for offensive security trends in 2025.
- Unmasking Cyber Threats An Offensive Security Approach for Nigerian Businesses: Demonstrated and explained how limit overrun race condition can be exploited in web applications in the fintech space in Nigeria.
- Leveraging “AlwaysInstallElevated” for Windows Privilege Escalation
- Security Groups vs NACLs in AWS: Key Differences Explained
- IoT Meets Cloud: The Perfect Partnership
- Active Directory Explained: Fine Tuning Controls for Privileged Accounts
- Active Directory Explained: Part 3 – Kerberos Authentication Protocol
- Steganography: Hiding Messages in Plain Sight
- Social Engineering #2: Recognizing and Defending against common Phishing attacks
- Social Engineering #1: The Sneaky Tactics Targeting Everyday People
- OSI Model
- Hack Your Way into Cybersecurity
- Mastering Active Directory Part 2
- Mastering Active Directory Part 1