Mawira Victor

Nairobi, Kenya

Computer Networks and Security student with a strong interest in network architecture, cybersecurity, and system hardening. Driven to develop secure, scalable, and efficient network solutions.

What I work with

Experience

Student Researcher

Sep 2025 - Present

Hands-on security research and network analysis in university lab environment.

Collaborative Developer

Oct 2025 - Present

Building an end-to-end encrypted messaging application from scratch with other developers.

Competitor & Security Enthusiast

Jan 2025 - Present

Participate in Capture The Flag competitions and virtual labs to practice real-world security skills.

Self-Directed Learner

Jun 2024 - Present

Created personal lab environment to practice networking and security concepts.

Student

Sep 2025 - Present

Completed multiple Cisco certification courses as part of degree program.

Volunteering

Kagwampungu Primary school

volunteer Teacher

Jan 2026 - Present

Under the SBL program I had a change to provide my skills and Organize coding workshops for underprivileged youth, teaching basic programming and cybersecurity awareness. Used tools like Scratch (for Visual Programming) and Python to make learning fun and accessible. Also had a chance to mentor and help two students and guide them complete a project and submit it to the Kenya Science and Engineering Fair.

Projects

SecureChatApp

SecureChatApp

Learn More

Certifications

Cyber Threat Management

Feb 12, 2026 Level: Intermediate

Network Defense

Feb 02, 2026 Level: Intermediate

Networking Devices and Initial Configuration

Jan 25, 2026 Level: basics

Endpoint Security

Jan 18, 2026 Level: basics

Networking Basics

Jan 13 2026 Level: basics

Introduction to Cybersecurity

Jan 05, 2026 Level: basics

CCNA: Introduction to Networks

Sep 10, 2025 Level: basics

Blogs

April 4, 2026

Pivoting with Metasploit: A Beginner’s Guide to Network Pivoting

The Golden Rule of Pivoting:For pivoting to work, the compromised host must be connected to two or more networks . Think of it as a bridge — the compromised machine sits between you and your target.

March 15, 2026

Mastering Git: What I Learned (Part 1)

In this introductory guide, Git is outlined as an essential version control system for tracking project history and facilitating collaboration. Key concepts, including configuring user details, managing file states through staging, and creating snapshots with commit messages, are covered to help developers organize their workflow.

March 12, 2026

Reverse Shells vs. Bind Shells

This Blog explains the fundamental differences between bind shells and reverse shells in cybersecurity, using Netcat as a primary example. While bind shells require the attacker to connect to a listening port on the victim's machine, reverse shells force the victim to initiate the connection to the attacker. Consequently, reverse shells are the preferred method for bypassing modern firewall security controls.