What I work with
Experience
Student Researcher
Sep 2025 - Present
Hands-on security research and network analysis in university lab environment.
Collaborative Developer
Oct 2025 - Present
Building an end-to-end encrypted messaging application from scratch with other developers.
Competitor & Security Enthusiast
Jan 2025 - Present
Participate in Capture The Flag competitions and virtual labs to practice real-world security skills.
Self-Directed Learner
Jun 2024 - Present
Created personal lab environment to practice networking and security concepts.
Student
Sep 2025 - Present
Completed multiple Cisco certification courses as part of degree program.
Volunteering
volunteer Teacher
Jan 2026 - Present
Under the SBL program I had a change to provide my skills and Organize coding workshops for underprivileged youth, teaching basic programming and cybersecurity awareness. Used tools like Scratch (for Visual Programming) and Python to make learning fun and accessible. Also had a chance to mentor and help two students and guide them complete a project and submit it to the Kenya Science and Engineering Fair.
Projects

SecureChatApp
The Secure Chat Application is a real-time messaging platform that implements end-to-end encryption using standard cryptographic protocols. Built with Python and Tkinter, this application provides secure communication channels between users.
Learn MoreCertifications
Blogs
April 4, 2026
Pivoting with Metasploit: A Beginner’s Guide to Network Pivoting
The Golden Rule of Pivoting:For pivoting to work, the compromised host must be connected to two or more networks . Think of it as a bridge — the compromised machine sits between you and your target.
March 15, 2026
Mastering Git: What I Learned (Part 1)
In this introductory guide, Git is outlined as an essential version control system for tracking project history and facilitating collaboration. Key concepts, including configuring user details, managing file states through staging, and creating snapshots with commit messages, are covered to help developers organize their workflow.
March 12, 2026
Reverse Shells vs. Bind Shells
This Blog explains the fundamental differences between bind shells and reverse shells in cybersecurity, using Netcat as a primary example. While bind shells require the attacker to connect to a listening port on the victim's machine, reverse shells force the victim to initiate the connection to the attacker. Consequently, reverse shells are the preferred method for bypassing modern firewall security controls.