I’m Bless!
A cybersecurity enthusiast with a knack for finding weak spots before they become problems. I explore networks, systems, and cloud environments, probing for vulnerabilities and building defenses that actually hold up under pressure.
From penetration testing to automation and system hardening, I combine curiosity with hands-on problem-solving to make digital spaces safer. Every challenge is a chance to learn, innovate, and stay one step ahead.
The digital world doesn’t wait, and neither do I. I’m constantly diving into new attack surfaces, mastering tools, exploring cloud security best practices, and sharpening my skills in ethical hacking and software systems design. Every lab, exploit simulation, or hardened server is another step toward bulletproof solutions.
• Web & API Security Testing:
Manual-first, automation-assisted pentesting aligned with real-world attack scenarios
• Mobile Security:
Android & iOS testing, traffic interception, and analysis
• Secure Code Review & Vulnerability Research:
Identifying logic flaws, misconfigurations, and exploitable weaknesses
• Proof-of-Concept Development & Reporting:
Turning vulnerabilities into clear, reproducible PoCs
• Software Engineering & Systems Design:
Building systems where security is part of the architecture, not an afterthought
Cybersecurity:
Penetration testing, Network security, Cloud hardening, Vulnerability assessment, Threat modeling, Access control, Auditability
Software & Systems:
Python, JavaScript, Node.js, React, FastAPI, Django, SQL & NoSQL, REST APIs, System design, Automation
Tools & Platforms:
Linux, Docker, VMware, Git/GitHub, AWS/GCP, Postman, Burp Suite, Wireshark, Terraform, Kubernetes
I don’t just work with systems — I question them. Every application, API, or network I touch is treated as something that can fail, be misused, or be misunderstood. I pay attention to assumptions, trust boundaries, and how systems behave under pressure.
Security isn’t a checklist. It’s understanding behavior — how systems respond, how users interact, and how attackers think. That’s where I operate: in the gap between what a system is supposed to do and what it actually does.
From Moringa labs to real-world systems, I specialize in ethical hacking, penetration testing, and software security. I bridge coding with protection, ensuring systems are not just functional but resilient under pressure.


