Skip to content
View Aishithegenius's full-sized avatar

Block or report Aishithegenius

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Aishithegenius/README.md

Bless Benjamin


Cybersecurity • Software • Systems

Part-time HUMAN, full-time CODER



The Persona


I’m Bless!
A cybersecurity enthusiast with a knack for finding weak spots before they become problems. I explore networks, systems, and cloud environments, probing for vulnerabilities and building defenses that actually hold up under pressure.

From penetration testing to automation and system hardening, I combine curiosity with hands-on problem-solving to make digital spaces safer. Every challenge is a chance to learn, innovate, and stay one step ahead.


Learning Streak


The digital world doesn’t wait, and neither do I. I’m constantly diving into new attack surfaces, mastering tools, exploring cloud security best practices, and sharpening my skills in ethical hacking and software systems design. Every lab, exploit simulation, or hardened server is another step toward bulletproof solutions.


What I Do


• Web & API Security Testing:
Manual-first, automation-assisted pentesting aligned with real-world attack scenarios

• Mobile Security:
Android & iOS testing, traffic interception, and analysis

• Secure Code Review & Vulnerability Research:
Identifying logic flaws, misconfigurations, and exploitable weaknesses

• Proof-of-Concept Development & Reporting:
Turning vulnerabilities into clear, reproducible PoCs

• Software Engineering & Systems Design:
Building systems where security is part of the architecture, not an afterthought


Skills


Cybersecurity:
Penetration testing, Network security, Cloud hardening, Vulnerability assessment, Threat modeling, Access control, Auditability

Software & Systems:
Python, JavaScript, Node.js, React, FastAPI, Django, SQL & NoSQL, REST APIs, System design, Automation

Tools & Platforms:
Linux, Docker, VMware, Git/GitHub, AWS/GCP, Postman, Burp Suite, Wireshark, Terraform, Kubernetes


Behind The Scenes


I don’t just work with systems — I question them. Every application, API, or network I touch is treated as something that can fail, be misused, or be misunderstood. I pay attention to assumptions, trust boundaries, and how systems behave under pressure.

Security isn’t a checklist. It’s understanding behavior — how systems respond, how users interact, and how attackers think. That’s where I operate: in the gap between what a system is supposed to do and what it actually does.


Focus Area


From Moringa labs to real-world systems, I specialize in ethical hacking, penetration testing, and software security. I bridge coding with protection, ensuring systems are not just functional but resilient under pressure.


Languages & Tools


python logo android logo apple logo bash logo git logo gitlab logo redhat logo angularjs logo apache logo django logo docker logo mysql logo firebase logo flutter logo googlecloud logo javascript logo html5 logo nextjs logo nodejs logo react logo php logo vscode logo chrome logo

pacman contribution graph

Pinned Loading

  1. RandomCommits RandomCommits Public

    Every Daily Learning Posted Here

  2. WebPenetrationTesting-Notes WebPenetrationTesting-Notes Public

    Notes on web penetration testing, explained simply with practical examples.

    1