Skip to content
View Chinuaoku's full-sized avatar
๐Ÿ˜Ž
๐Ÿ˜Ž

Block or report Chinuaoku

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this userโ€™s behavior. Learn more about reporting abuse.

Report abuse
Chinuaoku/README.md

Hi there ๐Ÿ‘‹

If you are here then you are interested in knowing about me. So, i'll tell you!

I am a professional with a background in Veterinary Medicine (DVM) from the University of Nigeria, Nsukka. As a passionate tech enthusiast and CEO of an e-commerce startup, Afiaprime, I drive business growth and innovation. Additionally, I serve as a cybersecurity analyst ensuring the security and integrity of our online platform and user data. Connect with me and take a look at my LinkedIn Profile for more details.

Skills

  1. Oral and written communication
  2. Active and Passive reconnaisance
  3. Network traffic monitoring and analysis
  4. Python, sql, bash scripting
  5. Task automation
  6. Penetration testing/ethical hacking
  7. Active directory
  8. Identity and access management
  9. Cloud security
  10. Business analysis and development
  11. Leadership and mentoring
  12. Critical thinking
  13. Cybersecurity exam item development.

Tools

Category list
Training CISCO Networking, HACKTHEBOX, TryHackMe, Letsdefend, Udacity, Google, Coursera, Amazon SkillBuilder
Traffic and packet analysis Wireshark, TCPDump
Penetration testing/hacking Burpsuite, Metasploit, Zed Attack Proxy, SQLmap
Network scanning/analysis NMAP, Zenmap, Netcat
Vulnerability scanning NIKTO, OPENVAS, Nessus, DirBuster
Data Modification CYBER CHEF
Social Engineering/Phishing SET, shellphish, Gophish
SIEM Splunk, Google Chronicle, EDR, Log management, IBM Qradar, FortiSIEM, ArcSight
Reconnaissance whois, DIG, OSINT, SHODAN, SPIDER
Brute force Gobuster, hydra, John, networkminer,
Malware analysis VirusTotal, Remnux, any.run
IP address analysis IP checker, arin.net
Coding vscode, Google Colab

Certifications

  1. Google Cybersecurity Professional Certificate
  2. ISC2 Certified in Cybersecurity
  3. Cisco Ethical Hacker Certificate
  4. Udacity Enterprise Security
  5. Comptia Security - in view
  6. CISSP - in view

Pinned Loading

  1. Fundamentals-of-Python Fundamentals-of-Python Public

    Follow and check this repository to learn the basics of python. It is self explanatory and easy to understand.

    Jupyter Notebook 2

  2. Python-Data-Structures Python-Data-Structures Public

    This repository will teach you how to manipulate different forms of data using python

    Jupyter Notebook 1

  3. ClearML-Vulnerability-Blurry- ClearML-Vulnerability-Blurry- Public

    This is about exploiting insecure pickle files. It was disclosed that an attacker could create a pickle file which contains an arbitrary code and upload it as an artifact to a project via the API.

    Python 2

  4. ISC2-Certified-in-Cybersecurity ISC2-Certified-in-Cybersecurity Public

    This is a cybersecurity certification that proves that an individual have the fundamental knowledge, skills and ability for an entry-level or junior-level cybersecurity role. It is ANAB accredited,โ€ฆ

    2

  5. FormulaX-XSS-RCE FormulaX-XSS-RCE Public

    XSS, RCE, Tunneling & Pivoting

    JavaScript 3

  6. SolarLab-Exploitation SolarLab-Exploitation Public

    Here i've put together key items required to exploit this box

    2