
About Me
Cybersecurity researcher with a passion for ethical hacking
> Who I Am
root@befikadu:~$
Currently:
- → Building secure web applications
- → Researching new vulnerabilities
- → Sharing knowledge through content
Core Expertise
Penetration Testing
Vulnerability Research
Secure Development
Network Security
Mission Statement
My mission is to make the digital world safer by identifying vulnerabilities, educating others, and contributing to the cybersecurity community through ethical hacking and responsible disclosure.
Technical Arsenal
My weapons of choice for securing and building digital systems.
Penetration Testing
Vulnerability Assessment
Network Security
Web App Security
Incident Response
Burp Suite
Wireshark
Projects
Explore my latest work in cybersecurity, research, and education

Buna Byte Cybersecurity
A cybersecurity platform focused on building security awareness and capabilities in Ethiopia.

Malware Detection and Analysis using Machine Learning
A user-friendly web application that leverages static analysis and machine learning to detect and analyze malware in files, URLs, and executables with real-time threat assessment.

Security Training Platform
BunaByte Cybersecurity Bootcamp – A hands-on training program that teaches cybersecurity from fundamentals to advanced hacking through CTFs, labs, and real-world exercises.
Certifications
Professional certifications validating my expertise in cybersecurity

Google CyberSecurity Certified Professional (GCSP)
Completed eight courses developed by Google, covering Python, Linux, SQL, SIEM tools, and IDS.

Cybertalents Certified SOC Analyst (CCSOCA)
Cybertalents
Validates ability to understand and operate within a SOC environment, including real-time threat monitoring and incident response.

CyberTalents Certified Threat Hunter (CCTH)
Cybertalents
Advanced threat detection and response capabilities, specializing in proactively identifying and analyzing cyber threats.

CyberTalents Certified OSINT Analyst
Cybertalents
Validates ability to conduct intelligence-driven operations that support both offensive and defensive cybersecurity strategies.