George Kinyanjui

George Kinyanjui

Ctf player

Followers of George Kinyanjui1000 followers
location of George KinyanjuiNairobi, Nairobi County, Kenya

Connect with George Kinyanjui to Send Message

Connect

Connect with George Kinyanjui to Send Message

Connect
  • Timeline

  • About me

    Ctf player || Security Analyst || Ctfroom: rank 94 global :ID-mR_r0b0t || Bugbounty hunter || Game hacker -memory hacks || Mobile developer [react native] | Web3 dev 🌐👩‍💻🤑

  • Education

    • St. Paul's University

      2021 -
      Bachelor degree in Computer science Software development
    • Cisco Networking Academy

      2024 -
      System, Networking, and LAN/WAN Management/Manager 95.27% A

      Activities and Societies: Configure switches and end devices to provide access to local and remote network resources. Configure routers to enable end-to-end connectivity between remote devices. Create IPv4 and IPv6 addressing schemes and verify network connectivity between devices Explain how the upper layers of the OSI model support network applications. Configure a small network with security best practices. Troubleshoot connectivity in a small network.

    • St. Paul's University

      2024 - 2028
      Computer and information systems Computer and Information Systems Security/Information Assurance
    • St. Paul's University

      -
      Computer information systems Computer and Information Systems Security/Information Assurance
  • Experience

    • CTFROOM.com

      Jan 2020 - May 2024
      Ctf player

      Capture the Flag (CTF) Competitor | CTFROOM | Ranked 87 GloballyI have actively participated in Capture the Flag (CTF) competitions on CTFROOM, achieving a global ranking of 87. These competitions have allowed me to hone my skills in cybersecurity, problem-solving, and teamwork.Key Achievements:-Achieved a global ranking of 87, demonstrating a high level of expertise and dedication.-Successfully solved a wide range of challenges, including cryptography, reverse engineering, web exploitation, forensics, and more.-Continuously improved my technical skills and knowledge through participation in various CTF events.Skills Developed:-In-depth understanding of cybersecurity principles and techniques.-Proficiency in using tools and frameworks such as Burp Suite, Ghidra, Wireshark, and custom scripts for challenge-solving.-Strong analytical skills and the ability to think creatively to tackle complex security challenges.Experience in working under pressure and within tight time constraints to solve problems effectively. Show less

    • HackerOne

      Jan 2023 - now
      Bugbounty hunter

      Key Achievements:-Discovered and responsibly disclosed critical vulnerabilities in web applications, APIs, and mobile apps.-Earned top rankings and rewards, showcasing my expertise in penetration testing and ethical hacking.-Collaborated with security teams to ensure timely and effective resolution of identified issues.-Enhanced my knowledge of cybersecurity threats and defenses through continuous learning and practical application.Skills Developed:-Proficiency in tools such as Burp Suite, Nmap, Wireshark, and various scripting languages.-Strong understanding of OWASP Top Ten vulnerabilities and mitigation strategies.-Expertise in web application security, including XSS, SQL injection, CSRF, and more.-Ability to think like an attacker and identify creative exploitation techniques. Show less

    • NahamCon CTF 2024

      May 2024 - May 2024
      Ctf player

      Participant | NahamCon CTF 2024-Competed in the NahamCon Capture The Flag (CTF) competition, a premier cybersecurity event that attracts participants from around the globe. Demonstrated strong problem-solving skills, cybersecurity knowledge, and persistence in tackling a variety of challenging security scenarios.Key Achievements:-Ranked 1378th out of 2653 participants globally as a solo competitor, showcasing my ability to tackle complex security challenges independently.-Successfully solved a wide range of CTF challenges, including cryptography, reverse engineering, web security, and binary exploitation.-Gained hands-on experience with real-world security vulnerabilities and exploitation techniques.Skills Developed:-Enhanced my proficiency in cybersecurity tools and techniques, including Python scripting, network analysis, and penetration testing.-Deepened my understanding of various security concepts and vulnerabilities.-Improved my analytical thinking and ability to work under pressure in a competitive environment.Impact:Demonstrated commitment to continuous learning and professional development in the field of cybersecurity.Built a stronger foundation in practical cybersecurity skills applicable to real-world scenarios.Established connections with other cybersecurity enthusiasts and professionals through the competition.Verification:Confirmed ranking and participation can be viewed on the official NahamCon CTF scoreboard: link: https://ctf.nahamcon.com/scoreboard Show less

  • Licenses & Certifications