Cybersecurity researcher, malware analyst, open-source toolmaker, and writer. I spend most of my time reasearching malware, building tools that automate the boring bits, and writing about it so the community can benefit.
I’ve been working at the intersection of offensive security research and defensive engineering for some time now. My day-to-day involves malware research, and building tools that helps security teams move faster.
I run The Malware Files, a publication on Medium where I and other analysts deep-dive into malware campaigns, families, and techniques. I also publish tutorials on FreeCodeCamp covering practical cybersecurity and Rust concepts.
Right now my main projects are Anya (a static malware analysis platform based in Rust) and Stegcore (a cryptography-steganography). Both are open source, and you can find them in my projects page.
I’m available for consulting, security research collaborations, and writing commissions. Feel free to get in touch.
A Medium publication covering active malware campaigns, reverse engineering walkthroughs, and threat actor research. Deep technical dives written for analysts, not executives. Every post comes with IOCs, YARA rules, and reproducible methodology.
Read on Medium ↗Long-form practical tutorial on offensive security techniques, and the occasional programming article.
Shorter takes on the state of the security industry and observations from the field. Less technical than the blog, but still opinionated.
Security-focused articles covering practical defensive techniques and security challenges faced by real people and organisations.
Building security awareness and education across the continent, and contributing to the next generation of African security researchers and practitioners.