Skip to content
View Chinuaoku's full-sized avatar
😎
😎

Block or report Chinuaoku

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Chinuaoku/README.md

Hi there 👋

Welcome to my Github profile. Below is a brief summary about myself.

I am a Doctor of Veterinary Medicine (DVM) graduate from the University of Nigeria, Nsukka, with a passion for digital technology, cybersecurity, and business development. My expertise lies in leveraging AI-driven software solutions and secure digital infrastructure to build scalable products that drive impact.

As a technical executive at Afiaprime Lab, I co-lead the development of Afiaprime (e-commerce), Cerebrum (medical technology), and AfiaEat (food delivery)—platforms designed to bridge critical service gaps in underserved markets. My role encompasses technical strategy, product innovation, cybersecurity, and business scaling, ensuring our platforms remain efficient, secure, and investor-ready.

I am particularly focused on scalable business growth, strategic partnerships, and technology-driven solutions that empower rural and emerging markets. With a strong foundation in cybersecurity and full-stack software development, I bring a holistic approach to digital transformation, ensuring both technological excellence and commercial viability. Connect with me and take a look at my LinkedIn for more details.

Skills

  1. Oral and written communication
  2. Active and Passive reconnaisance
  3. Network traffic monitoring and analysis
  4. Python, sql, bash scripting, html, css, javascript, NodeJS, ReactJS, Typescript
  5. AWS, GCP, Supabase, Vercel, Coolify
  6. Task automation
  7. Penetration testing/ethical hacking
  8. Active directory
  9. Identity and access management
  10. Cloud security
  11. Business analysis and development
  12. Leadership and mentoring
  13. Critical thinking
  14. Cybersecurity exam item development.

Tools

Category list
Training CISCO Networking, HACKTHEBOX, TryHackMe, Letsdefend, Udacity, Google, Coursera, Amazon SkillBuilder
Traffic and packet analysis Wireshark, TCPDump
Penetration testing/hacking Burpsuite, Metasploit, Zed Attack Proxy, SQLmap
Network scanning/analysis NMAP, Zenmap, Netcat, ARP
Vulnerability scanning NIKTO, OPENVAS, Nessus, DirBuster
Data Modification CYBER CHEF
Social Engineering/Phishing SET, shellphish, Gophish
SIEM Splunk, Google Chronicle, EDR, Log management, IBM Qradar, FortiSIEM, ArcSight
Reconnaissance whois, DIG, OSINT, SHODAN, SPIDER
Brute force Gobuster, hydra, John, networkminer,
Malware analysis VirusTotal, Remnux, any.run
IP address analysis IP checker, arin.net
Coding vscode, Google Colab

Certifications

  1. Google Cybersecurity Professional Certificate
  2. ISC2 Certified in Cybersecurity
  3. Cisco Ethical Hacker Certificate
  4. Udacity Enterprise Security
  5. Comptia Security - in view
  6. CISSP - in view

Pinned Loading

  1. Fundamentals-of-Python Fundamentals-of-Python Public

    Follow and check this repository to learn the basics of python. It is self explanatory and easy to understand.

    Jupyter Notebook 2

  2. Python-Data-Structures Python-Data-Structures Public

    This repository will teach you how to manipulate different forms of data using python

    Jupyter Notebook 1

  3. Afiaprime-Lab Afiaprime-Lab Public

    Non-profit organization helping young Africans gain skills in Cybersecurity, Data Analysis and Software Development

    HTML 1

  4. Drug-Dose-Calculator Drug-Dose-Calculator Public

    This project is aimed at providing an easy-to-use tool to enable medical practitioners and students easily calculate drug dose.

    JavaScript 1

  5. ClearML-Vulnerability-Blurry- ClearML-Vulnerability-Blurry- Public

    This is about exploiting insecure pickle files. It was disclosed that an attacker could create a pickle file which contains an arbitrary code and upload it as an artifact to a project via the API.

    Python 2

  6. FormulaX-XSS-RCE FormulaX-XSS-RCE Public

    XSS, RCE, Tunneling & Pivoting

    JavaScript 3