╔══════════════════════════════════════════════════════════╗ ║ ║ ║ ██████╗ ██╗ ██╗██╗ ██╗ ██████╗ ██╗ ██╗ ║ ║ ██╔══██╗╚██╗ ██╔╝╚██╗ ██╔╝██╔═══██╗██║ ██║ ║ ║ ██████╔╝ ╚████╔╝ ╚████╔╝ ██║ ██║██║ ██║ ║ ║ ██╔══██╗ ╚██╔╝ ╚██╔╝ ██║ ██║██║ ██║ ║ ║ ██████╔╝ ██║ ██║ ╚██████╔╝███████╗██║ ║ ║ ╚═════╝ ╚═╝ ╚═╝ ╚═════╝ ╚══════╝╚═╝ ║ ║ ║ ║ >>> ROOT ACCESS GRANTED <<< ║ ╚══════════════════════════════════════════════════════════╝
"I speak C to the metal, JavaScript to the browser, and packets to the wire."
I'm a self‑taught Systems Engineer & Ethical Hacker from Cameroon. I don't trust abstractions – I build them, then break them.
My day oscillates between:
🔥 Writing pure C AI engines with zero dependencies 💀 Pentesting web apps, networks, and IoT firmware 🕸️ Crafting Laravel/Python/Node.js backends with hardened security 🛡️ Hunting bug bounties to make the web less vulnerable ⚡ JavaScript frameworks (React, Vue, Angular) for full‑stack exploitation & defense
I believe the best defense is understanding the offense – from kernel exploits to XSS payloads.
> Building a Long-Term Memory engine for autonomous AI agents > Zero dependencies | Pure C | Embedded ready ✔ Binary vector storage – direct disk I/O, no parsing overhead ✔ Custom similarity math – hand-rolled cosine & distance ✔ Runs on under 64MB RAM – edge & IoT hardware ✔ Crash recovery & memory maps Why C? Because true AI efficiency starts at the metal – not inside a bloated VM.
| Category | Skills | Tools |
|---|---|---|
| Web Pentesting | XSS, SQLi, CSRF, SSRF, IDOR | Burp, Nuclei, Dalfox |
| Network | Port scanning, MITM, evasion | Nmap, Masscan, Bettercap |
| API Security | JWT attacks, GraphQL introspection | Postman, GraphQL Voyager |
| Mobile | SSL pinning bypass, dynamic analysis | Frida, Objection, MobSF |
| Cloud | S3 misconfigs, IAM privesc | Pacu, ScoutSuite |
🔥 Notable finds: Critical RCE & Auth bypass across private/public programs.
| Area | Tech Stack | Security Hardening |
|---|---|---|
| Backend | PHP, Laravel, Python, Node.js | Input validation, CSP, rate limiting |
| Frontend | React, Vue, Angular, TS | XSS prevention, secure state |
| Database | MySQL, PostgreSQL, MongoDB | Param queries, encryption at rest |
| Networking | TCP/IP, VLANs, firewalls, IDS/IPS | Zero‑trust segmentation |
| Hardware | PC/Server repair, Pi, IoT | Secure boot, firmware signing |
🧠 GitHub – my commits are my resume 📍 Cameroon – building for global impact from Central Africa 🔐 PGP – ask for fingerprint (encrypted collab only) 🕸️ H1/Bugcrowd – @Buyoli (private invites)
Systems Engineer Cameroon AI in C Laravel Python DBMS Network Admin Hardware Maintenance Edge AI Low‑level Full‑stack C-Agent-LTM Bug Bounty Pentesting Cybersecurity Ethical Hacker React Vue Angular Node.js Burp Suite Nmap Metasploit
⚡ From silicon to server, from browser to kernel – I build, break, and secure.
$ echo "HACK THE PLANET" | lolcat 2>/dev/null || echo "[+] GLITCH MODE ACTIVE"