This section is currently under construction. Stay tuned for exciting updates!
I am Prince Kwesi Lassey, an Emerging Cybersecurity Professional with a deep passion for safeguarding digital ecosystems and empowering communities against cyber threats in these evolving times. I have cultivated a robust skill set in penetration testing, web application security, network security, vulnerability analysis, and incident response through through structured mentorship, intensive bootcamps and hands-on labs. These experiences enable me to identify vulnerabilities, mitigate risks, and respond effectively to cyber incidents. My journey into cybersecurity was sparked by a personal mission to protect the vulnerable, driven by witnessing the devastating impact of social engineering on a loved one. Currently, I’m revisiting my extensive lab work to document my findings and I am also developing a password checker tool which goes beyond strength checks, aims to help users evaluate password strength and detect compromised credentials to promote stronger cyber hygiene.
My long-term vision is to become a versatile Cybersecurity Analyst, specializing in SOC Analysis, Penetration Testing, Threat Intelligence, Digital Forencics & Incidence Response. I am committed to mastering both offensive and defensive security techniques to build expertise. By deepening my knowledge in cybersecurity tools and methodologies, I aim to stay ahead of evolving cyber threats and contribute to digital resilience. I’m excited to bring my skills to a dynamic team where I can continue learning, contribute to secure solutions, pursue internships, and engage in mentorship opportunities to accelerate my growth as a cybersecurity professional and to make a meaningful impact to society. My mission is simple: To defend the vulnerable, protect digital spaces by contributing to cutting-edge security solutions, and building a resilient digital future.
Ethical Hacking & Penetration Testing
Identifying weaknesses like unpatched software or insecure credentials through ethical simulations with tools like Metasploit and Hashcat thereby enabling organizations to remediate risks proactively, bolstering defenses against unauthorized access and reducing the likelihood of successful cyberattacks.
Network Security & Monitoring
Securing network environments and monitoring network traffic using tools like Nmap and Wireshark to identify vulnerabilities, enforce robust configurations and ensure the prevention of unauthorized access and data interception thereby maintaining reliable and secure communication channels that protect organizational assets from network-based threats.
OSNIT & Threat Intelligence
Gathering intelligence and analyzing compromised systems using tools like Recon-ng, SpiderFoot and Shodan to profile threat actors and uncover attack origins thereby delivering actionable insights for organizations to proactively defend against future incidents and mitigate risks.
Web App Testing & Vulnerability Assessment
Identifying and ddressing critical vulnerabilities in web apps using tools like SQLmap and BurpSuit to reduce the risk of data breaches and enhancing user trust.
Scripting & Automation
Building skills in Python for automation, threat detection, and data parsing. Fortran for scientific data analysis and meteorological applications, and Bash scripting for Linux automation to enhance cybersecurity workflows.
SCOPE | SKILL | LAB/PROJECT |
---|---|---|
Ethical Hacking & Penetration Testing | SQL Injection / Exploiting Web Server directory indexing Vulnerablilities / Exploiting open SMB Server shares exposing weak share permissions |
LINK |
 | Password Cracking on Open Source System |
LINK |
 | Analyze Exploit Code |
LINK |
Network Security & Monitoring | Intercepting Network Traffic With Ettercap / Network Sniffing With Wireshark / Network Monitoring & Attack Detection |
LINK |
 | WiFi Hacking |
LINK |
 | Packet Crafting With Scapy |
LINK |
OSNIT & Threat Intelligence | Using OSNIT tools |
LINK |
 | Cross Site Scripting |
LINK |
Web App Testing & Vulnerability Assessment | Website Hacking - Accessing Admin Panel |
LINK |
 | CCTV System Hacking |
LINK |
Scripting & Automation | Automation with Bash |
LINK |
Crytography | Encrypting and Decrypting Data Using OpenSSL |
LINK |
 | Using Steganography To Hide Data |
LINK |
Incident Response & Digital Forensics | Classifying Alerts |
LINK |
 | Autopsy Forensic Analysis |
LINK |
 | Incident Handling |
LINK |
Endpoint & Cloud Security | Hardenining a Linux System |
LINK |
 | System Hacking |
LINK |
 | - | LINK |