Cybersecurity practitioner building from Africa. Penetration testing, DFIR, malware analysis, recon automation — hands-on, not just theory.
Systems fail in interesting ways. Every system is built on assumptions. Security begins where those assumptions stop being true. I study how systems behave when pushed beyond what they were designed for. Most of my best learning moments start with one question: what happens if this is used in a way it was never meant to be?
I'm Leo, (r3tro_n3o). I got into this because people around me were getting scammed, SIM-swapped, defrauded, and I wanted to understand the mechanics behind the attacks, not just be another victim. Watching a friend get SIM-swapped and not being able to do anything about it hit different. Curiosity turned into obsession pretty fast after that.
I started self-directed: Cybrary, OverTheWire, TryHackMe, HackTheBox; no roadmap, just stubbornness. Then I went through AfricaHackon's full curriculum: Linux fundamentals, recon and OSINT, networking, Windows and Active Directory, wireless pentesting, Python and Bash scripting, web and API security (OWASP Top 10), mobile security, cloud security (AWS, IAM, VPC), malware creation and analysis, polymorphic crypters, process hollowing, C2 via steganography, EDR evasion, anti-analysis techniques, kernel rootkits, GRC, incident response, threat hunting, and blue team essentials. The whole stack, hands-on.
I'm especially drawn to offensive security because it forces a different kind of thinking. You have to get inside the attacker's logic, understand their assumptions, then exploit them. That mindset is what I'm building. I also have a genuine passion for cloud security and automations; connecting tools, building pipelines, making security work smarter.
Long term, I'm building towards Secure Core; a company built around reducing cybercrime from the ground up. But first, I want to be sharp enough that when I say I do security, it actually means something. Currently in sprint mode. One project a day. Eyes on CPTS.
Passive enumeration, active probing, traffic analysis. Understanding the target before anything else.
Building vulnerable environments to understand attacks. Parsing logs to detect what attackers leave behind.
Finding what attackers find in the cloud. Deploying traps. Automating intelligence pipelines.
Click any module to expand. Not what I know — how I apply it.
Breaking down concepts, documenting labs, and sharing what I learn. No fluff — just the process.
Open to internships, freelance security work, bug bounty teams, CTF collabs, and anyone building something interesting in the security space.