CEH v12 certified · Open to security roles worldwide

Penetration tester
& developer from Ghana.

I’m Frank — a cybersecurity professional and CS student at GCTU, CEH v12 certified. I find vulnerabilities, exploit systems in controlled environments, and build secure platforms that hold up under attack. Security isn’t just what I study — it’s how I think.

Scroll to explore
Certification
CEH v12 — EC-Council Jun 2026
Specialisation
Penetration testing Web · Network · Wireless
Education
BSc CS — GCTU Expected 2026
Based in
Accra, Ghana Open worldwide
About me

I break things to understand them.
Then I build them better.

Started in competitive music — trumpet, organ, staff notation — and brought the same pattern recognition and discipline into cybersecurity. I’m equally comfortable in a terminal running Metasploit as I am writing a FastAPI backend.

Interned at the Directorate of Information Technology, Ghana Armed Forces. CEH v12 certified through Educ8Africa Ghana. Building real tools, not just studying theory.

0 CTF challenges
0 Security tools
0 Scanner modules
0 Attack domains
🔍 Recon & OSINT 💣 Exploitation 📡 Wireless attacks 🧬 Malware analysis 🕸️ Web app testing 🛡️ Blue team
Security projects

Platforms built with attack & defence in mind.

All 14 projects
// Also ships production web, mobile & AI platforms — DelkaAI, Snafrate, PROMEX, Swypply & more. See all projects
Security toolkit

Tools I use in the field.

Full skill set

Offensive tools / 16+

MetasploitNmap Burp SuiteAircrack-ng SQLMapTHC-Hydra HashcatGoPhish

OSINT & recon / 06

MaltegoShodan theHarvesterWireshark EttercapGhidra

Attack domains / 12+

Penetration testingOSINT & recon Privilege escalationWireless attacks MITM / ARP spoofingSocial engineering

// Also codes in Python, PHP, JavaScript, Kotlin — all security tooling is backed by real dev ability.

Security services

How I can protect your systems.

All services
🔐

Penetration Testing

Web app, network, and wireless security assessments with a structured professional report, severity ratings, and step-by-step remediation.

Web App Network Wireless Full Report
🛡️

Security Audit

Code review and application assessment against OWASP Top 10. Covers misconfigured headers, exposed endpoints, weak auth, and insecure data handling.

OWASP Top 10 Code Review Auth Audit Headers
🌐

Secure Development

Full-stack platforms built security-first — proper auth, rate limiting, input validation, and encrypted storage from line one. Not bolted on after.

FastAPI Laravel Argon2id JWT Auth

Ready to test your defences?

Available for penetration testing engagements, security audits, and secure development work — remotely or in Accra, Ghana.