Skip to content
View jtlutabingwa's full-sized avatar

Block or report jtlutabingwa

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this userโ€™s behavior. Learn more about reporting abuse.

Report abuse
jtlutabingwa/README.md

๐Ÿ“Œ Summary

Iโ€™m a junior in Computer Science at UNC Charlotte with a concentration in Cybersecurity.
Passionate about technology and security, Iโ€™m building skills across programming languages and tools.

This portfolio highlights my hands-on projects, competitions, and achievements, reflecting my commitment to continuous learning and real-world application of cybersecurity skills.


๐Ÿ‘จโ€๐Ÿ’ป Projects


๐Ÿ† Competitions

HackTheBox: North Carolina Army National Guard CTF | Team Competition

Tools: Volatility3, Promon, Docker, Kali Linux, OSINT, Reverse Engineering, Digital Forensics, AI Exploitation, Web Exploitation

  • Collaborated with a team of 5 peers as part of UNC Charlotteโ€™s 49th Security Division in a Hack The Box Capture The Flag event hosted by the North Carolina Army National Guard, facing 23 collegiate teams.
  • Captured 15+ forensic and exploitation-based flags across multiple domains including OSINT, reverse engineering, digital forensics, and AI exploitation.
  • โœ… Placed 2nd overall โ€” demonstrating excellence in technical analysis, collaboration, and applied forensics under timed competition conditions.

Hack The Boo 2025 | Solo Competition

Tools: OSINT, Reverse Engineering, Digital Forensics, Web Exploitation, PWN, Crypto, Python, BinaryNinja, Ghidra, Wireshark, Kali Linux

  • Competed individually in Hack The Boxโ€™s annual Halloween-themed Capture the Flag competition.
  • Solved 15 out of 23 challenges spanning OSINT, reverse engineering, digital forensics, and exploitation techniques.
  • โœ… Placed Top 9% (259 / 2,893 participants) โ€” demonstrating growth in problem-solving, persistence, and technical adaptability across multiple cybersecurity domains.

Holmes CTF 2025 | Team Competition

Tools: Event Viewer, Wireshark, Ubuntu, VMware, PowerShell

  • Collaborated with a team of 5 peers in a week-long global Capture the Flag competition.
  • Solved 50 forensic/security tasks spanning Threat Intel, SOC, DFIR, and Malware Reversing.
    โœ… Placed Top 8% (634/7,085 teams) โ€” showcasing blue-team defense, forensics, and teamwork.

๐ŸŽ“ Certifications


๐Ÿ› ๏ธ Skills

Security Tools: Kali Linux, Splunk, Wireshark, Metasploit, Nmap, Suricata, John the Ripper, Windows Event Viewer, Volatility3
Programming/Scripting: Python, Java, C, SQL, Bash, PowerShell, HTML/CSS/JS
Systems & Platforms: Linux, Windows, IAM/IDM, Azure, Virtualization


๐Ÿค Connect With Me

LinkedIn

Popular repositories Loading

  1. jtlutabingwa.github.io jtlutabingwa.github.io Public

    My website for my ITIS 3135 class website. This includes assignments and projects. Included are The Conscious Closet and my Personal Website.

    HTML

  2. jtlutabingwa jtlutabingwa Public

  3. Kali-Linux-Malware-Analysis Kali-Linux-Malware-Analysis Public

    Hands-on malware delivery & analysis lab using Kali Linux and a Windows 10 VM; build exploits with Metasploit and investigate IOCs in Splunk.

  4. Holmes-CTF-2025 Holmes-CTF-2025 Public

    The write-up for the Holmes CTF 2025. It goes over each flag with a short explanation.

  5. Hospital-Management-Database-Project Hospital-Management-Database-Project Public

    A class project that designs and implements a Hospital Management Database System using SQL to manage patients, doctors, procedures, billing, and insurance through a fully relational and normalizedโ€ฆ