JOE / MUNENE
LOADING000%
Available for work

Hi, my name is

Joe Munene.

I build things that hack, think, and automate.

Full-Stack Developer

Software engineer focused on secure systems, full-stack development, and applied cybersecurity. Building tools that bridge the gap between offensive security and modern web development.

34 Repos
280 Commits
140,000+ LOC
Joe Munene
online · kenya
v2
portfolio

01. About Me

I'm Joe Munene, a software engineer and cybersecurity researcher based in Nairobi, Kenya. Currently pursuing Computer Science at Moi University, I specialize in building secure systems and developing tools that push the boundaries of what's possible.

My work spans across full-stack development, applied cybersecurity, and AI integration. I've built everything from penetration testing tools and vulnerability scanners to AI-powered coding assistants and SaaS dashboards.

When I'm not writing code, I'm researching emerging threats, contributing to open-source security tools, or exploring the intersection of machine learning and cybersecurity.

0
Public Repos
0+
Total Commits
140,000+
Lines of Code
0
Active Repos

/ Skills & Expertise

FRONTEND90%BACKEND82%CYBERSEC88%AI / ML78%DEVOPS70%SYSTEMS75%

Languages

TypeScriptJavaScriptPythonRustCHTML/CSSShell/BashSQLHCL

Frameworks

ReactNext.jsNode.jsTauriPyTorchPrismaPostgreSQLJupyterViteExpress

Cybersecurity

Penetration TestingEthical HackingCTFNetwork AnalysisVulnerability AssessmentCryptographySteganographyOSINTMemory ForensicsSIEM / SIGMAK8s Security Auditing

Tools

GitLinuxDockerTerraformYARANmapWiresharkBurp SuiteMetasploitVolatility

AI & ML

LLM IntegrationClaude APIGroqTransformer ModelsNLPDeep LearningMCP ServersAI Agent Policy / Sandboxing
0
Public Repos
0+
Total Commits
0
Lines of Code
0
Languages

02. Experience

03. Currently Building

An open-source cybersecurity-focused language model built from scratch in PyTorch. Completed Phase 1 training (10K steps) on CVEs, CTF writeups, and security research. Preparing for Phase 2 (100K steps).

Progress85%
Architecture Design
Data Pipeline
Tokenizer Training
Model Training (Phase 1)
Fine-tuning
Evaluation & Release

Highlights — Horizontal Scroll

01 / 04

linkdrop

iPhone ↔ Linux companion app — browse photos and files, see notifications, and mirror the screen. Ubuntu's answer to Phone Link. Cross-platform desktop build (Linux/macOS/Windows) with a daemon-backed pymobiledevice3 bridge. v0.7.1 shipped with CI-built .deb/.AppImage artifacts.

taurirustioslinuxdesktop
RustView details
02 / 04

GhostLM

An open-source cybersecurity-focused language model built from scratch in PyTorch. Decoder-only transformer trained 10K steps on CVEs, CTF writeups, and security research.

cybersecuritydeep-learninggptllmpytorch
PythonView details
03 / 04

Complex Developers CRM

The platform behind Complex Developers — public marketing site + admin CRM. Next.js 15 App Router with route-group isolation, Prisma on Postgres, JWT auth, and a portfolio page wired directly to the admin database so featured projects go live the moment they're flagged.

nextjsprismapostgresqlcrmsaas
TypeScriptView details
04 / 04

secure-mcp

MCP server exposing security tools to AI agents through a fail-closed policy pipeline — subprocess sandboxing, per-call audit trails, and YAML-defined authorisation gates. Drop-in for any LLM agent that wants to run offensive tooling safely.

mcpai-agentssandboxpolicycybersecurity
PythonView details

/ Code — live

Not a demo, not a gist — actual excerpts from shipped projects. Pick a sample or let it cycle.

ghostlm/attention.py
# Multi-head causal self-attention, hand-written in PyTorch.
typing • python0/987 chars

04. My Work

A curated selection of projects spanning cybersecurity, AI, web development, and automation tools. Each project reflects real-world problem solving and technical depth.

32 matches

linkdrop

iPhone ↔ Linux companion app — browse photos and files, see notifications, and mirror the screen. Ubuntu's answer to Phone Link. Cross-platform desktop build (Linux/macOS/Windows) with a daemon-backed pymobiledevice3 bridge. v0.7.1 shipped with CI-built .deb/.AppImage artifacts.

taurirustioslinuxdesktop
Rust

GhostLM

An open-source cybersecurity-focused language model built from scratch in PyTorch. Decoder-only transformer trained 10K steps on CVEs, CTF writeups, and security research.

cybersecuritydeep-learninggptllmpytorch
Python

Complex Developers CRM

The platform behind Complex Developers — public marketing site + admin CRM. Next.js 15 App Router with route-group isolation, Prisma on Postgres, JWT auth, and a portfolio page wired directly to the admin database so featured projects go live the moment they're flagged.

nextjsprismapostgresqlcrmsaas
TypeScript

secure-mcp

MCP server exposing security tools to AI agents through a fail-closed policy pipeline — subprocess sandboxing, per-call audit trails, and YAML-defined authorisation gates. Drop-in for any LLM agent that wants to run offensive tooling safely.

mcpai-agentssandboxpolicycybersecurity
Python

ghostguard

AI-agent security proxy — intercepts LLM tool calls, runs each through a 4-tier policy pipeline (allow/deny/rate-limit/review), and surfaces everything on a real-time dashboard with a full audit trail. YAML policies, zero app-side code changes.

ai-safetyproxypolicyauditobservability
Python

CyberBench

Open, reproducible benchmark for evaluating LLMs on cybersecurity reasoning. YAML-defined tasks (CVE triage, exploit-chain walkthroughs, CTF challenges), pluggable backends (Claude, Groq, local models), ranked leaderboard.

benchmarkllm-evaluationcybersecuritycve
Python

ghostaudit

Kubernetes Security Auditor — 23 CIS-based checks covering RBAC, pod security, secrets management, network policies, resource limits, and image provenance. CLI with HTML/JSON reports suitable for CI gates.

kubernetescis-benchmarkssecurity-auditdevsecops
Python

ghostforensics

Memory forensics automation — process analysis, injection detection, YARA scanning, and IOC extraction with STIX 2.1 export. Works standalone or as a Volatility3 wrapper.

dfirmemory-forensicsyaravolatilitystix
Python

ai-coding-assistant

An AI assistant which can create full stack website and also full stack applications.

aicoding-assistantfullstack
TypeScript
1

sentinelpulse

Real-time Threat Intelligence Dashboard for monitoring cybersecurity threats and vulnerabilities.

cybersecuritythreat-intelligencedashboard
JavaScript

DNS Lookup & Domain Intelligence

Professional cybersecurity engineering tool mirroring the investigative workflow used by security teams for domain reconnaissance.

dnsreconnaissancecybersecuritydomain-intelligence
Python

Port Scanner Pro

Beautiful, modern network port scanning dashboard with real-time updates, accurate results, and a polished UI built with React, Vite, and Node.js.

port-scannernetworkreactnodejs
JavaScript

More Projects

ghostsiem

Lightweight SIEM — log collection with SIGMA-based detection rules, real-time alerting, and event storage. Blue-team SOC automation that runs on a single box.

Python

securecommit

Pre-commit security hooks + code review — catches secrets, API keys, and insecure patterns before they reach your repo. Ships as pre-commit hook, GitHub Action, and standalone CLI.

Python

Advanced Port Scanner

Detect and analyze network vulnerabilities with multiple scan types and high-performance capabilities for secure assessments.

Python
1

Network Traffic Analyzer

Production-grade enterprise network security monitoring tool for SOCs with real-time packet capture, deep protocol analysis, and advanced threat detection.

Python
1

Vulnerabilities Scanner

Lightweight, extensible static scanner for source trees that finds common secrets and insecure patterns.

Python

Systems Thinking Notes

Notes and mental models on computation, security, and emerging technologies — focused on how systems behave, fail, and evolve over time.

Markdown

Caesar Cipher Tool

Classic Caesar cipher encryption/decryption tool with a modern web interface.

JavaScript

Hash Cracker

Professional hash-cracking and password auditing framework supporting MD5, SHA1, SHA256, SHA512, NTLM, bcrypt, PBKDF2 with dictionary, brute-force, and hybrid attacks.

Python
1

Keylogger

Advanced educational surveillance suite with keystroke logging, clipboard monitoring, geolocation tracking, periodic screenshots, and AES-encrypted reporting.

Python

Steganography Tool

Professional-grade steganography tool for hiding and extracting secret messages within digital images using the Least Significant Bit (LSB) technique.

Python

MAC Spoofer

Randomize, rotate, and manage MAC addresses with vendor spoofing, boot persistence, scheduled rotation, saved profiles, and a guided TUI.

Python

Metadata Scrubber

Tool for removing metadata from files to protect privacy and prevent information leakage.

Python

AI-Powered SaaS Dashboard

A modern SaaS dashboard web application with AI-powered analytics and insights.

TypeScript

ezCare Web App

A healthcare-focused web application providing digital care solutions.

TypeScript

Cyber Sec Agency

Aegis Cyber Defence — Full-spectrum security services website for governments, NGOs, and enterprises. From cyber to physical defense.

TypeScript

Logo Website

A professional logo design and showcase web platform.

TypeScript

Joe Learning Platform

An educational platform for teaching and sharing knowledge across various technical topics.

HTML

Ghost Dashboard v4

Automated GitHub analytics dashboard providing repository statistics, commit tracking, and developer insights.

Python

Ghost Toolkit Scripts

Collection of automation scripts for development workflows and system management.

Shell

Car Mods 3D

3D car modifications and customization project built with TypeScript.

TypeScript

/ Project Graph

Every repo, plotted. Lines connect projects that share topics or a primary language — a live map of how the work relates. Hover a node to trace its neighbors; click to open.

linkdropGhostLMComplex Developers CRMsecure-mcpghostguardCyberBenchghostauditghostforensicsghostsiemsecurecommitai-coding-assistantsentinelpulseDNS Lookup & Domain …Port Scanner ProAdvanced Port ScannerNetwork Traffic Anal…Vulnerabilities Scan…Systems Thinking NotesCaesar Cipher ToolHash CrackerKeyloggerSteganography ToolMAC SpooferMetadata ScrubberAI-Powered SaaS Dash…ezCare Web AppCyber Sec AgencyLogo WebsiteJoe Learning PlatformGhost Dashboard v4Ghost Toolkit ScriptsCar Mods 3D
featuredother194 links

Contribution Activity

MonWedFri
Less
More

05. Thoughts & Writing

Feb 2026|
7 min

Network Reconnaissance: Building a DNS Intelligence Tool

A deep dive into building a professional-grade domain intelligence tool that mirrors real security team workflows for DNS reconnaissance and threat investigation.

CybersecurityDNSOSINT
Coming soon
Jan 2026|
6 min

From Port Scanning to Threat Detection: Lessons in Network Security

What building three different network security tools taught me about packet analysis, vulnerability assessment, and the reality of enterprise SOC operations.

Network SecuritySOCTools
Coming soon

06. What's Next?

I'm always open to discussing new projects, cybersecurity research collaborations, or opportunities to contribute to your team. Whether you have a question or just want to say hello, my inbox is always open.

Opens your email client. Or DM me directly: joemunene984@gmail.com

Designed & built by Joe Munene
Powered by Next.js, Tailwind CSS & Framer Motion
Nairobi, KE
--:--:-- EAT
1.2921° S   36.8219° E