Hi There,
I'm Habtamu Bitew Gashu

i am into

About Me

About Me

I'm Habtamu Bitew Gashu

Full Stack Developer

I am a Full-Stack developer and Android app developer based in Addis Ababa, Ethiopia. I hold a BSc in Software Engineering from Wachemo University (2020–2025, CGPA 3.03). I am passionate about building innovative applications and websites, with expertise in Laravel, Java, and embedded systems. My projects include web applications like the Prison Information Management System and Android apps like Campus Compass. I also engage in self-taught cybersecurity, focusing on ethical network testing and SQL injection vulnerability assessments, with detailed logs of my testing efforts.

email: Habtsha2021@gmail.com

place: Addis Ababa, Ethiopia

Skills & Abilities

HTML
CSS
JavaScript
PHP
Laravel
Java
C++
MySQL
Networking
SQL Injection Testing

My Education

Education is not the learning of facts, but the training of the mind to think.

Bachelor of Science in Software Engineering

Wachemo University

2020–2025 | CGPA: 3.03

Passed the National Exit Exam with a score of 77% on June 20, 2025

High School

Damot Secondary School

2017–2020 | Completed

Elementary School

Bata Elementary School

2009–2016 | Completed

Projects Made

Prison Information Management System

Developed a web application to manage prisoner records, visit requests, room allocations, and user roles using Laravel, Blade, JavaScript, and MySQL.

Clearance Management System

Built a system to digitize clearance processes for Bahir Dar University using Laravel and MySQL.

Campus Compass (Android App)

Developed an Android app for campus navigation, locating places like dormitories and classrooms.

Real Estate Management System

Created a platform for property listing and communication using Java Servlet and Java GUI.

Smart Home Embedded System

Built a prototype to monitor temperature/humidity and control doors with RFID and sound detection.

Smart Stove Project

Designed a mobile-controlled cooking system, awarded in a 2010 school innovation competition.

View All

Experience

Bahir Dar University

Software Developer Intern

April 2024 - July 2024

Contributed to the development of the Clearance Management System and Library Management System, digitizing administrative tasks for staff and students using Laravel and MySQL.

Self-Driven Cybersecurity Challenges

Independent Study

Ongoing

Conducted ethical testing of vulnerabilities in controlled test environments, focusing on SQL injection. Successfully identified a blind SQL injection vulnerability in a sample web application login form, using payloads like ' OR 1=1 -- to bypass authentication, and recommended input sanitization and prepared statements to mitigate risks.

Local Innovation Program

Smart Stove Project - School Innovation Competition

2010

Designed a smart cooking system controllable via mobile call, awarded 3,000 Birr and a certificate of appreciation.

View All

Cybersecurity Logs

The cybersecurity logs presented here are a result of my hands-on experience during my time at Wachemo University (2020–2025). Through ethical network scanning, I identified and tested individual websites hosted within the university's infrastructure. These tests, conducted in controlled environments, focused on uncovering vulnerabilities such as SQL injection to enhance system security.

Test ID Date Environment Vulnerability Type Payload Example Mitigation Suggested Status View Log
SQL-2025-001 2025-03-10 Local Test Web App Boolean-Based Blind SQL Injection ' OR 3914=3914# Use parameterized queries, input validation Mitigated
SQL-2025-002 2025-03-10 Local Test Web App Error-Based SQL Injection ' AND (SELECT ... FLOOR(RAND(0)*2)) Implement error suppression, parameterized queries Reported
SQL-2025-003 2025-03-10 Local Test Web App Time-Based Blind SQL Injection ' AND SLEEP(5) Use ORM frameworks, validate inputs In Progress
SQL-2025-004 2025-03-10 Travel Management System Boolean-Based Blind SQL Injection ' OR NOT 9157=9157-- Use parameterized queries, input sanitization Reported
SQL-2025-005 2025-03-10 Travel Management System Time-Based Blind SQL Injection ' AND SLEEP(5)-- Validate inputs, use ORM frameworks In Progress
SQL-2025-006 2025-03-10 User Registration System Error-Based SQL Injection ' AND (SELECT ... FLOOR(RAND(0)*2))-- Suppress error messages, use prepared statements Mitigated
SQL-2025-007 2025-03-10 Bus Management System UNION Query SQL Injection ' UNION ALL SELECT NULL,...,NULL# Implement input validation, parameterized queries Reported

Know Me

Get in Touch