Skip to content
View 5afagy's full-sized avatar

Block or report 5afagy

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
5afagy/README.md

terminal animation

I don’t talk much. My work does the talking.

🛰 Mission Brief

Role: Offensive Security Researcher • Red Teamer • Security Toolsmith
Objective: Anticipate threats, identify weaknesses, and turn findings into stronger, smarter defenses.

I work at the intersection of offensive security, tooling, and applied research — replicating adversary tactics, developing purpose-built tools, and using the results to harden systems before real attackers arrive.
Each engagement is a focused security operation with a clear outcome: expose, understand, and eliminate risk.

🎯 Core Capabilities

  • Red Team Operations: Network • Web • Mobile exploitation
  • Security Hardening: Active Directory • CIS Benchmarks • Threat modeling
  • R&D: Exploit automation • Misconfiguration detection • CVE correlation
  • Cyber Education: Offensive/Defensive labs • Hands-on mentorship

🏆 Achievements

🥈 2nd Place – Egyptian Junior Researcher Competition 2023
🛡 Bounty Hunter badge – HackerOne – Jun 2024
🎯 A1: Injection badge – HackerOne (Critical Injection Flaws) – May 2024
🐛 Insecticide – HackerOne (Duplicate vulnerabilities in LinkedIn & Airbnb) – May 2024
🔒 Private Programs – Critical findings in Nokia, Vulnmachines, trading platforms, and others

🛠 Offensive Tool Arsenal

BashBard — AI shell assistant for red teamers
Features: Prompt-injection defense • Operational notes automation • Macro attack workflows

🔍 Security Impact

  • Reported to: IBM • Nokia • Coca-Cola • IKEA • Airbnb • AT&T • Vodafone • Orange • LinkedIn • BugBountySA
  • Specialties: Authentication bypass • Privilege escalation • Sensitive data exposure • Infrastructure misconfigurations
  • Engagements: Bug bounty operations • Responsible disclosure • Private security audits

🎓 Educator & Mentor

Teaching Assistant — Culture and Science City University

  • Practical courses: IoT, Networking, Databases, Computer Architecture
  • Built attack–defense simulation labs
  • Trained students to plan and execute full exploitation workflows

⚙️ Tech Stack

📈 GitHub Activity

GitHub stats GitHub streak

📡 Contact

Profile views

Pinned Loading

  1. BashBard BashBard Public

    An AI-powered Linux shell tutor and command storyteller

    Python 8 3

  2. 360-Scan 360-Scan Public

    Python

  3. OmniPentest OmniPentest Public

    Python