Role: Offensive Security Researcher • Red Teamer • Security Toolsmith
Objective: Anticipate threats, identify weaknesses, and turn findings into stronger, smarter defenses.
I work at the intersection of offensive security, tooling, and applied research — replicating adversary tactics, developing purpose-built tools, and using the results to harden systems before real attackers arrive.
Each engagement is a focused security operation with a clear outcome: expose, understand, and eliminate risk.
- Red Team Operations: Network • Web • Mobile exploitation
- Security Hardening: Active Directory • CIS Benchmarks • Threat modeling
- R&D: Exploit automation • Misconfiguration detection • CVE correlation
- Cyber Education: Offensive/Defensive labs • Hands-on mentorship
🥈 2nd Place – Egyptian Junior Researcher Competition 2023
🛡 Bounty Hunter badge – HackerOne – Jun 2024
🎯 A1: Injection badge – HackerOne (Critical Injection Flaws) – May 2024
🐛 Insecticide – HackerOne (Duplicate vulnerabilities in LinkedIn & Airbnb) – May 2024
🔒 Private Programs – Critical findings in Nokia, Vulnmachines, trading platforms, and others
BashBard — AI shell assistant for red teamers
Features: Prompt-injection defense • Operational notes automation • Macro attack workflows
- Reported to: IBM • Nokia • Coca-Cola • IKEA • Airbnb • AT&T • Vodafone • Orange • LinkedIn • BugBountySA
- Specialties: Authentication bypass • Privilege escalation • Sensitive data exposure • Infrastructure misconfigurations
- Engagements: Bug bounty operations • Responsible disclosure • Private security audits
Teaching Assistant — Culture and Science City University
- Practical courses: IoT, Networking, Databases, Computer Architecture
- Built attack–defense simulation labs
- Trained students to plan and execute full exploitation workflows
