Skills
My technical skills and expertise
Professional Skills
Reverse Engineering
IntermediateDisassembling binaries to uncover their inner mechanics, manipulate program behavior, and reveal what developers never intended to be seen.
Web Application Penetration Testing
IntermediateWeb vulnerability discovery and exploitation of injection and logic bugs.
Network Penetration Testing
IntermediateNetwork discovery and exploitation of misconfigurations, Linux privilige escalation.
Frontend Development
AdvancedWorked as a front-end development both corporate and freelance before moving to security.
security (5)
Reverse Engineering
IntermediateDisassembling binaries to uncover their inner mechanics, manipulate program behavior, and reveal what developers never intended to be seen.
Malware Analysis
IntermediateStatic and dynamic analysis of malicious code.
Penetration Testing
IntermediateWeb and Network exploit reconnaissance and vulnerability discovery.
Web Application Penetration Testing
IntermediateWeb vulnerability discovery and exploitation of injection and logic bugs.
Network Penetration Testing
IntermediateNetwork discovery and exploitation of misconfigurations, Linux privilige escalation.
programming (5)
C
AdvancedSystems programming, low-level memory operations.
Javascript
AdvancedUnderstanding browser-based attack surfaces such as XSS, DOM manipulation vulnerabilities, and payload crafting for client-side exploitation.
Python
AdvancedAutomation, scripting, offensive tooling.
x86 Assembly
IntermediateInstruction-level analysis and debugging.
Zig
BeginnerSystems programming and performance experiments.
Tools (4)
IDA Pro
IntermediateAdvanced disassembly and static analysis.
Debugging
IntermediateWindows and Linux debugging using x64dbg, gdb, WinDbg.
Burp Suite
IntermediateWeb vulnerability discovery and exploitation.
Metasploit
IntermediateExploitation framework and offensive modules.
Offensive Operations (2)
Linux Privilege Escalation
IntermediateIdentify and exploit Linux misconfigurations and vulnerabilities — SUID binaries, sudoers issues, weak services and kernel exploits — to gain higher privileges on target hosts.
Active Directory Exploitation
BeginnerAbuse Active Directory misconfigurations and protocols (Kerberos, LDAP, ACLs, GPO) to escalate privileges, perform delegation attacks and establish persistence inside Windows domains.
Other (1)
Frontend Development
AdvancedWorked as a front-end development both corporate and freelance before moving to security.
achievements (1)
Mont5ab El2hwa
IntermediateCTF Player focused on RE & Malware categories.