Red Teamer | Penetration Tester | Exploit Developer
- π― Specialized in Red Team Ops, Active Directory attacks & Cloud pentesting
- π οΈ I build custom offensive security tools β C2 frameworks, AD labs, automated pentest pipelines
- βοΈ Cloud security across AWS, GCP & Azure β IAM exploitation, container escape, serverless attacks
- π TryHackMe Top 1% globally | 200+ challenges completed
- π Writing pentesting methodology breakdowns on Medium
- π BSc ECE @ RUET | Graduating 2026
| Project | Description |
|---|---|
| π΄ AD Attack Lab | Vulnerable AD env with Kerberoasting, DCSync, Golden Ticket automation |
| π€ Auto Pentest Framework | End-to-end recon β exploit β report pipeline |
| βοΈ Cloud Pentest Toolkit | AWS/GCP/Azure exploitation β SSRF, IAM escalation, S3 enum |
| π·οΈ Web Vuln Scanner | SQLi, XSS, Auth bypass scanner β 85% accuracy vs commercial tools |
| π‘ C2 Framework | Encrypted HTTPS C2 with AV evasion & process injection (lab use) |
| πΆ WiFi Security Toolkit | WPA2 cracking, evil twin, deauth, captive portal harvesting |
-
CEH β EC-Council
-
GCP Professional Cloud Security Engineer β Google
-
TryHackMe Top 1% Global
-
π« How to reach me azizabid240@gmail.com
