SYSTEM_BOOT_SEQUENCE
Ethical Hacker & Researcher

Thinking Like
The Adversary.

I assist organizations in securing their infrastructure by identifying vulnerabilities before malicious actors do. Specializing in Web Application Security and Network Penetration Testing.

guest@ismail-tp: ~
guest@ismail-tp:~$

My Methodology

I don't just run tools. I follow a rigorous lifecycle to ensure comprehensive coverage.

01

Recon

Passive & active footprinting to map the attack surface.

02

Mapping

Identifying technology stacks, entry points, and logic flows.

03

Discovery

Hunting for misconfigurations, CVEs, and logic flaws.

04

Exploitation

Verifying vulnerabilities with safe, controlled payloads.

05

Reporting

Documenting findings with remediation steps for developers.

Offensive Capabilities

My expertise is divided into understanding vulnerabilities (Concepts) and the software used to exploit them (Arsenal).

Web Security

OWASP Top 10XSSSQL InjectionIDORSSTIAuth Bypass

Network & Infra

Port ScanningService EnumerationSubnettingTraffic AnalysisMan-in-the-Middle

The Arsenal

BurpSuite NmapWiresharkMetasploitGhidraPythonBash

Practice Platforms

PortSwigger Academy Active Learner
Hack The Box Rank: Script Kiddie
TryHackMe Top 20%

Featured Operations

Live Impact: 200+ Students

Shadow Code

Developed a mobile-web simulation to teach malware logic. Used by over 200 students to understand infection vectors.

Educational ToolSimulation Logic
Live Tool

IP Subnet Calculator

Built a utility for network architects to calculate CIDR notations and IP ranges, streamlining recon.

NetworkingJavaScript
Live

Void Networking Roadmap

Designing an interactive, visual-first networking roadmap with built-in simulations to help beginners master cybersecurity foundations.

NetworkingInteractive

Security Writeups

Article

Bypassing WAF with Obfuscation

An analysis of how standard Web Application Firewalls can be tricked using payload encoding.

Read Analysis
Walkthrough

HackTheBox: Retired Machine

Full walkthrough of the 'Retired' machine, exploiting an SQL injection vulnerability.

Read Analysis

Training & Certifications

Certified Ethical Hacker

Training Completed @ Offenso Academy

Web Penetration Testing

Training Completed @ Offenso Academy

Cybersecurity Essentials

Cisco Networking Academy

System Logs (Experience)

Security Researcher & R&D

Offenso Hackers Academy

Present

Spearheading research on emerging web threats and developing internal automated security tools. Designing advanced curriculum for practical cybersecurity training and mentoring students in red team operations.

Malware Analysis Python Automation Curriculum Design