An identity navigating the layers between software engineering and offensive security. I exist to deconstruct digital structures, finding meaning in their vulnerabilities.
ls -la ./projectsMy connection to the digital world began at 17, a curiosity for cybersecurity pulling me into the command lines and networks of platforms like TryHackMe. I built a foundational understanding of penetration testing, tools, and methodologies.
To go deeper, I enrolled in the ALX Software Engineering program. Here, I learned the language of the machine, honing skills in low-level C programming by creating complex projects from scratch, like a custom printf and a functional shell.
Now, I merge my developer core with my security focus. An active CTF player, a certified penetration tester (eJPT), and a community leader for the Hack The Box Casablanca meetup, I find my purpose in the space between building and breaking code.
A custom shell built in C, handling commands, arguments, and process management. A core ALX project.
Python and Bash scripts to automate vulnerability analysis, reconnaissance, and exploit detection.
A complete C recreation of the printf function, managing format specifiers, flags, and data types.
CTF achievements, security insights, and community highlights from the Wired.
Pursuing a comprehensive bachelor's degree in Computer Science.
Competing in CTFs, specializing in web exploitation and reverse engineering.
Organizing local cybersecurity community events and workshops.
Completed an intensive 2-year program specializing in network security, ethical hacking methodologies, and digital forensics techniques. (French language)
Performed penetration tests and developed custom security tools.
Identified and reported web application security vulnerabilities.
Co-founded and competed with L3ak, achieving top rankings in CTFs like HTB Apocalypse & Akasec '24.