PRESENT DAY, PRESENT TIME

ACHRAF
OUAZZANI
CHAHIDI

>> Offensive Security Engineer

An identity navigating the layers between software engineering and offensive security. I exist to deconstruct digital structures, finding meaning in their vulnerabilities.

ls -la ./projects

/usr/achraf/about.md

My connection to the digital world began at 17, a curiosity for cybersecurity pulling me into the command lines and networks of platforms like TryHackMe. I built a foundational understanding of penetration testing, tools, and methodologies.

To go deeper, I enrolled in the ALX Software Engineering program. Here, I learned the language of the machine, honing skills in low-level C programming by creating complex projects from scratch, like a custom printf and a functional shell.

Now, I merge my developer core with my security focus. An active CTF player, a certified penetration tester (eJPT), and a community leader for the Hack The Box Casablanca meetup, I find my purpose in the space between building and breaking code.

ACHRAF OUAZZANI CHAHIDI
Offensive Security | Software Engineering

/wired/skills.conf

[ Offensive Security ]

Penetration Testing Web Exploitation Vulnerability Assessment Bug Bounty Hunting OWASP Top 10 Privilege Escalation Burp Suite Nmap & Metasploit

[ Development & Scripting ]

C Python Bash JavaScript Automation Scripting System Programming Git & GitHub Docker

[ Defensive Security ]

SIEM Tools Incident Response Log Analysis Firewall Management Endpoint Security Threat Hunting Malware Analysis

[ Networking & Infrastructure ]

TCP/IP Suite OSI Model Routing & Switching CCNA Fundamentals Security Protocols Virtualization GNS3 & Packet Tracer Linux Administration

/home/achraf/projects

Simple Shell

A custom shell built in C, handling commands, arguments, and process management. A core ALX project.

C System Programming

Automated Security Tools

Python and Bash scripts to automate vulnerability analysis, reconnaissance, and exploit detection.

Python Automation

Custom _printf Function

A complete C recreation of the printf function, managing format specifiers, flags, and data types.

C Low-Level

Imperial Petroleum POS

A web-based Point-of-Sale platform for gas station management built with Flask, MySQL, and Jinja2.

Flask Web Dev

/net/broadcasts

CTF achievements, security insights, and community highlights from the Wired.

/var/log/timeline.log

Sep 2025 - Jun 2029 (Future)

Dalian Polytechnic University

Bachelor's in Computer Science

Pursuing a comprehensive bachelor's degree in Computer Science.

Feb 2025 - Present

CTF Team (AKASEC)

Player

Competing in CTFs, specializing in web exploitation and reverse engineering.

Jan 2025 - Present

Hack The Box

Meetup Host Manager (Casablanca)

Organizing local cybersecurity community events and workshops.

Sep 2023 - Jul 2025

Cybersecurity Specialist Program

ISGI - Technical Specialist

Completed an intensive 2-year program specializing in network security, ethical hacking methodologies, and digital forensics techniques. (French language)

Jan 2025 - Mar 2025

Swift IT

Junior Penetration Tester

Performed penetration tests and developed custom security tools.

Apr 2024 - Aug 2024

Bugcrowd (Freelance)

Bug Hunter

Identified and reported web application security vulnerabilities.

Mar 2023 - Oct 2024

CTF Team (L3ak)

Co-founder & Player

Co-founded and competed with L3ak, achieving top rankings in CTFs like HTB Apocalypse & Akasec '24.

/dev/connect

And you don't seem to understand.