Red Teamer | Penetration Tester | Exploit Developer
- 🎯 Specialized in Red Team Ops, Active Directory attacks & Cloud pentesting
- 🛠️ I build custom offensive security tools — C2 frameworks, AD labs, automated pentest pipelines
- ☁️ Cloud security across AWS, GCP & Azure — IAM exploitation, container escape, serverless attacks
- 🏆 TryHackMe Top 1% globally | 200+ challenges completed
- 📖 Writing pentesting methodology breakdowns on Medium
- 🎓 BSc ECE @ RUET | Graduating 2026
| Project | Description |
|---|---|
| 🏴 AD Attack Lab | Vulnerable AD env with Kerberoasting, DCSync, Golden Ticket automation |
| 🤖 Auto Pentest Framework | End-to-end recon → exploit → report pipeline |
| ☁️ Cloud Pentest Toolkit | AWS/GCP/Azure exploitation — SSRF, IAM escalation, S3 enum |
| 🕷️ Web Vuln Scanner | SQLi, XSS, Auth bypass scanner — 85% accuracy vs commercial tools |
| 📡 C2 Framework | Encrypted HTTPS C2 with AV evasion & process injection (lab use) |
| 📶 WiFi Security Toolkit | WPA2 cracking, evil twin, deauth, captive portal harvesting |
-
CEH — EC-Council
-
GCP Professional Cloud Security Engineer — Google
-
TryHackMe Top 1% Global
-
📫 How to reach me azizabid240@gmail.com
