Offensive Security Specialist.
Red Team Lead.

|

My ProfileGet in Touch
500+Vulnerabilities Identified
100%Evasion Rate
0False Positives
$50M+Risk Mitigated
Hasan Alboraee
The Operator

Hasan Alboraee.

I am a dedicated Cyber Security Specialist based in Sana'a, Yemen, with a razor-sharp focus on Red Teaming and Offensive Security. My career is defined by a pursuit of understanding the adversary—not just their tools, but their mindset.

Currently serving as the Red Team Lead at DeepSafer, I architect and execute sophisticated adversary simulation programs. My role is to mentor operators and align offensive strategies with organizational risk models. Previously, as an Offensive Tools Developer, I built custom exploitation frameworks.

Beyond operations, I believe in knowledge transfer. As a former Lecturer at Al-Razi University, I taught the next generation the fundamentals of ethical hacking and network security.

View Resume
Methodology

Operator Mindset.

Offense Informs Defense

My background in both detection engineering and red teaming allows me to simulate attacks that are realistic and impactful, directly improving Blue Team capabilities.

Tool Development

Reliance on public tools is a liability. I specialize in developing custom malware and loaders in Go, C, and Nim to bypass EDR and static analysis.

Cloud-Native Attack

As a Multi-Cloud Red Team Analyst (MCRTA), I extend the kill chain into AWS and Azure, exploiting misconfigurations and identity providers.

Continuous Evolution

Security is a moving target. I maintain an active research posture, constantly updating my tradecraft with the latest TTPs.

Services

What I Do.

Red Teaming

Full-spectrum simulation of APT TTPs. Specializing in cloud red teaming (MCRTA), EDR evasion, and custom C2 infrastructure.

Malware Dev

Development of evasive payloads using Golang, C++, and Nim. Expertise in reverse engineering and neutralizing threats.

Cloud Security

Deep expertise in Azure and AWS environments. Identifying misconfigurations, IAM privilege escalation, and attack paths.

Detection Engineering

Building robust detection mechanisms, SOC log analysis, SIEM tuning, and writing YARA rules.

Web App Security

Manual and automated assessments to uncover logic flaws, injection points, and auth bypasses.

Social Engineering

Testing human resilience through spear-phishing and security assessments.

Loading experience...

Threat Intelligence

Security Tools.

Email Breach Checker

Scan dark web dumps and leak databases to verify if your credentials have been compromised.

root@intel:~$ ./init_scan.sh
Field Notes

Intelligence & Research

View Full Archive
Initiate Contact

Direct Comms.

For sensitive inquiries or collaboration.

PGP Key Available Upon Request