
I am a dedicated Cyber Security Specialist based in Sana'a, Yemen, with a razor-sharp focus on Red Teaming and Offensive Security. My career is defined by a pursuit of understanding the adversary—not just their tools, but their mindset.
Currently serving as the Red Team Lead at DeepSafer, I architect and execute sophisticated adversary simulation programs. My role is to mentor operators and align offensive strategies with organizational risk models. Previously, as an Offensive Tools Developer, I built custom exploitation frameworks.
Beyond operations, I believe in knowledge transfer. As a former Lecturer at Al-Razi University, I taught the next generation the fundamentals of ethical hacking and network security.
My background in both detection engineering and red teaming allows me to simulate attacks that are realistic and impactful, directly improving Blue Team capabilities.
Reliance on public tools is a liability. I specialize in developing custom malware and loaders in Go, C, and Nim to bypass EDR and static analysis.
As a Multi-Cloud Red Team Analyst (MCRTA), I extend the kill chain into AWS and Azure, exploiting misconfigurations and identity providers.
Security is a moving target. I maintain an active research posture, constantly updating my tradecraft with the latest TTPs.
Full-spectrum simulation of APT TTPs. Specializing in cloud red teaming (MCRTA), EDR evasion, and custom C2 infrastructure.
Development of evasive payloads using Golang, C++, and Nim. Expertise in reverse engineering and neutralizing threats.
Deep expertise in Azure and AWS environments. Identifying misconfigurations, IAM privilege escalation, and attack paths.
Building robust detection mechanisms, SOC log analysis, SIEM tuning, and writing YARA rules.
Manual and automated assessments to uncover logic flaws, injection points, and auth bypasses.
Testing human resilience through spear-phishing and security assessments.
Loading experience...
For sensitive inquiries or collaboration.