0% found this document useful (0 votes)
31 views2 pages

Walid Zitouni1

Walid Zitouni is a cybersecurity engineering student with expertise in red teaming and penetration testing, demonstrated through successful participation in CTF challenges and bug bounty programs. He is pursuing a Bachelor of Engineering in Cybersecurity and has developed various projects, including a secure VPN design and a custom ransomware prototype. Walid has also gained experience through national CyberDrill events and organizing CTF competitions, while working towards certifications in cybersecurity.

Uploaded by

jamalchahd35
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views2 pages

Walid Zitouni1

Walid Zitouni is a cybersecurity engineering student with expertise in red teaming and penetration testing, demonstrated through successful participation in CTF challenges and bug bounty programs. He is pursuing a Bachelor of Engineering in Cybersecurity and has developed various projects, including a secure VPN design and a custom ransomware prototype. Walid has also gained experience through national CyberDrill events and organizing CTF competitions, while working towards certifications in cybersecurity.

Uploaded by

jamalchahd35
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

WALID ZITOUNI

Fes-Meknes,Morocco,50000 | walid.zitouni.23@ump.ac.ma | +212622534615 |


linkedin.com/in/walid-zitouni-634809299 | github.com/walidzitouni
Professional Summary
Passionate cybersecurity engineering student specializing in red teaming and penetration testing.
Demonstrated success in uncovering critical vulnerabilities through CTF challenges and bug bounty programs.
Skilled in Active Directory exploitation, pwning machines, OSINT tool development, and secure network design.

Education
• National School of Applied Sciences of Oujda Sept 2024 – May 2027
Bachelor of Engineering in Cybersecurity
Coursework: Cryptography, System Administration, Networking, Database Management, Ethical
Hacking,Oriented object programming python, Security Protocols,Java Programming.
• Integrated Preparatory Classes – Engineering Cycle Sept 2022 – May 2024
Coursework: Programming in C , Algorithms and Data Structures, MATLAB for Numerical Methods, Linear
Algebra, Physics, Discrete Mathematics.

Projects
Secure Site-to-Site VPN Design 2025
• Designed and simulated an IPSec VPN tunnel between two corporate sites (AS2500 AS2700) in Cisco Packet
Tracer.
• Configured dynamic (OSPF, EIGRP) and BGP routing, NAT (static/dynamic), DHCP automation, and ACLs to
ensure secure, scalable connectivity for branch and broadband (HFC/DSL) users
• Tools Used: IPSec VPN„GNS3,OSPF,EIGRP,BGP,NAT,DHCP,ACLs,Packet Tracer...

Ransomware - Remote Access Trojan Development & Defense Bypass 2025


• Engineered a custom ransomware prototype that encrypts and retrieves data while evading common antivirus
and endpoint detection solutions.
• Implemented dynamic key exchange and stealth persistence techniques to simulate advanced red-team
scenarios.
• Tools Used: Python,AES,RSA,Revereshells,ServerWeb...
EagleXHunter (Multi-Source Recon Tool) 2025
• Aggregates intelligence from Shodan, Censys, and BinaryEdge, integrating Vulners API for CVE lookups.
• Threaded scanning with selectable services and color-coded terminal output for readability
• Tools Used: Python,Shodan API,Censys API..

Link Dumper (Python Web Crawler) 2025


• Recursively extracts URLs and files (.js, .txt, .json, .xml) for subdomain enumeration and API key discovery.
• Multi-threaded design for high-speed reconnaissance; outputs structured JSON for downstream analysis.
• Tools Used: Python..

Stealth Keylogger Disguised as Calculator 2024


Deploys as a standard calculator GUI, silently capturing keystrokes and exfiltrating logs via authenticated webmail.
Tools Used: Python

Certifications
Certified Red Team Analyst (CRTA) In Progress
IT Fundamentals for Cybersecurity Specialization by IBM In Progress
TryHackMe Junior Penetration Tester Certificate
AIG – Shields Up: Cybersecurity Job Simulation (Forage)
Getting Started with Cisco Packet Tracer (Cisco / Forage)
Mastercard – Cybersecurity Job Simulation (Forage)

Experience
CyberDrill – Morocco EST Region (SecDoJo) April 2025 – May 2025
Participated in a national CyberDrill event organized by SecDoJo, AUSIFF, and Beyond Digital.
• Online Qualification: April 26, 2025
• Final Round at Zone01 Oujda: May 3, 2025
• Challenge Types: Attack/Defense, Capture the Flag (CTF), Catch the Evidence, Catch the Vulnerability
Meet the Lead – Event Assistant 2025
• Assisted in organizing the “Meet the Lead” event.
• Contributed to event logistics and supported attendee engagement during forums and conferences.
CTF Cellule – ENSA Oujda 2024 – 2025
Organized DEFENSYS CTF at ENSA Oujda – May 17, 2025
• Coordinated the DEFENSYS Capture the Flag (CTF) competition, held both on-site and online
• Event included over 12 on-site teams and more than 20 online teams.
• 12-hour competition involving diverse cybersecurity challenges(crypto,pwn,reverse,web,forensics...)
• Contributed as a core staff member: challenge development, infrastructure setup, and participant support (on
Discord and on-site)

You might also like