Skip to content
View ahmed-alnassif's full-sized avatar
💭
I may be slow to respond.
💭
I may be slow to respond.

Block or report ahmed-alnassif

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
ahmed-alnassif/README.md

👨‍💻 Ahmed Al-Nassif - Senior Security Researcher & Systems Architect

Professional Pentester | Exploitation Expert | Open Source Developer

Hits GitHub Email Blog

# Started security journey in 2019 - Professional pentester & exploit developer
# CTF Champion: HackTheBox, TryHackMe, picoCTF - Advanced exploitation specialist
# Full-spectrum security: Web apps, networks, binaries, mobile, forensics

🚀 About Me

Professional security researcher since 2019 specializing in advanced exploitation and systems architecture. I operate across the entire security spectrum - from red team operations to building defensive tools and contributing to open source. My work bridges cutting-edge security research with practical engineering solutions.

🏆 Signature Projects

🔥 Hashcat Android Port

The first native hashcat implementation for Android devices

# Performance: 857 MH/s MD5 on POCO X6 Pro
# Innovation: Solved OpenCL compatibility with library linking
# Impact: Professional password cracking now fits in your pocket

🐧 AndroSH - Alpine Linux on Android

Enterprise-grade Linux environment without root

# Features: SQLite management, multi-distro support, 40% faster startup
# Tech: Shizuku integration, proot isolation, self-healing setup
# Use: Development, security research, education

🎯 Professional Security Expertise

🔐 Offensive Security Specialization

💀 Exploitation Engineering: Advanced binary exploitation, ROP chains, kernel exploits
🌐 Web Application Security: Complex vulnerability chains, business logic bypasses
📱 Mobile Security: Android/iOS reverse engineering, mobile app pentesting
🔍 Reverse Engineering: Malware analysis, firmware extraction, protocol reversing
📊 Digital Forensics: Memory analysis, disk forensics, incident response
🏴 Red Team Operations: Network pivoting, lateral movement, persistence

🛡️ CTF & Competitive Security

  • HackTheBox Top Ranked - Advanced machine exploitation
  • TryHackMe Completionist - Full learning path mastery
  • picoCTF Veteran - Algorithmic and cryptographic challenges
  • Real-world simulations - Enterprise network penetration testing

🛠️ Technical Arsenal

💻 Core Competencies

Domain Expertise Level Key Technologies
Exploitation Engineering Expert Binary Analysis, ROP, Kernel Exploits
Web Application Security Expert OWASP Top 10, API Security, Bypass Techniques
Reverse Engineering Advanced IDA Pro, Ghidra, Radare2, Debuggers
Mobile Security Advanced Android/iOS Pentesting, Frida, Objection
Digital Forensics Advanced Volatility, Autopsy, Wireshark, FTK

🐧 Linux Mastery

# Primary: Kali Linux (Professional Security Work)
# Development: Arch Linux (Customized Programming Environment)
# Expertise: Full CLI mastery, kernel compilation, system hardening
# Specialization: Security toolchains, custom exploit development

🔬 Technical Breakthroughs

Security Research & Development

  • Advanced exploitation techniques for modern mitigation bypass
  • Mobile security tooling that pushes platform boundaries
  • Cross-platform offensive tools for red team operations
  • Forensic analysis methodologies for complex incidents

Open Source Contributions

  • Professional-grade security tools with real-world applications
  • Community education through documented techniques and tools
  • Ecosystem security by hardening widely-used applications

📈 Performance Metrics

Hashcat Android

❯ hashcat -b -m 0 -w 4 -O
Speed.#01........:   857.9 MH/s (463.35ms)
# Mobile device outperforming many laptops and older desktops

Security Operations

  • Enterprise network penetration with full domain compromise
  • Advanced web application testing with business impact findings
  • Mobile application security assessments for Fortune 500 companies
  • Incident response and forensic analysis for security breaches

🎪 Security Philosophy

Operational Principles

def conduct_security_operation(target):
    if target.complexity == "enterprise_network":
        return advanced_persistence_and_pivoting()
    elif target.type == "web_application":
        return business_logic_exploitation()
    elif target.platform == "mobile":
        return reverse_engineering_and_hooking()
    else:
        return custom_exploit_development()

Professional Approach

  • Methodical testing - Every system has weaknesses, find them systematically
  • Impact-focused - Prioritize findings that matter to business operations
  • Knowledge sharing - Build tools that help the entire security community
  • Continuous learning - Stay ahead of evolving defense mechanisms

🌟 Professional Achievements

Security Operations

  • Full-scope penetration tests for multinational corporations
  • Advanced persistent threat simulations in enterprise environments
  • Zero-day vulnerability research across multiple platforms
  • Security architecture review for critical infrastructure

Technical Innovations

  1. First native hashcat on Android with full OpenCL acceleration
  2. Professional Alpine Linux environment on Android without root
  3. OpenCL library compatibility solution for Android/Termux
  4. Custom exploitation tools for red team operations

🔮 Current Research Focus

Advanced Security Research

  • Kernel exploitation for modern operating systems
  • Mobile platform security and jailbreak/rooting techniques
  • Blockchain and DeFi security - smart contract auditing
  • AI/ML security - adversarial attacks and model protection

Tool Development

  • Automated exploitation frameworks for red team efficiency
  • Cross-platform security tools unification and optimization
  • Incident response automation for faster breach containment

📫 Professional Engagement

Collaboration Opportunities

  • Advanced security research partnerships
  • Red team tool development and automation
  • Security training and knowledge transfer
  • Open source security projects maintenance

Get In Touch

# For security research collaboration: mr.ahmed.nassif@gmail.com
# For open source contributions: github.com/ahmed-alnassif
# For professional pentesting: cyber-wise.blogspot.com
# CTF Profiles: Available upon request for verified professionals

"Security isn't about finding vulnerabilities - it's about understanding systems deeply enough to break them methodically"

# From CTF challenges to enterprise networks - the attack surface is everywhere

Pinned Loading

  1. AndroSH AndroSH Public

    AndroSH No-Root Multi-Distro Linux on Android via Shizuku/ADB - Run Arch, Fedora, Alpine, Debian, Ubuntu, Kali, Void, Manjaro, OpenSUSE & Chimera with full system integration, proot isolation & Ter…

    Python 179 12

  2. hashcat hashcat Public

    Forked from hashcat/hashcat

    World's fastest and most advanced password recovery utility

    C 3

  3. net-spider net-spider Public

    Net-Spider is a web scraping tool designed to retrieve the source code for a web page, including front-end elements such as JavaScript, CSS, images, and fonts. It allows you to crawl and download t…

    Python 7 1

  4. Metasploit-Termux-Installer Metasploit-Termux-Installer Public

    The Metasploit-Termux-Installer script automates the setup of Metasploit Framework on Termux, enabling penetration testing on Android. It updates packages, installs dependencies, fetches Metasploit…

    Shell 21 5

  5. Termux-JetBrians Termux-JetBrians Public

    Forked from zryyoung/Termux

    Android studio and other JetBrians IDEs

    Shell 22 1

  6. PwnXSS PwnXSS Public archive

    PwnXSS: Vulnerability (XSS) scanner exploit

    Python 4