Who even am I??? Who is Muhammad Muazen??
I am a cybersecurity engineer π€ specializing in offensive security π₯·, with expertise in penetration testing π, vulnerability assessment π, and defensive system development π . I am proficient in programming languages π¨βπ» including C, Python, and Rust for building tools to automate attacks βοΈ, enhance protections π‘οΈ, and develop malware πΎ. My practical experience spans both Windows πͺ and Linux environments π§, where I utilize various common and cutting-edge tools for network analysis and attack simulation. I possess strong capabilities in planning attack pathways π, contributing to cybersecurity defense system design π οΈ, problem-solving π, and collaborating with teams to build more secure environments π€.
Table Of Contents
Education
Lattakia University: Informatics Engineering - Computer systems and Networks Engineering (2020)
Self Study & Certifications
Certificate Name | Acronym | Logo |
---|---|---|
Cisco Certified Network Associat | CCNA | ![]() |
Linux Professional Institute Linux Essentials | Linux Essentials | ![]() |
Linux Professional Institute LPIC-1 | LPIC-1 | ![]() |
eLearnSecurity Web Application Penetration Tester | eWPT | ![]() |
eLearnSecurity Web Application Penetration Tester eXtreme | eWPTX | ![]() |
OffSec Certified Penetration Tester | OSCP | ![]() |
OffSec Experienced Penetration Tester | OSEP | ![]() |
OffSec Web Assessor | OSWA | ![]() |
GIAC Web Application Penetration Tester | GWAPT | ![]() |
GIAC Red Team Professional | GRTP | ![]() |
GIAC Security Operations Certified | GSOC | ![]() |
MalDev Academy Certifacte | MalDev | ![]() |
Expertise
- With over six years of field experience in computer hardware π οΈ and software maintenance </>, I have handled a vast number of complex technical failures in both software and hardware systems on both linux π§ and windows πͺ.
- Have supervised the preparation and configuration of Linux π§ and Windows servers πͺ for various services π (DNS, DHCP, Active Directory, etc.).
- Experienced in building high-performance automation tools using Rust π¦ and Python π, optimizing workflows π and reducing manual effort.
- Skilled in red teaming and penetration testing π¨π»βπ», specializing in offensive security assessments π, exploit development β£οΈ, and stealthy post-exploitation πΆοΈ. Proficient in bypassing defenses π€ΈπΌ, privilege escalation, simulating advanced adversaries π©, and planning and designing attack vectors π.
- Proficient in developing low-level offensive tools π§ and malware πΎ using C Β©οΈ and Rust π¦, with a focus on stealth π΅π»ββοΈ, and evasion techniques π€ΈπΌ.
- Experienced in designing defensive security systems π‘οΈ, threat detection π΅οΈββοΈ, and incident response π as a SOC analyst π©πΌβπ¬. Skilled in malware analysis π¬, SIEM tools π, and mitigating attacks π§.
- Network design π§, implementation π, and security π, with deep knowledge of protocols π, routing π, switching π, and defensive architectures (firewalls, IDS/IPS) π§±. Skilled in optimizing performance and hardening πͺ networks against modern threats π.
- High problem-solving skills π§ βadept at dissecting complex challenges with logic π§©, creativity πͺ, and ruthless efficiency π.
Achievements
TryHackMe
Ranked in the top 1% globally on TryHackMe, demonstrating advanced offensive π‘οΈ & defensive π‘οΈ security expertise. Mastered network π exploitation: Pivoting π, MITM attacks π΅οΈ, custom payload delivery π, and firewall/IDS evasion π¨. Developed & mitigated π οΈ real-world attack scenariosβfrom ransomware simulations π to DNS spoofing π‘. Proven ability to analyze π, exploit π₯, and secure π complex networks through 250+ hands-on challenges and CTFs π.
Foundational C# With Microsoft
Completed Microsoft’s Foundational C# certification π, strengthening πͺ my programming skills for security tool development π οΈ and exploit analysisπ΅. Gained hands-on experience with C# fundamentals applicable to scripting custom security solutions </> and understanding malware behavior πΎ. Enhanced my ability to analyze and manipulate code π§ for offensive security research π¬. you can check it out here
MalDev Academy Certificate
Earned the MalDev Academy Certificate π, mastering offensive techniques π§ in malware development and evasion ΰΌ. Gained hands-on experience crafting πͺ‘ custom payloads, bypassing defenses π§, and analyzing malicious code π¬. Strengthened my ability to think like an attacker for red teaming and advanced threat simulations πͺ.
Skills
Here you will find some the technologies and tools I dealt with throughout my journey:
Why just some? there are a lot of tools that can do the same thing but I thought if I mentioned one here that usually means I know how to use the other one on some level (let’s say tunneling through ssh and chisel)
Linux Opertaing System | Windwos Operating System | OpenDSB Operating System |
---|---|---|
Python Programming Language | C Programming Language | C# Programming Language |
C++ Programming Language | Rust Programming Language | Nim Programming Language |
Bash Scripting | Powershell Scripting | Kotlin Programming Language |
Java Programming Language | CISCO Routing and Switching | WebAppSec |
Wireshark | Kibana | Suricata |
Snort | PfSesnse | Ghidra |
IDA | WinDBG | DnSpy |
DnSpy | PE-Bear | Sliver C2 |
Nmap | Rustscan | Metasploit Framework |
MITRE ATT&CK Tools | Rubeus | Impacket-scripts |
Burpsuite | dnscat2 | fuff |
Hashcat | John the Ripper | Bloodhound |
Passion
Iβm the kind of person who gets frustrated when I solve a problem on the first tryβI crave new challenges π©, whether in computer science π₯οΈ, cybersecurity π, or beyond π«. Merely knowing the answer isnβt enough; I need to understand its origin, mechanics βοΈ, and why itβs correct (and why my wrong answers failedβor if they were secretly right). This obsession with dissecting details drew me to cybersecurity: a field thatβs relentless, ever-changing, and never easy. But my curiosity π§ doesnβt stop thereβI pursue other passions π₯ rigorously, all sharpening my core skills and expanding how I think π‘:
- Low Level Programming π©: From coding in C and reading assembly to understanding operating systems components and the HAL of multiple MCUs.
- Embedded Systems π: FPGAs (Xilins, Altera), MCUs (Arduios, Raspberry PIs, ESPs, STMs, ATmegas) you name it.
- Mathematics π’ & Physics β: I like to stimulate my brain with math & physics lectures, videos and sometimes problem solving in my free time.
- Technology π»: Obsessed with technologyβs relentless evolutionβconstantly dissecting new tools, trends, and devices. π Staying ahead isnβt a habit; itβs an addiction.
- Psychology π§ π«: Why? Where? When? Who? What? How? Which? All answers in any context for these questions have one thing in common… Human psychology.
- Books π: I read all sorts of books from literally children books to the most complicated science books. (No I don’t get everything about them but if I got just a single information from a single page I would be more than satisfied)
Resumes
- You can view and download my cybersecurity resume from here
- You can view and download my system administration resume from here
Contacts
You can contact me and check my profiles by clicking on the (Contact Me) in the navigation bar in the top right corner or by clicking here