
Skills Directory
Expertise in cybersecurity and secure development
Pentesting
Web, Network, Systems ...
Vulnerability Assessment
Security auditing & analysis
Smart Contracts Security
auditing etheruem smart contracts
Web Development
Full-stack secure web & desktop applications
Bash Scripting
Automation & tooling
Malware analysis
Reverse Engineering of Malwares
Infrastructures Maintaining
ensuring Systems security & configuration
Project History
Security tools and applications I've built

Sh0zack
Advanced Penetration Testing Framework powered by Bash. Comprehensive toolkit for network reconnaissance, DNS enumeration, directory fuzzing, brute-force attacks, and web vulnerability scanning.
Sh0zai
AI-powered security tool for automated vulnerability assessment and penetration testing workflows.
Hydra
AI-powered health application designed to help pregnant women during their pregnancy by predicting medical urgencies through body changes analysis. Features ML-based health risk assessment and real-time monitoring.
C2
Command & Control server infrastructure for security research and malware analysis. Educational tool for understanding C2 communication patterns.
Rootkit
Malware research project focusing on rootkit detection and analysis. Educational tool for understanding how malware hides its presence on systems.

Valrose Quest
A 2D top-down game based on a generic game engine developed using LibGDX. The engine is designed to allow game content to be extended exclusively through the Tiled map editor..
Browser Extension
browser extension for web application testing and vulnerability detection.
Experience Log
Professional and educational background
MERN & WordPress Development
2 years
Full-stack development experience building secure web applications using MongoDB, Express.js, React, and Node.js. WordPress customization and security hardening.
Pentesting Training & Web Vulnerability Research
Ongoing
Hands-on training in penetration testing methodologies. Researching and documenting web application vulnerabilities, particularly in Node.js and Express.js ecosystems.
Coursework & Studies
Current
Comprehensive coursework covering Networks, Systems Security, Operating Systems, and Cryptography fundamentals. Building strong theoretical foundation in cybersecurity.
Tutor - Math & Physics
Part-time
Teaching middle-school students in Mathematics and Physics. Developing communication and problem-solving skills while helping others learn.
Learning Processes
Academic journey and qualifications
ESTIN
3rd Year
Engineering studies in Computer Science with focus on cybersecurity and systems.
Université Côte d'Azur
L2 Informatique
Second year of Computer Science studies. Currently pursuing degree in France.
Classe Préparatoire
2 Years
Intensive preparatory classes in Mathematics, Physics, and Computer Science.
Achievements & CTF
Competitive security challenges and certifications
CTF Competitions
Active participant in multiple Capture The Flag competitions, honing skills in real-world security challenges.
View CTF Profile →Security Certifications
Various cybersecurity certifications and training programs completed. Check LinkedIn for full details.
Bug Bounty
Engaged in responsible disclosure and bug bounty programs.
Open Source
Contributing to security tools and frameworks in the open source community.
TryHackMe
Active on TryHackMe platform, completing rooms and challenges to enhance penetration testing skills.
HackTheBox
Practicing offensive security on HackTheBox, solving machines and improving red team techniques.
HackerOne
Participating in bug bounty programs and responsible disclosure through HackerOne platform.
Certifications & Achievements
Professional credentials and recognition
Cybersecurity Certifications
Various professional certifications in penetration testing, network security, and ethical hacking. Check my LinkedIn for the full list of credentials.
CTF Achievements
Active participant in multiple Capture The Flag competitions. Regular contributor to security challenges and competitive hacking events.
Security Training
Completed advanced training programs in web application security, network penetration testing, and vulnerability assessment methodologies.
Academic Excellence
Outstanding performance in cybersecurity coursework at ESTIN and Université Côte d'Azur, with focus on practical security applications.
Bug Bounty Stats
Security research and responsible disclosure
10+
Vulnerabilities Found
Security issues discovered
10+
Bug Bounty Programs
Active programs
$5K+
Total Bounties
Earned rewards
10+
Companies Secured
Organizations helped
Security Write-ups
Technical deep-dives and security research
SQL Injection in Node.js Express App
Deep dive into discovering and exploiting SQL injection vulnerabilities in Express.js applications. Includes payloads and mitigation strategies.
CTF Write-up: HackTheBox Challenge
Complete walkthrough of a HackTheBox machine, covering enumeration, privilege escalation, and root access techniques.
Bash Scripting for Pentesting Automation
Building efficient bash scripts for automating common pentesting tasks. Includes examples and best practices.
$ Terminal
Interactive shell with my fav Linux commands
Type help to see available commands
Try: whoami or curl https://api.github.com/users/sh0z3n
Contact Shell
Let's connect and discuss security
nc -lvp 1337
Ready to collaborate? Let's discuss your security needs, schedule a consultation, or explore bug bounty opportunities.
social_links.sh
Let's connect and build something cool together