$ whoami
> amr@cybersec:~$ Cybersecurity specialist with expertise in ethical hacking, reverse engineering, and secure development
$ ./skills.sh --list-top
> [Loading complete]: Advanced Penetration Testing | Malware Analysis | C/C++ Security Development | Vulnerability Research
$ uname -a
> CyberOS 5.15.0-kali1-amd64
$ ps -aux | grep active-projects
> ACTIVE: Zero-Day Research | Security Tool Development | CTF Competitions | Bug Bounty Hunting
$ cat /etc/passwd | grep contact
> github:Amr-Khaled-Ahmed:x:1000:1000:GitHub Profile:/home/amr:/bin/bash
+ Offensive Security & Red Team Operations:
! Advanced Web Exploitation | OWASP Top 10 Mastery | Zero-Day Research | Custom Exploit Development | APT Simulation
+ Defensive Security & Analysis:
! Advanced Malware Analysis | Reverse Engineering | Memory Forensics | Threat Hunting | Security Monitoring
+ Security Development:
- Secure Coding Practices | C/C++ Security Tools | Vulnerability Assessment Tools | Custom Security Frameworks
I'm Amr Khaled, a dedicated cybersecurity specialist with expertise in vulnerability assessment, exploit development, and secure systems architecture. My technical journey is driven by a commitment to creating safer digital environments through both offensive and defensive security approaches.
- ๐ก๏ธ Expertise: Advanced penetration testing, exploit development, malware analysis, and secure software engineering
- ๐ฌ Research Focus: Zero-day vulnerability discovery, advanced persistence techniques, and threat intelligence
- ๐ป Development: Security-focused C/C++ tools, automated vulnerability scanners, and defensive frameworks
- ๐ Communities: Active contributor to security communities, CTF competitions, and vulnerability disclosure programs
- ๐ Continuous Learning: Constantly expanding knowledge in emerging threat vectors and advanced security methodologies
My career mission is to bridge the gap between theoretical security research and practical implementation, developing innovative solutions that preemptively address emerging cyber threats.
#include <iostream>
#include <vector>
int main() {
int *_[] = {new int(0), new int(1)};
int **__ = &_;
std::vector<int> ___ = {14, 10, 5, 5, 12, 21, 23, 26, 12, 27, 5, 5, 28};
char ____ = 0;
int _____ = 72;
for(auto ______ : ___) {
____ = (_____ - ______) ^ **__[0] ^ **__[**__[0]];
std::cout << (____ ? ____ : '!');
_____ = (_____ * 1664525 + 1013904223) % 127;
if (_____ < 32) _____ += 32;
}
for(auto & _______ : _)
delete _______;
return **__[**__[0]];
}
C |
C++ |
Python |
Java |
JavaScript |
Bash |
PHP |
![]() Assembly |
Qt |
HTML5 |
CSS3 |
Bootstrap |
Tailwind |
Django |
MySQL |
Kali Linux |
VMware |
Linux |
Windows |
Git |
Debian |
VS Code |
"Security is not a product, but a process and a mindset. It's about understanding the adversary and building systems that remain resilient even when components fail."