Red Teamer | Penetration Tester | Ethical Hacker | CEH Master | PNPT | CRTP | eWPT | eJPT | Bug Bounty Hunter | Malware & Exploit Developer | Web & Network Vulnerability Assessment
CV קו"חI'm Kasem Shibli, a 26-year-old Certified Ethical Hacker (CEH) Master, Certified Cybersecurity Professional, and holder of multiple advanced certifications including PNPT, eJPT, eWPT, and CRTP. With expertise in penetration testing, Active Directory exploitation, malware and exploit development, and reverse engineering, I specialize in uncovering and mitigating security vulnerabilities across networks, applications, and systems. I’m actively engaged in bug bounty programs, CTF competitions, and continuous learning in advanced red teaming techniques. Passionate about solving complex cybersecurity challenges, I’m driven to contribute to high-impact security projects and innovative defense strategies.
Read MoreFocused on identifying web vulnerabilities and performing penetration tests to enhance application security and mitigate potential threats, ensuring a secure online presence.
Read MoreProviding realistic phishing simulations and customized employee training to recognize and prevent phishing attacks, fostering a resilient and security-conscious workplace culture.
Read MoreCrafting responsive, scalable, and visually appealing websites and web applications for your business, focusing on user-centric solutions with optimal performance across all devices.
Read MoreDeveloping custom security tools to detect, prevent, and resolve web security risks, ensuring businesses remain protected from threats.
Read MoreCreating sophisticated malware for security research, helping to understand threats and providing insights into prevention and mitigation techniques.
Read MoreDesigning and building custom Python GUI applications that provide seamless interaction and powerful functionality tailored to meet business needs.
Read MoreDeveloping robust PHP-based backend applications integrated with SQL databases, providing high-performance, scalable solutions without frameworks for full control.
Read MoreConducting thorough Vulnerability Assessment and Penetration Testing (VAPT) for operating systems to identify weaknesses and protect against unauthorized access and system security.
Read More