Red Teamer | Penetration Tester | Ethical Hacker | Certified Ethical Hacker (CEH) |Certified Cybersecurity Professional
| Bug Bounty Hunter | Malware & Exploit Developer | Reverse Engineering | Web Vulnerability Assessment
I'm Kasem Shibli, a 25 Certified Ethical Hacker (CEH), Certified Cybersecurity Professional. expertise in penetration testing, malware and exploit development, and reverse engineering, I specialize in identifying and mitigating web vulnerabilities. I'm actively involved in bug bounty programs and have a passion for tackling complex cybersecurity challenges. Always eager to learn and collaborate, I’m excited about opportunities to contribute to impactful projects.
Read MoreFocused on identifying web vulnerabilities and performing penetration tests to enhance application security and mitigate potential threats, ensuring a secure online presence.
Read MoreProviding realistic phishing simulations and customized employee training to recognize and prevent phishing attacks, fostering a resilient and security-conscious workplace culture.
Read MoreCrafting responsive, scalable, and visually appealing websites and web applications for your business, focusing on user-centric solutions with optimal performance across all devices.
Read MoreDeveloping custom security tools to detect, prevent, and resolve web security risks, ensuring businesses remain protected from threats.
Read MoreCreating sophisticated malware for security research, helping to understand threats and providing insights into prevention and mitigation techniques.
Read MoreDesigning and building custom Python GUI applications that provide seamless interaction and powerful functionality tailored to meet business needs.
Read MoreDeveloping robust PHP-based backend applications integrated with SQL databases, providing high-performance, scalable solutions without frameworks for full control.
Read MoreConducting thorough Vulnerability Assessment and Penetration Testing (VAPT) for operating systems to identify weaknesses and protect against unauthorized access and system security.
Read More