Who even am I??? Who is Muhammad Muazen??

I am a cybersecurity engineer πŸ€– specializing in offensive security πŸ₯·, with expertise in penetration testing πŸ”“, vulnerability assessment πŸ“„, and defensive system development πŸ›…. I am proficient in programming languages πŸ‘¨β€πŸ’» including C, Python, and Rust for building tools to automate attacks βš”οΈ, enhance protections πŸ›‘οΈ, and develop malware πŸ‘Ύ. My practical experience spans both Windows πŸͺŸ and Linux environments 🐧, where I utilize various common and cutting-edge tools for network analysis and attack simulation. I possess strong capabilities in planning attack pathways πŸ“Š, contributing to cybersecurity defense system design πŸ› οΈ, problem-solving πŸ’­, and collaborating with teams to build more secure environments 🀝.


Table Of Contents


Education

Lattakia University: Informatics Engineering - Computer systems and Networks Engineering (2020)

lattakia-University-Logo


Certifications

Certificate Name Acronym Logo
Cisco Certified Network Associat CCNA CCNA-Logo
Linux Professional Institute Linux Essentials Linux Essentials Linux-Essentials-Logo
Linux Professional Institute LPIC-1 LPIC-1 LPIC1-Logo
eLearnSecurity Web Application Penetration Tester eWPT eWPT-Logo
eLearnSecurity Web Application Penetration Tester eXtreme eWPTX eWPTX-Logo
OffSec Certified Penetration Tester OSCP OSCP-Logo
OffSec Experienced Penetration Tester OSEP OSEP-Logo
OffSec Web Assessor OSWA OSWA-Logo
GIAC Web Application Penetration Tester GWAPT GWAPT-Logo
GIAC Red Team Professional GRTP GRTP-Logo
GIAC Security Operations Certified GSOC GSOC-Logo
MalDev Academy Certifacte MalDev MalDev-Logo

Expertise

  • With over six years of field experience in computer hardware πŸ› οΈ and software maintenance </>, I have handled a vast number of complex technical failures in both software and hardware systems on both linux 🐧 and windows πŸͺŸ.
  • Have supervised the preparation and configuration of Linux 🐧 and Windows servers πŸͺŸ for various services 🌐 (DNS, DHCP, Active Directory, etc.).
  • Experienced in building high-performance automation tools using Rust πŸ¦€ and Python 🐍, optimizing workflows πŸ“ˆ and reducing manual effort.
  • Skilled in red teaming and penetration testing πŸ‘¨πŸ»β€πŸ’», specializing in offensive security assessments πŸ”“, exploit development ☣️, and stealthy post-exploitation πŸ•ΆοΈ. Proficient in bypassing defenses 🀸🏼, privilege escalation, simulating advanced adversaries 🚩, and planning and designing attack vectors πŸ“.
  • Proficient in developing low-level offensive tools πŸ”§ and malware πŸ‘Ύ using C ©️ and Rust πŸ¦€, with a focus on stealth πŸ•΅πŸ»β€β™€οΈ, and evasion techniques 🀸🏼.
  • Experienced in designing defensive security systems πŸ›‘οΈ, threat detection πŸ•΅οΈβ€β™€οΈ, and incident response πŸš’ as a SOC analyst πŸ‘©πŸΌβ€πŸ”¬. Skilled in malware analysis πŸ”¬, SIEM tools πŸ“Š, and mitigating attacks 🚧.
  • Network design πŸ–§, implementation πŸ”—, and security πŸ”, with deep knowledge of protocols πŸ“, routing πŸ”€, switching πŸ”, and defensive architectures (firewalls, IDS/IPS) 🧱. Skilled in optimizing performance and hardening πŸ’ͺ networks against modern threats 😈.
  • High problem-solving skills πŸ§ β€”adept at dissecting complex challenges with logic 🧩, creativity πŸͺ„, and ruthless efficiency πŸš€.

Achievements

TryHackMe:

TryHackMe-Badge

Ranked in the top 1% globally on TryHackMe, demonstrating advanced offensive πŸ—‘οΈ & defensive πŸ›‘οΈ security expertise. Mastered network 🌐 exploitation: Pivoting πŸ”„, MITM attacks πŸ•΅οΈ, custom payload delivery πŸ’‰, and firewall/IDS evasion 🚨. Developed & mitigated πŸ› οΈ real-world attack scenariosβ€”from ransomware simulations πŸ” to DNS spoofing πŸ“‘. Proven ability to analyze πŸ“Š, exploit πŸ’₯, and secure πŸ”’ complex networks through 250+ hands-on challenges and CTFs πŸ†.


Skills

Here you will find some the technologies and tools I dealt with throughout my journey:

Why just some? there are a lot of tools that can do the same thing but I thought if I mentioned one here that usually means I know how to use the other one (let’s say tunneling through ssh and chisel)

Linux Opertaing System Windwos Operating System OpenDSB Operating System
Python Programming Language C Programming Language C# Programming Language
C Programming Language Rust Programming Language Nim Programming Language
Bash Scripting Powershell Scripting Kotlin Programming Language
Java Programming Language CISCO Routing and Switching WebAppSec
Wireshark Kibana Suricata
Snort PfSesnse Ghidra
IDA WinDBG GDB
DnSpy PE-Bear x32/x64 DBG
Nmap Rustscan Metasploit Framework
Sliver C2 Covenant C2 Havoc C2
MITRE ATT&CK Tools Rubeus Impacket-scripts
Burpsuite dnscat2 fuff
Hashcat John the Ripper Bloodhound

Passion

I’m the kind of person who gets frustrated when I solve a problem on the first tryβ€”I crave new challenges 🚩, whether in computer science πŸ–₯️, cybersecurity 🌐, or beyond πŸ’«. Merely knowing the answer isn’t enough; I need to understand its origin, mechanics βš™οΈ, and why it’s correct (and why my wrong answers failedβ€”or if they were secretly right). This obsession with dissecting details drew me to cybersecurity: a field that’s relentless, ever-changing, and never easy. But my curiosity 🧐 doesn’t stop thereβ€”I pursue other passions πŸ”₯ rigorously, all sharpening my core skills and expanding how I think πŸ’‘:

  1. Low Level Programming πŸ”©: From coding in C and reading assembly to understanding operating systems components and the HAL of multiple MCUs.
  2. Embedded Systems πŸ“Ÿ: FPGAs (Xilins, Altera), MCUs (Arduios, Raspberry PIs, ESPs, STMs, ATmegas) you name it.
  3. Mathematics πŸ”’ & Physics βš›: I like to stimulate my brain with math & physics lectures, videos and sometimes problem solving in my free time.
  4. Technology πŸ’»: Obsessed with technology’s relentless evolutionβ€”constantly dissecting new tools, trends, and devices. πŸš€ Staying ahead isn’t a habit; it’s an addiction.
  5. Psychology πŸ§ πŸ«€: Why? Where? When? Who? What? How? Which? All answers in any context for these questions have one thing in common… Human psychology.
  6. Books πŸ“š: I read all sorts of books from literally children books to the most complicated science books. (No I don’t get everything about them but if I got just a single information from a single page I would be more than satisfied)

Resumes

  • You can view and download my cybersecurity resume from here
  • You can view and download my system administration resume from here

Contacts

You contact me and check my profiles by clicking on the (Contact Me) in the navigation bar in the top right corner or by clicking here