Dedicated dual-degree engineering student at Egypt University of Informatics and Purdue University, ranked among the top in Thanawya Amma 2022. Passionate about cybersecurity with a focus on Digital Forensics, Incident Response (DFIR), and Malware Analysis. Active CTF participant in DFIR and reverse engineering challenges, with strong interests in programming, problem-solving, and continuous learning to tackle real-world security issues.
- Windows & Linux Forensics (Registry, Logs, Artifacts)
- Memory Analysis, Disk Imaging, Log Correlation
- Threat Hunting, Timeline Analysis
- Tools: Volatility, Autopsy, Plaso, FTK Imager, and much more
- Static and Dynamic Analysis
- Malware Unpacking and Behavior Analysis
- Tools: Ghidra, IDA Pro, x64dbg, Binary Ninja, dnSpy
- SIEM, DLP (Symantec), Email Gateway, Proxy, EDR
- Threat Intelligence & Malware Analysis
- Incident Response Strategy & Playbooks
- Linux, Kali Linux
- Windows Server (Active Directory)
- Network Capture Analysis, TCP/IP, DNS, HTTP/S
- C, C++, Python
- OOP, Data Structures, Design Patterns
- Data Analysis, Machine Learning
Feel free to connect for collaboration, knowledge sharing, or simply discussing DFIR & malware puzzles.
βForensics is not just a science, it's an art of uncovering the invisible.β