Skip to content
View kasem545's full-sized avatar
:octocat:
:octocat:

Highlights

  • Pro

Block or report kasem545

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
kasem545/README.md

About Me

#!/usr/bin/env python3
# -*- coding: utf-8 -*-

class OffensiveSecuritySpecialist:
    """
    Cyber Security Enthusiast | Penetration Tester | Red Team Operator
    """
    
    def __init__(self):
        self.username = "Kasem Shibli"
        self.role = "Red Team Operator & Penetration Tester"
        self.location = "IL Israel"
        self.language_spoken = ["ar_IL", "en_US", "he_IL"]
        
        self.code = {
            "Intermediate": ["Python", "PowerShell", "Bash", "C/C++"],
            "learning": ["Windows APIs", "lua", "Rust"]
        }
        
        self.tools = {
            "exploitation": ["Metasploit", "Cobalt Strike", "Empire", "Adaptixc2"],
            "web_testing": ["Burp Suite Pro", "OWASP ZAP", "SQLMap", "Nuclei"],
            "network": ["Nmap", "Masscan", "Wireshark", "Responder", "NetExec"],
            "ad_attack": ["BloodHound", "Mimikatz", "Rubeus", "PowerView", "Impacket"],
            "osint": ["TheHarvester", "Recon-ng", "Maltego", "Shodan", "Amass"],
            "custom": ["Self-developed tools available on GitHub"]
        }
        
        self.methodologies = [
            "MITRE ATT&CK Framework",
            "OWASP Testing Guide", 
            "PTES (Penetration Testing Execution Standard)",
            "OSSTMM (Open Source Security Testing Methodology)",
            "NIST Cybersecurity Framework"
        ]
    
    def daily_routine(self):
        activities = {
            "morning": "☕ HTB/THM challenges + CTF writeups",
            "afternoon": "💻 Tool development & exploit research", 
            "evening": "📖 Reading research papers & studying for certs",
            "night": "🎮 Gaming & more hacking"
        }
        return activities
    
    def get_quote(self):
        return "In God we trust, everything else we hack! 🔓"
    
    def contact_me(self):
        return {
            "email": "[email protected]",
            "linkedin": "linkedin.com/in/kasemshibli",
            "website": "kasem545.github.io",
            "pgp": """-----BEGIN PGP PUBLIC KEY BLOCK-----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=AKMh
-----END PGP PUBLIC KEY BLOCK-----"""
        }

# Initialize
hacker = OffensiveSecuritySpecialist()
print(f"[+] {hacker.username}: {hacker.get_quote()}")
print(f"[+] Current Focus: {hacker.current_projects()}")

🎯 Current Mission Objectives

🔥 Active Operations

pentesting:
  - Active Directory exploitation
  - Web application security assessments  
  - Network penetration testing
  - Mobile application testing
  - Cloud security assessments (AWS/Azure)

research:
  - Windows kernel exploitation
  - EDR/AV evasion techniques
  - Zero-day vulnerability research
  - Malware development & analysis
  - Reverse engineering binaries

automation:
  - Custom reconnaissance tools
  - Automated exploitation frameworks
  - CI/CD security pipeline integration
  - Red team infrastructure automation

🎓 Learning Path 2026/2027

graph TD
    A[Current: Advanced Pentesting] --> B[OSCP Certification]
    B --> C[CRTO - Red Team Ops]
    C --> D[CRTE - Red Team Expert]
    D --> E[OSED - Exploit Dev]
    E --> F[OSCE³ - Master offensive security]
    F --> G[Ultimate Goal: OSEE Advanced Windows Exploitation]

    
    style A fill:#00ff00,stroke:#00aa00,stroke-width:3px
    style B fill:#ffff00,stroke:#aaaa00,stroke-width:2px
    style C fill:#ffff00,stroke:#aaaa00,stroke-width:2px
    style D fill:#ff9900,stroke:#aa6600,stroke-width:2px
    style E fill:#ff9900,stroke:#aa6600,stroke-width:2px
    style F fill:#ff0000,stroke:#aa0000,stroke-width:2px
    style G fill:#ff0000,stroke:#aa0000,stroke-width:4px
Loading

📊 GitHub Analytics

GitHub Streak Contribution Graph
📈 More Detailed Stats

Profile Details Repos per Language Most Commit Language Stats Productive Time

🏆 Achievements & Trophies

Trophy

🎖️ Professional Certifications

🎮 Capture The Flag Excellence

HackTheBox

TryHackMe

📈 CTF Statistics & Achievements

┌─────────────────────────────────────────────────────────────────┐
│  Platform       │  Machines  │  Rank      │  Points  │  Streak  │
├─────────────────────────────────────────────────────────────────┤
│  HackTheBox     │    50+     │   Active   │  1500+   │   30d    │
│  TryHackMe      │   100+     │   Top 5%   │  5000+   │   45d    │
└─────────────────────────────────────────────────────────────────┘

Recent Achievements:
  ✅ Completed Pro Labs: DANTE, P.O.O, FullHouse, Solar
  ✅ HackTheBox Seasonal: All challenges completed
  ✅ TryHackMe: Offensive Pentesting Path 100%

💻 Tech Arsenal & Skills

🔧 Programming & Scripting Languages

Python
Python
Bash
Bash
PowerShell
PowerShell
C++
C/C++
JavaScript
JavaScript
PHP
PHP

🌐 Web & Database Technologies

HTML5
HTML5
CSS3
CSS3
MySQL
MySQL
PostgreSQL
PostgreSQL
MongoDB
MongoDB
Redis
Redis
SQLite
SQLite

🛠️ DevOps & Infrastructure

Linux
Linux
Docker
Docker
Kubernetes
Kubernetes
Git
Git
GitHub
GitHub
AWS
AWS
Azure
Azure

🎨 Development Tools & IDEs

VS Code
VS Code
Vim
Vim
Neovim
Neovim
Visual Studio
VS 2022
PyCharm
PyCharm
Sublime
Sublime
Regex
Regex

🎯 Expertise Breakdown

🔴 Red Teaming

✅ Active Directory exploitation
✅ Lateral movement techniques
✅ Persistence mechanisms
✅ Privilege escalation
✅ Domain enumeration
✅ Kerberos attacks
✅ C2 infrastructure setup

🌐 Web Security

✅ OWASP Top 10
✅ SQL Injection
✅ XSS & CSRF
✅ Authentication bypass
✅ API security testing
✅ Web app fuzzing
✅ Business logic flaws

🔬 Malware Analysis

✅ Static analysis
✅ Dynamic analysis
✅ Behavioral analysis
✅ Reverse engineering
✅ Evasion techniques
✅ Obfuscation methods
✅ Threat intelligence

📊 Skill Proficiency Levels

Python          ███████████████░░░░░   75%  Intermediate
Bash            ███████████████░░░░░   75%  Intermediate
PowerShell      ███████████████░░░░░   75%  Intermediate
C/C++           ███████████████░░░░░   75%  Intermediate
Web Pentesting  ██████████████████░░   90%  Advanced
Network Pentest ██████████████████░░   90%  Advanced
AD Exploitation ██████████████████░░   90%  Advanced
Exploit Dev     ████████████░░░░░░░░   60%  Intermediate
Malware Dev     ██████░░░░░░░░░░░░░░   30%  Beginner
OSINT           ███████████████░░░░░   75%  Intermediate
Social Eng      ██████████████████░░   90%  Advanced

🔥 Featured Projects & Tools

🛠️ Custom Security Tools

🔍 Click to expand my custom tools arsenal
Tool Name Description Language Status
SubEnum Advanced subdomain enumeration using CT logs Bash ✅ Active
RevShell-Gen Multi-language reverse shell payload generator Bash ✅ Active
CTF-Manager Automated CTF directory setup with statistics Bash ✅ Active
AD-Hunter Active Directory enumeration & exploitation PowerShell 🚧 Development
Evasion-Kit EDR/AV bypass techniques collection Python/C++ 🚧 Development
WebFuzzer-Pro Advanced web application fuzzing tool Python 📋 Planned
C2-Framework Custom command & control framework Go 📋 Planned
Exploit-DB Personal exploit development database Multiple 🚧 Development

📝 Latest Blog Posts & Writeups

kasem545

🔭 Current Focus

  • Building and automating internal red-team tools
  • Studying advanced Active Directory and privilege escalation techniques
  • Experimenting with malware development and detection evasion in lab environments

🧠 What I Enjoy

  • CTFs & exploit development
  • Network and System Hacking
  • Reverse engineering and low-level Windows internals
  • Writing clean and stealthy offensive scripts in Python & PowerShell

🐍 Contribution Snake

Snake animation

💰 Support My Research & Development

If you find my tools, or writeups valuable, consider supporting my work! Your support helps me dedicate more time to developing open-source security tools and creating educational content.

☕ Buy Me a Coffee

Buy Me A Coffee

💎 Cryptocurrency Support


Bitcoin (BTC)
Coming Soon

Ethereum (ETH)
Coming Soon

Monero (XMR)
Coming Soon

🎁 Other Ways to Support

GitHub Sponsors Patreon

Every contribution, no matter how small, helps me continue my mission of making cybersecurity knowledge accessible to everyone! 🙏

📬 Let's Connect & Collaborate!

I'm always excited to connect with fellow security researchers, pentesters, and hackers! Whether you want to collaborate on projects, discuss security topics, or just chat about the latest vulnerabilities, feel free to reach out!

🌐 Find Me On

🎮 Gaming & CTF Platforms

💬 Let's Talk About

  • 🔴 Red Team Operations & Tactics
  • 🎯 Penetration Testing Methodologies
  • 💉 Exploit Development & Research
  • 🔐 Active Directory Security
  • 🌐 Web Application Security
  • 🔬 Malware Analysis & Development
  • 🎮 CTF Challenges & Writeups
  • 📚 Cybersecurity Education & Mentoring
  • 🛠️ Tool Development & Automation
  • 🤝 Open Source Contributions

📜 Hacker's Creed

┌──────────────────────────────────────────────────────────────┐
│                                                              │
│  "We are the ones who knock... on port 443."               │
│                                                              │
│  "The quieter you become, the more you are able to hack."  │
│                                                              │
│  "In God we trust, all others we hack."                     │
│                                                              │
│  "There is no patch for human stupidity."                   │
│                                                              │
│  "The only system that is truly secure is one that is       │
│   powered off, cast in a block of concrete, sealed in a     │
│   lead-lined room with armed guards."                       │
│                                        - Gene Spafford       │
│                                                              │
└──────────────────────────────────────────────────────────────┘

🎯 My Mission

To contribute to the cybersecurity community by developing innovative tools, sharing knowledge through detailed writeups, and helping others learn offensive security techniques in a responsible and ethical manner.

⚖️ Responsible Disclosure

I follow responsible disclosure practices for all security research. If you believe I've found a vulnerability in your system, I'm happy to work with you to remediate it before any public disclosure.

    ██░ ██ ▄▄▄      ██▓███ ██▓███ ▓██  ██▓    ██░ ██ ▄▄▄      ▄████▄  ██ ▄█▀██▓███▄    █   ▄████ 
   ▓██░ ██▒████▄   ▓██░  ██▓██░  ██▒██  ██▒   ▓██░ ██▒████▄   ▒██▀ ▀█  ██▄█▒▓██▒██ ▀█   █  ██▒ ▀█▒
   ▒██▀▀██▒██  ▀█▄ ▓██░ ██▓▓██░ ██▓ ▒██ ██░   ▒██▀▀██▒██  ▀█▄ ▒▓█    ▄▓███▄░▒██▓██  ▀█ ██▒▒██░▄▄▄░
   ░▓█ ░██░██▄▄▄▄██▒██▄█▓▒ ▒██▄█▓▒ ░ ▐██▓░   ░▓█ ░██░██▄▄▄▄██▒▓▓▄ ▄██▓██ █▄░██▓██▒  ▐▌██▒░▓█  ██▓
   ░▓█▒░██▓▓█   ▓██▒██▒ ░  ▒██▒ ░  ░ ██▒▓░   ░▓█▒░██▓▓█   ▓██▒ ▓███▀ ▒██▒ █░██▒██░   ▓██░░▒▓███▀▒
    ▒ ░░▒░▒▒▒   ▓▒█▒▓▒░ ░  ▒▓▒░ ░  ██▒▒▒     ▒ ░░▒░▒▒▒   ▓▒█░ ░▒   ▒ ▒ ▒▒ ▓▒▒ ░ ▒░   ▒ ▒  ░▒   ▒ 
    ▒ ░▒░ ░ ▒   ▒▒ ░▒ ░    ░▒ ░   ▓██ ░▒░     ▒ ░▒░ ░ ▒   ▒▒ ░  ░   ░ ░ ░▒ ▒░░ ░ ░    ░     ░   ░ 
    ░  ░░ ░ ░   ▒  ░░      ░░     ▒ ▒ ░░      ░  ░░ ░ ░   ▒   ░ ░   ░ ░ ░░ ░   ░   ░ ░   ░ ░   ░ 
    ░  ░  ░     ░  ░                ░ ░         ░  ░  ░     ░  ░      ░ ░  ░           ░         ░ 
                                  ░ ░                                                              

Made with love License Maintained

🔐 Hack the Planet | Stay Curious | Break Things (Ethically) | Build Better Security 🔐

Last Updated: December 2025 | This profile is a living document and continuously evolving

⭐ If you find my work interesting, consider starring my repositories! ⭐
🔥 Let's connect and make the cyber world more secure together! 🔥

Pinned Loading

  1. JS-endpoint-extractor JS-endpoint-extractor Public

    bookmark for javascript endpoint extractor

    JavaScript 11 2

  2. AMSIBypass AMSIBypass Public

    Bypass AMSI

    C#

  3. gtfobins-cli gtfobins-cli Public

    Forked from t0thkr1s/gtfobins-cli

    Search for Unix binaries that can be exploited to bypass system security restrictions.

    Python

  4. arsenal arsenal Public

    Forked from Orange-Cyberdefense/arsenal

    Arsenal is just a quick inventory, reminder and launcher for pentest commands

    Python

  5. ntlm_theft ntlm_theft Public

    Forked from Greenwolf/ntlm_theft

    A tool for generating multiple types of NTLMv2 hash theft files

    Python

  6. GriffonAD GriffonAD Public

    Forked from shellinvictus/GriffonAD

    Generate low-level commands to exploit the AD easily: learn and control every steps.

    Python