About

Learn more about me

Abdelrahman Nasr

Penetration Tester & Python Developer.

  • Birthday: 1 March 1998
  • Website: www.root-x.dev/Abdelrahman-Nasr/
  • Phone: +20 10 67 68 55 68
  • City: Cairo, Egypt

When solving problems, I apply both logic and emotional aspects in equal proportion.
For instance, I'm trained in the Cybersecurity discipline and understand how to use analytics in Red Teaming l, but I also majored in python development and know-how to apply creativity to projects as well.

CTF

Hackerrank Challenges

Github Projects

Certificates

Skills

Web App Penetration Testing 85%
Network Penetration Testing 80%
Red Teaming 60%
Vulnerability Management70%
Python 80%
Cryptography 70%
Steganography 70%
Git & GitHub 70%

Interests

Cyber Security

Penetration Testing

Cryptography

Steganography

Python

Django

Rest API

PyQt5

Reverse Engineering

Adobe Photo Shop

Adobe Premiere Pro

Adobe After Effects

Testimonials

Proin iaculis purus consequat sem cure digni ssim donec porttitora entum suscipit rhoncus. Accusantium quam, ultricies eget id, aliquam eget nibh et. Maecen aliquam, risus at semper.

Saul Goodman

Ceo & Founder

Export tempor illum tamen malis malis eram quae irure esse labore quem cillum quid cillum eram malis quorum velit fore eram velit sunt aliqua noster fugiat irure amet legam anim culpa.

Sara Wilsson

Designer

Enim nisi quem export duis labore cillum quae magna enim sint quorum nulla quem veniam duis minim tempor labore quem eram duis noster aute amet eram fore quis sint minim.

Jena Karlis

Store Owner

Fugiat enim eram quae cillum dolore dolor amet nulla culpa multos export minim fugiat minim velit minim dolor enim duis veniam ipsum anim magna sunt elit fore quem dolore labore illum veniam.

Matt Brandon

Freelancer

Quis quorum aliqua sint quem legam fore sunt eram irure aliqua veniam tempor noster veniam enim culpa labore duis sunt culpa nulla illum cillum fugiat legam esse veniam culpa fore nisi cillum quid.

John Larson

Entrepreneur

Resume

Check My Resume

Education

2017 - 2021

BACHELOR OF COMPUTER SCIENCE & INFORMATION
Computer Science Department, Nahda University in Beni Suef, NUB.

Graduation Project

Ghoster-X

It is a service for secretly hiding user messages inside various file types (e.g., video, audio, image and text) using today s highest encryption standards.
ghosterx.root-x.dev

Root-X

it is a blog for cybersecurity to help people to know this field and learned it simply, this blog will be in Arabic and English to help more students from all around the world.
www.root-x.dev

Profile

Cyber Security

  • Web Application Pentesting: Studied an OWASP Top 10 and begin of SANS top 25 vulnerability and worked on bug hunting in (ex: - Hackerone - Bugcrowd).
  • In Machine Pentesting: Studied an OSCP (Offensive Security Certificate Professional), CEH (Certificate Ethical Hacking), and worked in a lot of machines and labs (ex: - Linux – Windows).
  • In Cryptography: Studied Cryptography and Steganography science and worked on a project that combines these.
  • I Studied Social Engineering and I wrote many articles about Social Engineering attacks.

Network

I Studied in Network CCNA Routing & Switching (200-125) + CCNA Security (210-260), In addition to my knowledge of python network programming.

Programming

  • I am studying Python (Security, Cryptography, Steganography, Flask, Django, Rest, Data Structure, Algorithms, Networking, MySQL, Design Pattern, PyQt5, and Tkinter).
  • Web Design: HTML, HTML5, CSS, CSS3, Bootstrap, JS Basic, PHP Basic, MySQL Basic.

Operating Systems

  • Different Linux Distributions, especially distributions based on Debian.
  • Windows & Windows Server.

Courses

  • OSCP (offensive security certified professional).
  • CEH (Certificate Ethical Hacking).
  • Web Applications Vulnerability (OWASP Top 10).
  • ZDResearch Advanced Web Hacking.
  • Network Penetration Testing.
  • IT Security: Defense against the digital dark arts.

Languages

Arabic

Native or bilingual proficiency

English

Professional working proficiency

Side Activities

  • Reverse Engineering
  • Flutter
  • Adobe Photo Shop
  • Adobe Premiere Pro
  • Adobe After Effects
  • UI & UX Design

Certificates

My Certificates

  • All
  • Cyber Security
  • Python
  • Network

PCAP - Certified Associate in Python Programming

Python Institute

Web Application Technologies and Django

University of Michigan

Cyber Security Foundation Professional Certificate - CSFPC™

CertiProf

Introduction to Cybersecurity

Cisco

IT Security - Defense against the digital dark arts

Google

MENA INFORMATION SECURITY CONFERENCE 2021

VirtuPort

MENA INFORMATION SECURITY CONFERENCE 2020

VirtuPort

ICT Competition

Huawei

Python Challenges

Hackerrank

Articles

My Articles

Your digital fingerprint - the biggest threat to your privacy || بصمتك الرقمية - أكبر تهديد لخصوصيتك

ما هي البصمة الإلكترونية ؟ كيف تشكل تهديد علي خصوصيتي ؟

Is my phone infected with a virus || هل هاتفي مصاب بفيروس

هل هاتفي مصاب بفيروس؟ كيف أحمي هاتفي؟

كيف تحقق إدارة أفضل لمخاطر الامن السيبراني | How to achieve better cybersecurity risk management

العديد من سياسات الأمن السيبراني الأساسية التي أصبحت ضرورية بشكل متزايد و علي الشركات اتباعها لتقليل أضرار الهجمات الالكترونية

كيف تحمي تطبيقات الهاتف و الـ APIs من الهجمات السيبرانية

أدى النمو في هاتين التقنيتين إلى تعريض المستخدمين وبياناتهم لتهديدات أمنية كبيرة يمكن للقراصنة الوصول إلى الأجهزة بسهولة

Audio Steganography - اخفاء البيانات في الصوت

إحدى الطرق لتحقيق إخفاء المعلومات الصوتية تتمثل في استخدام نطاق الموجات فوق الصوتية أو الموجات تحت الصوتية او باستخدام الاثنين

Image Steganography - اخفاء البيانات في الصور

تسمى الصورة المحددة لهذا الغرض بـ cover image والصورة التي تم الحصول عليها بعد اخفاء البيانات بـ stego-image.

Infographics

My infographic

IDOR in Nutshell

XSS In nutshell

Log4Shell In nutshell

Race Condation in nutshell

Steganography in nutshell

Wireshark in nutshell

Prevent SSRF attacks

Prevent CRLF attacks

Prevent SQL Injection

Prevent XXE attack

Linux Interview Question

Prevent IDOR attack

Prevent DoS attack

Prevent CSRF attack

Prevent CORS misconfiguration

Prevent XSS attack

Prevent Race Condation

Google Dork CheatSheet

Google Dorks Cheatsheet