🛡️ Cybersecurity Professional

Penetration Testing |

Offensive Security | Ethical Hacking | Red Team

I am Youness, a cybersecurity student specialized in Penetration Testing. I focus on identifying vulnerabilities and helping organizations improve their security.

50+
Projects Completed
5+
Certifications
100%
Client Satisfaction
🎯 What I Do

Professional Services

Comprehensive security solutions tailored to your organization's needs

Penetration Testing

Comprehensive security assessments to identify vulnerabilities in your infrastructure, applications, and network systems.

  • Network Security Testing
  • Web Application Testing
  • Mobile App Security

Vulnerability Assessment

Systematic examination of security weaknesses in your systems with detailed reports and remediation recommendations.

  • Automated Scanning
  • Manual Verification
  • Risk Prioritization

Red Team Operations

Simulated real-world attacks to test your organization's detection and response capabilities against advanced threats.

  • Social Engineering
  • Physical Security Testing
  • Threat Simulation

Security Consulting

Expert guidance on security architecture, policy development, and compliance requirements for your organization.

  • Security Audits
  • Compliance Assessment
  • Training & Awareness
💻 Technical Expertise

Skills & Technologies

Core competencies and tools that power my security assessments

Offensive Security

Web Application Testing
Network Penetration
Exploit Development
Social Engineering

Programming & Scripting

Python
Bash/Shell
JavaScript
PowerShell

Security Frameworks

OWASP Top 10
MITRE ATT&CK
PTES
NIST
🛠️ Arsenal

Security Tools

Professional tools and frameworks I use for security assessments

🐉

Kali Linux

🔍

Burp Suite

⚔️

Metasploit

🌐

Nmap

🔓

John the Ripper

🦈

Wireshark

🔐

Hashcat

🎯

SQLMap

📝 Knowledge Base

Research & Writeups

Latest security research, vulnerability disclosures, and technical writeups

Advanced SQL Injection Techniques

Exploring modern SQL injection vectors and bypassing WAF protections in enterprise applications.

Read More →

Active Directory Exploitation

Complete guide to compromising Active Directory environments from initial access to domain dominance.

Read More →

Android Application Pentesting

Methodology for testing Android applications including reverse engineering and runtime manipulation.

Read More →
📧 Get In Touch

Let's Work Together

Have a security project or need consultation? Reach out and let's discuss how I can help.

Email

black1black234b@gmail.com

Location

Morocco

Phone

+212 628315771