Intrusion Detection System with ELK & Suricata
Built a lab-based IDS on CentOS with Suricata and ELK Stack to monitor traffic, automate log analysis, and demonstrate faster detection of network threats.
Curious and methodical Penetration Tester, I turn x86 machine code into working exploits before the coffee gets cold (and trust me, I drink it fast). I spot weaknesses others miss by blending source review with low-level debugging, then prove impact with clean, custom PoCs.
My toolkit includes IDA Pro, Ghidra, x64dbg, Radare2, plus Pwntools wrapped in Python/C same tools the black-hats love, except I use them to ruin their day before breakfast.
Off-clock, I’m deep in CTF challenges, hunting new vulnerability classes, or writing up findings with obsessive details. Integrity isn’t a checkbox for me. it’s why I only break things I’m invited to, and always leave them stronger. I work best with remote-first, globally distributed teams. I never forget that real security starts with trusting people behind the systems.
Ready to protect yours.
Master's Level Engineering Degree in Computer Science, Networks and Multimedia
Private International Polytechnic School of Tunis
Professional Master's Degree in Operational Cybersecurity
Tunis Higher School of Communications
Professional Master's Degree in Open Source Software Engineering
Higher Institute of Computer Science
Built a lab-based IDS on CentOS with Suricata and ELK Stack to monitor traffic, automate log analysis, and demonstrate faster detection of network threats.
Developed a proof-of-concept keylogger in a controlled lab with pynput and smtplib, highlighting exfiltration risks and strengthening understanding of attacker techniques.
Recovered deleted files and artifacts from a compromised VM using Autopsy and SIFT Workstation, reinforcing skills in digital forensics and incident response.
Celebrating my graduation in Operational Cybersecurity and the hands-on journey through low-level exploitation, reverse engineering, and exploit development.