Hello, I'mHusain Almousawi

EpicZx

< Previous Projects />

A collection of my work in programming, cybersecurity, and other technical domains.

SecureChatApplication

Secure Chat Application

End-to-end encrypted messaging platform with zero-knowledge architecture.

ReactNode.jsCryptographyWebSockets
View Project
NetworkIntrusionDetectionSystem

Network Intrusion Detection System

ML-powered system to detect and alert on suspicious network activity.

PythonTensorFlowNetwork SecurityDocker
View Project
BlockchainVotingSystem

Blockchain Voting System

Secure and transparent voting platform built on blockchain technology.

SolidityEthereumReactWeb3.js
View Project
PasswordManager

Password Manager

Zero-knowledge password manager with biometric authentication.

SwiftKotlinCryptographyBiometrics
View Project
VulnerabilityScanner

Vulnerability Scanner

Automated tool to scan web applications for common security vulnerabilities.

PythonOWASPWeb SecurityAutomation
View Project
SecureFileSharing

Secure File Sharing

Platform for secure file sharing with granular access controls and audit logs.

ReactNode.jsAWSEncryption
View Project

< CTF Writeups />

Detailed walkthroughs of Capture The Flag challenges I've solved.

webHackTheBox CTF2023-10-15

Web Exploitation: SQL Injection

Bypassing authentication through SQL injection vulnerabilities.

Difficulty: MediumRead Writeup
reverseDEFCON CTF2023-09-22

Reverse Engineering: Malware Analysis

Analyzing a malicious binary to extract the hidden flag.

Difficulty: HardRead Writeup
🔒picoCTF2023-08-05

Cryptography: RSA Challenge

Breaking weak RSA implementation to decrypt the flag.

Difficulty: MediumRead Writeup
forensicsSANS Holiday Hack2023-07-18

Forensics: Memory Analysis

Extracting evidence from a memory dump to recover the flag.

Difficulty: HardRead Writeup
💣CyberDefenders CTF2023-06-30

Binary Exploitation: Buffer Overflow

Exploiting a buffer overflow vulnerability to gain shell access.

Difficulty: ExpertRead Writeup
🔎TryHackMe2023-05-12

OSINT: Digital Footprint Analysis

Using open-source intelligence to track down information.

Difficulty: EasyRead Writeup

< Skills & Expertise />

My technical skills and areas of expertise in cybersecurity, programming, and related fields.

Penetration Testing

BeginnerIntermediateExpert

Identifying and exploiting security vulnerabilities in systems and networks.

Digital Forensics

BeginnerIntermediateExpert

Collecting and analyzing digital evidence for incident response and investigations.

VB.NET

BeginnerIntermediateExpert

Building Windows applications and automation tools with Visual Basic .NET.

C#

BeginnerIntermediateExpert

Developing robust applications and tools for the .NET ecosystem.

HTML/CSS

BeginnerIntermediateExpert

Creating responsive and visually appealing web interfaces.

JavaScript

BeginnerIntermediateExpert

Building interactive web applications and implementing client-side functionality.

Python

BeginnerIntermediateExpert

Developing security tools, automation scripts, and data analysis.

React

BeginnerIntermediateExpert

Building modern, component-based user interfaces and single-page applications.

< Timeline of My Journey />

A chronological journey through my learning path, certifications, and key milestones.

2011
💡

The Beginning of My Journey

Unknown
education

At 9, my teacher challenged me to bypass a WinRAR password. That challenge sparked my passion for hacking and cybersecurity.

2015–2017
🔍

Exploring Hacking & Finding Vulnerabilities

Unknown
education

Spent time exploring hacking techniques and discovered vulnerabilities in multiple companies.

2018
💻

Selling Hacking & Social Media Tools

Unknown
work

Sold hacking tools and third-party social media tools, gaining insight into cybersecurity risks and exploits.

2019
🎓

VB.NET Course Instructor

Unknown
work

Taught a VB.NET course to 30 students, sharing knowledge about software development and programming logic.

2020
💻

.NET Reverse Engineering

Mar 17
certification

Completed a deep dive into .NET Reverse Engineering, exploring how software can be decompiled, analyzed, and modified.

2023
⚛️

React Development

Feb 19
certification

Completed a React course, gaining expertise in building modern, interactive web applications.

2023
🐞

Bug Bounty Hunting

Jun 10
certification

Completed a Bug Bounty course, sharpening my skills in web security, ethical hacking, and vulnerability hunting.

2023
🎮

Game Hacking with Cheat Engine

Sep 9
education

Explored Cheat Engine, learning how games process memory and how to manipulate them for educational purposes.

2023
🦉

Founder & CEO of SecureHoot

Oct 5
work

SecureHoot, a company specializing in cybersecurity services and web devlopment

2024
🎭

Social Engineering Course

Aug 26
certification

Completed a Social Engineering course, focusing on psychological manipulation and security awareness.

2024
🦉

Founder & CEO of HootHunters

Nov 1
work

Founded HootHunters, a sub-company of SecureHoot, providing cybersecurity courses and a bug bounty platform.

< Contact Me />

Have a project in mind or want to discuss cybersecurity? Feel free to reach out!

01. Send a Message

02. Connect With Me

Email

3h5@securehoot.com

Location

Kuwait

03. Social Profiles