Loading...
Loading...
Coding for 11 years.
#!/usr/bin/env python3
# -*- coding: utf-8 -*-
class OffensiveSecuritySpecialist:
"""
Cyber Security Enthusiast | Penetration Tester | Red Team Operator
"""
def __init__(self):
self.username = "Kasem Shibli"
self.role = "Red Team Operator & Penetration Tester"
self.location = "IL Israel"
self.language_spoken = ["ar_IL", "en_US", "he_IL"]
self.code = {
"Intermediate": ["Python", "PowerShell", "Bash", "C/C++"],
"learning": ["Windows APIs", "lua", "Rust"]
}
self.tools = {
"exploitation": ["Metasploit", "Cobalt Strike", "Empire", "Adaptixc2"],
"web_testing": ["Burp Suite Pro", "OWASP ZAP", "SQLMap", "Nuclei"],
"network": ["Nmap", "Masscan", "Wireshark", "Responder", "NetExec"],
"ad_attack": ["BloodHound", "Mimikatz", "Rubeus", "PowerView", "Impacket"],
"osint": ["TheHarvester", "Recon-ng", "Maltego", "Shodan", "Amass"],
"custom": ["Self-developed tools available on GitHub"]
}
self.methodologies = [
"MITRE ATT&CK Framework",
"OWASP Testing Guide",
"PTES (Penetration Testing Execution Standard)",
"OSSTMM (Open Source Security Testing Methodology)",
"NIST Cybersecurity Framework"
]
def daily_routine(self):
activities = {
"morning": "☕ HTB/THM challenges + CTF writeups",
"afternoon": "💻 Tool development & exploit research",
"evening": "📖 Reading research papers & studying for certs",
"night": "🎮 Gaming & more hacking"
}
return activities
def get_quote(self):
return "In God we trust, everything else we hack! 🔓"
def contact_me(self):
return {
"email": "kasem545@proton.me",
"linkedin": "linkedin.com/in/kasemshibli",
"website": "kasem545.github.io",
"pgp": """-----BEGIN PGP PUBLIC KEY BLOCK-----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=AKMh
-----END PGP PUBLIC KEY BLOCK-----"""
}
# Initialize
hacker = OffensiveSecuritySpecialist()
print(f"[+] {hacker.username}: {hacker.get_quote()}")
print(f"[+] Current Focus: {hacker.current_projects()}")
🔥 Active Operations
|
🎓 Learning Path 2026/2027
|
|
|
|
┌─────────────────────────────────────────────────────────────────┐
│ Platform │ Machines │ Rank │ Points │ Streak │
├─────────────────────────────────────────────────────────────────┤
│ HackTheBox │ 50+ │ Active │ 1500+ │ 30d │
│ TryHackMe │ 100+ │ Top 5% │ 5000+ │ 45d │
└─────────────────────────────────────────────────────────────────┘
Recent Achievements:
✅ Completed Pro Labs: DANTE, P.O.O, FullHouse, Solar
✅ HackTheBox Seasonal: All challenges completed
✅ TryHackMe: Offensive Pentesting Path 100%
|
Python |
Bash |
PowerShell |
C/C++ |
JavaScript |
PHP |
|
HTML5 |
CSS3 |
MySQL |
PostgreSQL |
MongoDB |
Redis |
SQLite |
|
Linux |
Docker |
Kubernetes |
Git |
GitHub |
AWS |
Azure |
|
VS Code |
Vim |
Neovim |
VS 2022 |
PyCharm |
Sublime |
Regex |
🔴 Red Teaming
✅ Active Directory exploitation |
🌐 Web Security
✅ OWASP Top 10 |
🔬 Malware Analysis
✅ Static analysis |
Python ███████████████░░░░░ 75% Intermediate
Bash ███████████████░░░░░ 75% Intermediate
PowerShell ███████████████░░░░░ 75% Intermediate
C/C++ ███████████████░░░░░ 75% Intermediate
Web Pentesting ██████████████████░░ 90% Advanced
Network Pentest ██████████████████░░ 90% Advanced
AD Exploitation ██████████████████░░ 90% Advanced
Exploit Dev ████████████░░░░░░░░ 60% Intermediate
Malware Dev ██████░░░░░░░░░░░░░░ 30% Beginner
OSINT ███████████████░░░░░ 75% Intermediate
Social Eng ██████████████████░░ 90% Advanced
| Tool Name | Description | Language | Status | |-----------|-------------|----------|--------| | SubEnum | Advanced subdomain enumeration using CT logs | Bash | ✅ Active | | RevShell-Gen | Multi-language reverse shell payload generator | Bash | ✅ Active | | CTF-Manager | Automated CTF directory setup with statistics | Bash | ✅ Active | | AD-Hunter | Active Directory enumeration & exploitation | PowerShell | 🚧 Development | | Evasion-Kit | EDR/AV bypass techniques collection | Python/C++ | 🚧 Development | | WebFuzzer-Pro | Advanced web application fuzzing tool | Python | 📋 Planned | | C2-Framework | Custom command & control framework | Go | 📋 Planned | | Exploit-DB | Personal exploit development database | Multiple | 🚧 Development |
If you find my tools, or writeups valuable, consider supporting my work! Your support helps me dedicate more time to developing open-source security tools and creating educational content.
|
Bitcoin (BTC) Coming Soon
|
![]() Ethereum (ETH) Coming Soon
|
![]() Monero (XMR) Coming Soon
|
Every contribution, no matter how small, helps me continue my mission of making cybersecurity knowledge accessible to everyone! 🙏
I'm always excited to connect with fellow security researchers, pentesters, and hackers! Whether you want to collaborate on projects, discuss security topics, or just chat about the latest vulnerabilities, feel free to reach out!
┌──────────────────────────────────────────────────────────────┐
│ │
│ "We are the ones who knock... on port 443." │
│ │
│ "The quieter you become, the more you are able to hack." │
│ │
│ "In God we trust, all others we hack." │
│ │
│ "There is no patch for human stupidity." │
│ │
│ "The only system that is truly secure is one that is │
│ powered off, cast in a block of concrete, sealed in a │
│ lead-lined room with armed guards." │
│ - Gene Spafford │
│ │
└──────────────────────────────────────────────────────────────┘
To contribute to the cybersecurity community by developing innovative tools, sharing knowledge through detailed writeups, and helping others learn offensive security techniques in a responsible and ethical manner.
I follow responsible disclosure practices for all security research. If you believe I've found a vulnerability in your system, I'm happy to work with you to remediate it before any public disclosure.
██░ ██ ▄▄▄ ██▓███ ██▓███ ▓██ ██▓ ██░ ██ ▄▄▄ ▄████▄ ██ ▄█▀██▓███▄ █ ▄████
▓██░ ██▒████▄ ▓██░ ██▓██░ ██▒██ ██▒ ▓██░ ██▒████▄ ▒██▀ ▀█ ██▄█▒▓██▒██ ▀█ █ ██▒ ▀█▒
▒██▀▀██▒██ ▀█▄ ▓██░ ██▓▓██░ ██▓ ▒██ ██░ ▒██▀▀██▒██ ▀█▄ ▒▓█ ▄▓███▄░▒██▓██ ▀█ ██▒▒██░▄▄▄░
░▓█ ░██░██▄▄▄▄██▒██▄█▓▒ ▒██▄█▓▒ ░ ▐██▓░ ░▓█ ░██░██▄▄▄▄██▒▓▓▄ ▄██▓██ █▄░██▓██▒ ▐▌██▒░▓█ ██▓
░▓█▒░██▓▓█ ▓██▒██▒ ░ ▒██▒ ░ ░ ██▒▓░ ░▓█▒░██▓▓█ ▓██▒ ▓███▀ ▒██▒ █░██▒██░ ▓██░░▒▓███▀▒
▒ ░░▒░▒▒▒ ▓▒█▒▓▒░ ░ ▒▓▒░ ░ ██▒▒▒ ▒ ░░▒░▒▒▒ ▓▒█░ ░▒ ▒ ▒ ▒▒ ▓▒▒ ░ ▒░ ▒ ▒ ░▒ ▒
▒ ░▒░ ░ ▒ ▒▒ ░▒ ░ ░▒ ░ ▓██ ░▒░ ▒ ░▒░ ░ ▒ ▒▒ ░ ░ ░ ░ ░▒ ▒░░ ░ ░ ░ ░ ░
░ ░░ ░ ░ ▒ ░░ ░░ ▒ ▒ ░░ ░ ░░ ░ ░ ▒ ░ ░ ░ ░ ░░ ░ ░ ░ ░ ░ ░ ░
░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░ ░
░ ░
🔐 Hack the Planet | Stay Curious | Break Things (Ethically) | Build Better Security 🔐
Last Updated: December 2025 | This profile is a living document and continuously evolving
⭐ If you find my work interesting, consider starring my repositories! ⭐
🔥 Let's connect and make the cyber world more secure together! 🔥
Contribution Graph
Activity Timeline
Commits and contributions grouped by day, week, or month.
merged pull request in t0thkr1s/gtfobins-cli
February 4th, 2026 3:05 PM
Starred decalage2/oletools
February 4th, 2026 11:13 AM
Starred Sharkeonix/nmap-unleashed
February 4th, 2026 4:15 AM
Starred ambionics/phpggc
February 4th, 2026 3:35 AM
Pushed to master at kasem545/arsenal
February 4th, 2026 1:03 AM
Pushed to dev2 at kasem545/arsenal-v2
February 3rd, 2026 8:17 PM
Pushed to dev2 at kasem545/arsenal-v2
February 3rd, 2026 8:08 PM
Pushed to dev2 at kasem545/arsenal-v2
February 3rd, 2026 7:50 PM
Created branch dev2 in kasem545/arsenal-v2
February 3rd, 2026 7:38 PM
Pushed to dev at kasem545/arsenal-v2
February 3rd, 2026 7:37 PM