§ 01 · SUBJECT DOSSIER
LAST SEEN — — : — —
root@redcell:~/engagement$

Duty1g

ROLE Security Researcher
HUNT Bug Bounty Hunter
RED Red Team Expert
TITLE Senior Penetration Tester
SPEC Application Security Specialist

More than 10 years inside adversary footprints. Red-team operator, exploit author, field researcher — designing intrusions across infrastructure, web, mobile, API and cloud surface. Stealth, discipline, precision.

proceed
§ 02

Field Notes

Architecting intrusions across infrastructure, web, API, mobile, and cloud.

Red Team — full-scope adversary emulation against hardened enterprise and government estates. Author of Velocity, a fully-interactive TUI C2, alongside EDR evasion primitives, Active Directory abuse chains, and phishing infrastructure built to move quietly.

Bug Bounty — over 150 critical vulnerabilities disclosed across Synack and public programs. Remote code execution, authentication bypass, API takeover, cloud misconfiguration, and the occasional zero-day — surfaced through custom exploits and purpose-built recon automation.

CTF — capturing flags since 2011, currently with DeadSec and Friendly Maltese Citizens.

§ 03

Released Ordnance

◤ COMING SOON
  ⟦V⟧──▶──◉
   │  C2  │
   ◉──▶──⟦0⟧
C2 / RED-TEAM // python + zig

Velocity

The first fully-interactive TUI C2 framework — Python orchestration, Zig-powered implants. Fully customizable malleable profiles, multi-agent fleet handling, and entire operations driven from a single terminal window. Lightweight, blazing fast, with an optional web console. Opsec engineered from the socket up.

release · tbd
    ╱╲_╱╲
   (  -.-)
   o_(")(")
   ★ 400+
RECON // python

SubCat

Passive subdomain discovery aggregating dozens of sources. 400+ stars. v1.3 ships advanced tech detection, filtering, and reverse-lookup mode for deeper subdomain intelligence.

view repository
 ┌─[SQLi]
 │ 0x27
 └─▶ drop
EXPLOIT // python

SQLCat

Blind and time-based SQL injection automation with payload fuzzing and extraction routines tuned for latency-delicate targets.

view profile
  ┬┴┬┴┐
  ┤◎└──
  ┬┴┬┴┘
POST-EX // purebasic

dty

A deliberately tiny Windows reverse shell — minimal footprint, fast deploy, built for constrained egress and small staging windows.

view repository
  ╭────╮
  │ 🗝  │
  ╰─┬──╯
    ▼ SYSTEM
PRIV-ESC // purebasic

PwnTato

Local Privilege Escalation from Windows service accounts to NT AUTHORITY\SYSTEM — SeBackupPrivilege token abuse, a pocket variant of the potato family for opportunistic ops.

view repository
█████████ Contributor to several private red-team tools for AD exploitation, phishing automation, and EDR evasion. █████████
§ 04

Field Dispatches

  1. 2024
    Synack · Exploits Explained

    Turning Frontend Clues into Backend Compromise: Insecure Routing to RCE

    Unsafe eval() inside a dynamic backend router turned a benign frontend breadcrumb into arbitrary PHP execution. A walkthrough of how a routing primitive — hidden behind minified client code — escalated to full remote code execution.

    rceevalroutingphp
    read
  2. 2019 · DEC
    LinkedIn · Research

    Pentesting Twirp / gRPC-Web — Recon & Reverse-engineering

    Fingerprinting gRPC-Web traffic via HTTP headers, decoding base64 payloads, and rebuilding Protocol Buffer schemas from minified JavaScript. Practical techniques for operators hitting modern RPC surfaces.

    grpc-webtwirpprotobufreverse-eng
    read
  3. 2019 · SEP
    LinkedIn · HTB Writeup

    Luke — HackTheBox Writeup

    Walkthrough of the HackTheBox Luke machine — REST API enumeration, JWT authentication abuse, PHP source leakage, and Ajenti-based foothold to shell.

    hacktheboxrestjwtajenti
    read
  4. 2018
    LinkedIn · CTF Writeup

    Past CTF Writeups: NekoCat — CSAW Finals

    Walkthrough of the NekoCat web challenge from CSAW CTF 2018 Finals — chaining stored XSS against an admin bot to leak a secret, forging cookies, and landing Python pickle RCE on a Flask backend.

    csawxssflaskpickle-rce
    read
▓▓▓▓ more writeups published under private disclosure programs · unlisted by design ▓▓▓▓
§ 05

Credentials & Honours

Certifications

OSCE³
Offensive Security Certified Expert (Triple)
OSWE · OSEP · OSED
OSCP
Offensive Security Certified Professional
OSWE
Offensive Security Web Expert
OSEP
Offensive Security Experienced Penetration Tester
OSED
Offensive Security Exploit Developer
CRTP
Certified Red Team Professional
CRTE
Certified Red Team Expert
SFC
SCRUMstudy Scrum Fundamentals

Highlights

  • #01
    SICA CTF · 2018 Algerian Ministry of National Defense
  • #01
    CSAW MENA Finals · Tunisia · 2018 MENA region Capture-the-Flag
  • #09
    BlackHAT MEA · 2023 CTF Capture-the-Flag finalist
  • 150+
    Critical Vulnerabilities Disclosed SQLi · RCE · zero-day · API takeover · mobile
§ 06

Open a Channel

secure-channel — 0x80@redcell — 80×24
$ whoami
marouane belabbassi · senior offensive security specialist

$ locate --available
engagements · red-team · appsec · research · mentoring

$ cat contact.yaml
$ echo "end-of-transmission" > /dev/stdout
$