Mokhtar
root@init ~/shoz3n.me
$ whoami
Mokhtar
$ curl ipinfo.io
📍 Location: Nice, France
└─ University: UNICE
$ ls -la ~/skills

Skills Directory

Expertise in cybersecurity and secure development

Pentesting

Web, Network, Systems ...

Vulnerability Assessment

Security auditing & analysis

Smart Contracts Security

auditing etheruem smart contracts

Web Development

Full-stack secure web & desktop applications

Bash Scripting

Automation & tooling

Malware analysis

Reverse Engineering of Malwares

Infrastructures Maintaining

ensuring Systems security & configuration

$ history | grep 'project'

Project History

Security tools and applications I've built

Sh0zack

Sh0zack

31

Advanced Penetration Testing Framework powered by Bash. Comprehensive toolkit for network reconnaissance, DNS enumeration, directory fuzzing, brute-force attacks, and web vulnerability scanning.

BashPentestingFrameworkSecurity

Sh0zai

AI-powered security tool for automated vulnerability assessment and penetration testing workflows.

AISecurityAutomationPentesting

Hydra

4

AI-powered health application designed to help pregnant women during their pregnancy by predicting medical urgencies through body changes analysis. Features ML-based health risk assessment and real-time monitoring.

AIMLHealthcareFlutterMobile

C2

Command & Control server infrastructure for security research and malware analysis. Educational tool for understanding C2 communication patterns.

InfraC2SecurityResearch

Rootkit

Malware research project focusing on rootkit detection and analysis. Educational tool for understanding how malware hides its presence on systems.

MalwareRootkitSecurityResearch
Valrose Quest

Valrose Quest

A 2D top-down game based on a generic game engine developed using LibGDX. The engine is designed to allow game content to be extended exclusively through the Tiled map editor..

JavaGame EngineUNICE

Browser Extension

browser extension for web application testing and vulnerability detection.

ExtensionWeb SecurityBrowser
$ cat ~/.experience

Experience Log

Professional and educational background

Cybersecurity Internship

Banque BDL Cheria

Stage · 2024

Audited internal security protocols and network infrastructure. Conducted vulnerability assessments across the bank's systems, analyzed security policies, and produced remediation reports aligned with banking compliance standards.

security auditnetwork analysisvulnerability assessmentreporting

Instructor — Python, Bash & Offensive Security

Alphorm France

Freelance · Oct 2024

Delivered training content on Python scripting, Bash automation, and offensive security fundamentals. Produced structured course material targeting developers transitioning into cybersecurity roles.

PythonBashoffensive securitycourse design

Web Developer

MALT — Freelance

Freelance · 2023 – Present

Designing and shipping full-stack web applications for clients across various industries. Stack: MERN, TypeScript, Django, Flask. Security-first approach — auth hardening, input validation, dependency auditing on every project.

MERNTypeScriptDjangosecurity hardening

Competitive CTF & Offensive Security

TryHackMe · HackTheBox · MENA · HackFest · BlackHat CTF

Compétitions · Ongoing

#1 TryHackMe Africa (Summer 2024). Active competitor across international CTFs including MENA CTF, HackFest, and BlackHat CTF. Specialization: web exploitation, reverse engineering, and privilege escalation. Consistent top finishes in multi-national events.

#1 THM Africaweb exploitationrev engineeringprivescinternational CTFs
$ ps aux | grep 'learning'

Learning Processes

Academic journey and qualifications

ESTIN

3rd Year

Algeria

Engineering studies in Computer Science with focus on cybersecurity and systems.

Université Côte d'Azur

L2 Informatique

France

Second year of Computer Science studies. Currently pursuing degree in France.

Classe Préparatoire

2 Years

Algeria

Intensive preparatory classes in Mathematics, Physics, and Computer Science.

$ cat ~/.achievements

Achievements & CTF

Competitive security challenges and certifications

CTF Competitions

[Competition]

Active participant in multiple Capture The Flag competitions, honing skills in real-world security challenges.

View CTF Profile →

Security Certifications

[Certification]

Various cybersecurity certifications and training programs completed. Check LinkedIn for full details.

Bug Bounty

[Security]

Engaged in responsible disclosure and bug bounty programs.

Open Source

[Development]

Contributing to security tools and frameworks in the open source community.

TryHackMe

[Platform]

Active on TryHackMe platform, completing rooms and challenges to enhance penetration testing skills.

HackTheBox

[Platform]

Practicing offensive security on HackTheBox, solving machines and improving red team techniques.

HackerOne

[Platform]

Participating in bug bounty programs and responsible disclosure through HackerOne platform.

$ ls -la ~/certificates

Certifications & Achievements

Professional credentials and recognition

Cybersecurity Certifications

[Professional]

Various professional certifications in penetration testing, network security, and ethical hacking. Check my LinkedIn for the full list of credentials.

Click to view →

CTF Achievements

[Competition]

Active participant in multiple Capture The Flag competitions. Regular contributor to security challenges and competitive hacking events.

Click to view →

Security Training

[Training]

Completed advanced training programs in web application security, network penetration testing, and vulnerability assessment methodologies.

Academic Excellence

[Education]

Outstanding performance in cybersecurity coursework at ESTIN and Université Côte d'Azur, with focus on practical security applications.

$ cat ~/.bugbounty_stats

Bug Bounty Stats

Security research and responsible disclosure

10+

Vulnerabilities Found

Security issues discovered

10+

Bug Bounty Programs

Active programs

$5K+

Total Bounties

Earned rewards

10+

Companies Secured

Organizations helped

$ ls -la ~/writeups

Security Write-ups

Technical deep-dives and security research

Web Security

SQL Injection in Node.js Express App

Deep dive into discovering and exploiting SQL injection vulnerabilities in Express.js applications. Includes payloads and mitigation strategies.

January 15, 2024
CTF

CTF Write-up: HackTheBox Challenge

Complete walkthrough of a HackTheBox machine, covering enumeration, privilege escalation, and root access techniques.

February 20, 2024
Tools

Bash Scripting for Pentesting Automation

Building efficient bash scripts for automating common pentesting tasks. Includes examples and best practices.

March 10, 2024

$ Terminal

Interactive shell with my fav Linux commands

root@sh0z3n:~/portfolio[bash]

Type help to see available commands

Try: whoami or curl https://api.github.com/users/sh0z3n

$
Commands: 24History: 0
Type 'help' for commands • ↑ for history • Enter to execute
$ nc -lvp 1337

Contact Shell

Let's connect and discuss security

$

nc -lvp 1337

Ready to collaborate? Let's discuss your security needs, schedule a consultation, or explore bug bounty opportunities.

Professional consulting • Bug bounty • CTF partnerships
$

social_links.sh

Let's connect and build something cool together