Ahmed M. Arafat

Offensive Security Engineer


Got into security because it's genuinely interesting — still feels that way. Been doing real-world offensive security work for a few years now across web, APIs, mobile, and Active Directory environments. I care more about understanding why something breaks than just reporting that it does.

Currently working as:

My day-to-day involves a mix of application pentests, infrastructure assessments, and red team ops — mostly the kind of work where automated tools get you 20% of the way and the rest is manual digging.

What I spend most of my time on: business logic flaws, auth bypasses, AD attack paths, and mobile runtime analysis. The stuff that requires actually understanding the target rather than running a scanner and calling it a day.

Still a CS student on top of all that, because why not make life harder.

Contact:

Tox: 3B03E2ACBDAD78439464F9EF8243B12CB0AB61E28100474CE3B99A3846264D2B10F313EB2434
Signal: z1x.1337