Ahmed M. Arafat
Offensive Security Engineer
Got into security because it's genuinely interesting — still feels that way. Been doing real-world offensive security work for a few years now across web, APIs, mobile, and Active Directory environments. I care more about understanding why something breaks than just reporting that it does.
Currently working as:
- Offensive Security Engineer at deepstrike.io
- Ex-Penetration Tester at bugswagger.com
My day-to-day involves a mix of application pentests, infrastructure assessments, and red team ops — mostly the kind of work where automated tools get you 20% of the way and the rest is manual digging.
What I spend most of my time on: business logic flaws, auth bypasses, AD attack paths, and mobile runtime analysis. The stuff that requires actually understanding the target rather than running a scanner and calling it a day.
Still a CS student on top of all that, because why not make life harder.
Contact:
- Email: [email protected]
- Twitter / X: @imXhandle
Tox: 3B03E2ACBDAD78439464F9EF8243B12CB0AB61E28100474CE3B99A3846264D2B10F313EB2434
Signal: z1x.1337