

Muneeb
Offensive Security Specialist
Overview
Social Links
About
I don’t do “checklist security.” I break things — web apps, networks, assumptions and then build the tools to break them faster next time. My specialty is offensive security with a focus on web exploitation and red team operations, where flaws like JWT misconfigurations, OAuth loopholes, and race conditions aren’t just bugs to me, they’re puzzles waiting to be solved.
I’ve trained through Cisco Cybersecurity, Nahamsec’s bug bounty course, and OSCP prep work, but the real edge comes from live-fire experience, pushing systems until they show me their weakest point. I rank in the top 1% on TryHackMe not because I memorized playbooks, but because I refuse to stop until the problem bends.
If your defenses are predictable, I’ll find the angle you didn’t consider. And if they aren’t, I’ll automate until they are.
Stack
Blog
Projects(3)
Scapy-based network scanner that provides fast host discovery and vendor identification with clean, tabular CLI output.
- 🔎 Fast ARP/ICMP host discovery and basic port checks
- 🧾 PrettyTable output for readable terminal reports
- 🏷️ MAC vendor lookup to quickly identify device manufacturers
- ⚙️ Lightweight, single-file CLI suitable for quick triage on local networks
- 🛡️ Designed for red-team recon and lab enumeration workflows
- Python
- Scapy
- PrettyTable
- Mac-Vendor-Lookup
- ARP/ICMP Discovery
- Packet Crafting
- Local Network Recon
- CLI Tooling
Experience
Freelance
- Conducting penetration tests and red-team operations on web apps, APIs, and networks.
- Identifying and reporting vulnerabilities such as authentication bypasses, misconfigurations, and privilege escalation issues.
- Developing custom tools and scripts in Python for reconnaissance, automation, and exploit PoCs.
- Providing remediation guidance and collaborating with clients on security hardening.
- Web Exploitation
- Penetration Testing
- Red Teaming
- Bug Bounty
- Python
- Burp Suite
- Nmap
- Reporting
Education
Certifications(1)
Brand


