Cybersecurity Professional | Offensive Security Specialist | Ethical Hacker
I began my journey as a programmer and evolved into a cybersecurity professional with a deep focus on offensive security. I specialize in secure development, real-world exploitation, and adversary emulation — targeting web apps, networks, wireless systems, Active Directory environments, embedded devices, and beyond.
I operate with a hacker mindset: stealthy, precise, and always adapting. Whether I'm developing custom tooling, bypassing defenses, or performing deep recon, I approach every challenge with discipline, creativity, and purpose.
Professional Philosophy
I believe in mastering the craft through hands-on experience, continuous learning, and ethical responsibility. My mission is to uncover weaknesses before attackers do and help secure the systems that power the digital world.
- Offensive Security: Real-world exploitation of Linux/Windows systems, web apps, internal networks, Wi-Fi, Active Directory, and embedded systems.
- Secure Programming: Writing resilient and hardened code with a strong focus on attack surface reduction.
- Penetration Testing: Full-scope assessments with emphasis on stealth, post-exploitation, and lateral movement.
- Bug Bounty Hunting: Identifying zero-days, logic flaws, and impactful vulnerabilities on live targets.
- Red Team Operations: Simulating advanced adversaries using C2 frameworks, obfuscation, and evasion.
- Tool Development: Building lightweight offensive tools for recon, fuzzing, exploitation, and automation.
- 🚀 loic – Fast, multi-threaded DDoS simulation tool for educational use. Supports proxies, custom headers, and response logging. Built for safe stress testing and research.
- 🌐 dnsinfo – DNS enumeration and analysis script to identify exposed DNS records, helping map an organization's external footprint and vulnerabilities.
- 🐚 (More coming soon...)
Think you understand hacking? Then try to decode the shadows I leave behind. This isn’t about certs or trophies. It’s about mastery through silence, logic, and will.
# Challenge: decrypt the essence behind mastery
from hashlib import sha256 as h
from itertools import product as p
f = lambda s, r: [h((b+k).encode()).digest() for _ in range(r) for b,k in [s]][-1].hex()
c = lambda: [f(x,7) for x in p(['AD','WiFi','Embedded','Web','Net'],['recon','pivot','exploit','evade','persist'])]
s = [x for x in c() if x.startswith('00')]
print("Skill encoded in shadows. Decode if you dare." if len(s) > 3 else "Keep digging, no shortcuts here.")
💡 Check the patterns if you're serious. The truth isn't printed — it's encrypted.
> 🧠 The real patterns aren’t in the code — they’re on the wire.
> 💡 Trace the signals across my website.
> If you find what matters, you’ll know where to follow.
“Hack like a ghost, move like a shadow — no logs, no traces, just impact.”
“Tools don’t make a hacker. Mindset does.”
“I don’t chase certs. I chase systems, knowledge, and real control.”
“True hackers know their power — and use it ethically.”
“No matter how deep I go, I stay grounded in responsibility, legality, and respect.”
- Advanced Active Directory Red Teaming & RBCD abuse
- Covert C2 frameworks & custom payload delivery
- Deep kernel-level Linux hardening
- Stealthy Wi-Fi post-exploitation automation
- 📫 Email: elimane.juuf@gmail.com
- 🌐 Website: https://jusot99.github.io
Discord: Elimane Juuf
- 💼 Upwork (soon): In the works — stay tuned