About

About

👤 About Me

I’m Kareem Walid, an Egyptian offensive security engineer and passionate hacker. I dive deep into red teaming, reverse engineering malware, Active Directory abuse, and both web and mobile application pentesting. I’m addicted to CTFs, obsessed with breaking things to understand them, and always on the hunt — from threat actors and ransomware gangs on the dark web to vulnerabilities buried in lines of code.

When I’m not hacking or solving CTFs, I’m automating the boring stuff — whether it’s toolchains for pentests, custom scripts for recon, or just daily life workflows. I thrive in chaos, and I try to turn it into something useful.

Currently focusing on sharpening my skills across the offensive security spectrum — from initial access to advanced post-exploitation, including EDR evasion, privilege escalation, persistence, and red teaming tradecraft.


📚 About the Blog

This blog is where I’ll be sharing writeups for CTF challenges, vulnerable machines, real-world attack simulations, and personal research. You’ll find breakdowns of vulnerabilities, walkthroughs, maybe some PoCs, malware analysis, automation scripts, and anything else I find worth documenting.


🎯 The Goal

This space is my digital lab — a cleaner, structured version of my messy notes, where I can store everything I learn and build along the way. Whether you’re here to learn something new, solve a challenge, or just see how I approach problems, I hope you find value and maybe a little inspiration.

Stay curious, and hack everything.