root@myasser:~$ whoami
Mohamed (M. Yasser)
root@myasser:~$ cat info.txt
Hello! I am Mohamed Yasser, a Junior Penetration Tester and Red Team Trainee at IT Gate.
I specialize in Web & Network Exploitation, Active Directory Security, and Python Automation. Holding an active penetration testing permit and a strong foundation in CCNA, I actively hunt for vulnerabilities and build secure network environments.
My methodology combines practical lab experience (building AD and Cisco networks) with offensive security techniques.
root@myasser:~$ ./status.sh
[+] Ready for new challenges.
[+] Currently seeking Jr. Pentester roles.
A lightweight Python-based KVM-style mouse sharing tool. Controls a remote Windows PC mouse over the network using low-latency UDP sockets and Win32 APIs.
Configured a complete Enterprise Network using real Cisco devices. Implemented OSPF, HSRP for redundancy, DHCP, DNS, NAT, and ACLs for security.
Practical AD lab built to understand Windows domain fundamentals before offensive phases. Managed Domain Controller, OUs, GPOs, and file sharing permissions.
Implemented a Linux-based NAT Gateway using Kali Linux. Configured multiple interfaces, IP forwarding, and masquerading using iptables for segmented networks.
Security is a collaborative effort. I actively participate in making the internet safer through responsible disclosure and bug bounty programs.
Whether you need a security assessment, want to discuss red team strategies, or have an opportunity, feel free to drop a message. All communications are strictly confidential.