Security-Driven IT Specialist · 5+ Years · 100+ Labs Completed
Comprehensive IT & cybersecurity solutions — from threat detection to blockchain advisory and payment assistance.
Tailored security solutions protecting your entire digital attack surface.
Simulate real-world attacks on web apps, networks, and Active Directory to find vulnerabilities first.
Rapid investigation and recovery from breaches — PCAP analysis, malware extraction, root-cause identification.
Proactive device protection for laptops, desktops, mobile, and IoT — 99%+ uptime guaranteed.
Harden your AWS, Azure, or GCP environment with IAM audits, misconfiguration scanning, and Zero Trust design.
Transform your team into a human firewall — phishing simulations, workshops, and security culture programs.
Reliable day-to-day technical support for individuals and small businesses — hardware, software, and everything in between.
Securing your crypto assets and guiding smart investment decisions — wallets, audits, and literacy workshops.
Bridging global payment gaps — especially for underserved regions with currency or geo-restriction challenges.
Real-world engagements and lab-proven scenarios from 100+ hands-on cybersecurity operations.
Full post-incident forensic investigation: PCAP analysis, backdoor identification, hash cracking, and lateral movement reconstruction — ending in documented, clean recovery.
Identified scripted backdoor and attacker-controlled listener via PCAP. Extracted salted hash; cracked local account password with Hashcat. Traced entry point to a vulnerable web service and fully documented attacker persistence cleanup.
Threat-intel-driven red team campaign with strict OPSEC — C2 administration, stealthy persistence, and lateral movement across a distributed enterprise network simulation.
Configured secure C2 listener (Metasploit/Armitage), managed multi-agent network. Used PowerView & Bloodhound for AD path mapping. Implemented traffic obfuscation below EDR/AV detection threshold — zero alerts triggered throughout engagement.
Deep-dive web and network security assessment — SQL Injection, file upload bypass, and misconfigured Jenkins exploitation — demonstrating full chain from initial access to root.
Used SQLMap for login bypass via Python exploits. Established reverse SSH tunnels exposing internal services. Achieved root via Metasploit. Recommended multi-layered file validation (MIME, Magic Number, Extension) to prevent future upload bypasses.
Full AD assessment targeting path-to-Domain-Admin via Kerberos exploitation, AS-REP Roasting, token impersonation, and weak service permission abuse in a simulated enterprise network.
Used Kerbrute + enum4linux for enumeration; GetNPUsers for AS-REP Roasting; cracked hashes via Hashcat. Exploited unquoted service paths; used Incognito for token impersonation. Delivered Least Privilege transition roadmap and service account restriction policy.
Verified credentials from globally recognized platforms — 100+ hands-on labs.
Battle-tested tools across 100+ real-world and lab engagements — offensive, defensive, cloud, and beyond.
What clients commonly want to know before we work together.
30 minutes. No pressure. Let's map your security posture and find exactly where I can add the most value.
✓ Request received — Taofic will reach out within 24 hours.
✓ Message sent — Taofic will reply within 24 hours.