Adham Adel Makroum: Objective
Adham Adel Makroum: Objective
Penetration Tester
Email: adhammakroum24@gmail.com Phone: +201017534662 Address:: Mansoura - Dakahlia
LinkedIn - Blog - HackTheBox - Pentesterlab
Objective
Penetration tester, specializing in Web Application, Android Application and Network penetration testing, i have
discovered many vulnerabilities to many companies on Bugcrowd & Hackerone, I have also built my own vulnerable
labs to gain in-depth knowledge of different vulnerabilities. I enjoy writing automation scripts using Python and Bash,
and I am currently working on adding source code review to my skills.
Education
BACHELORS OF Faculty of Computer and information science - Mansoura University
September 2020 — June 2023
Experience
BugBounty Hunter
- Found some bugs on Hackerone and Bugcrowd like XSS, SSRF, Crlf injection, Open Redirect, information
disclosure to secret data.
- Acknowledged by Adobe, Disney, Sonder, State of California VDP, Stryker and other private programs.
Projects
Web Application based on Deep Learning
- This is my graduation project, in this project we develop a WAF based on deep learning, which checks IP
reputation using 3rd party and detects SQL injection and XSS using Deep learning Techniques like CNN
algorithm ,detects some OWASP TOP 10 using advanced regex that we are building and integrated with
elasticsearch to monitor logs easily.
Internships
Incident Response intern at Cyber Talents jun 2021 — Aug 2021
- Gained knowledge in Assembly, basics of Reverse engineering, and Digital Forensics.
Network Security Summer Training at ITI jul 2022 — sep 2022
- Gained knowledge in Linux Administration, basics of Active Directory, and FortiGate Firewall.
Achievements
HackTheBox
- Solved multiple boxes in Network Pentesting (Linux/Windows), Web Pentesting, and Android Pentesting
categories.
- Trained on Enumeration, Exploitation, and Privilege Escalation.
- Owned 25+ systems.
PentesterLab
- Achieved badges in various categories, including HTTP, Recon, Unix, White, Blue, Essential, PCAP, and
Introduction.
- Solved over 200 exercises.
Portswigger
- Completed over 70% of labs, that covering topics such as XSS, SQLI, CSRF, ClickJacking, CORS, XXE,
SSRF, OS Command Injection, SSTI, Path Traversal, Access Control vulnerabilities, Authentication
bypasses, Business logic vulnerabilities, HTTP Host header attacks, OAuth authentication, File upload
vulnerabilities, and JWT Attacks.
Vulnerable Android application labs
- I have extensively trained on various vulnerable Android application labs to sharpen my skills in static and
dynamic analysis, as well as to identify Android vulnerabilities and enhance my skills in writing Frida
scripts.
Courses
- Offensive Security Certified Professional (OSCP)
- eLearnSecurity Junior Penetration Tester (eJPT)
- eLearnSecurity Web Application Penetration Testing (eWAPT)
- eLearnSecurity Web Application Penetration Testing eXtreme (eWAPTX)
- eLearnSecurity Mobile Application Penetration Tester (eMAP)
- Advanced Android Hands-on Exploitation, Attify
- TCM - Mobile Application Penetration Testing
- TCM - Linux Privilege Escalation for Beginners
- TCM - Windows Privilege Escalation for Beginners
- SANS SEC 401: Security Essentials - Network, Endpoint, and Cloud
- Cisco Certified Network Associate (CCNA)
Skills
- Web Application Penetration Testing
- Android Application Penetration Testing
- Network Penetration Testing
- Linux Administration
Volunteer work
Cyber Security member at CAT Reloaded
- Gained practical experience in Web and Network Pentesting through solving labs on TryHackMe and
participating in CTFs.
HR at CIS team
- Developed HR and communication skills.