<About Me />

I'm a Computer Engineering student with a deep passion for cybersecurity and ethical hacking. My journey in tech is driven by curiosity and a desire to understand how systems work at their core.

Currently exploring the fascinating world of reverse engineering and malware analysis, I'm constantly learning new techniques to identify vulnerabilities and strengthen security measures.

I believe in using technology responsibly and contributing to a safer digital world through ethical practices and open-source contributions.

Cybersecurity

Passionate about securing systems and identifying vulnerabilities

Ethical Hacking

Penetration testing and security assessments

Reverse Engineering

Learning to analyze and understand software at a deep level

Malware Analysis

Studying malicious software behavior and patterns

<Skills />

Cybersecurity

Penetration Testing

Web & network security assessments

75%

Ethical Hacking

CTF competitions & vulnerability research

70%

Reverse Engineering

Binary analysis & malware dissection

60%

Malware Analysis

Static & dynamic analysis techniques

65%

Cryptography

Encryption protocols & implementation

55%

Network Security

Firewall config & traffic analysis

70%

Programming & Tools

Python

Scripting, automation & security tools

85%

C/C++

Low-level programming & exploits

70%

Linux/Bash

System administration & scripting

80%

Git & GitHub

Version control & collaboration

75%

SQL

Database management & injection testing

65%

Burp Suite

Web application security testing

70%

Other Skills

Web Development

React, Next.js, Tailwind CSS

75%

API Security

REST API testing & authentication

65%

Docker

Containerization & deployment

60%

OSINT

Open-source intelligence gathering

70%

<Projects />

Network Scanner

Python-based network scanning tool for identifying active hosts and open ports

PythonNetworkingSecurity

Technical Details

Advanced port scanning with multi-threading support, OS detection, and vulnerability assessment capabilities.

Password Strength Analyzer

Tool to evaluate password strength and suggest improvements

JavaScriptSecurityWeb

Technical Details

Real-time password analysis using entropy calculations, dictionary attacks simulation, and NIST guidelines compliance.

Malware Sandbox

Isolated environment for analyzing suspicious files and executables

PythonMalware AnalysisVM

Technical Details

Automated malware behavior analysis with API call monitoring, network traffic inspection, and detailed reporting.

Encryption Tool

File encryption/decryption utility using modern cryptographic algorithms

C++CryptographyCLI

Technical Details

Implements AES-256, RSA-4096, and ChaCha20 encryption with secure key management and file integrity verification.

Vulnerability Scanner

Automated tool for detecting common web vulnerabilities

PythonWeb SecurityOWASP

Technical Details

Scans for SQL injection, XSS, CSRF, and other OWASP Top 10 vulnerabilities with detailed remediation recommendations.

Reverse Engineering Lab

Collection of reverse engineering challenges and solutions

AssemblyReverse EngineeringCTF

Technical Details

Binary analysis toolkit with disassemblers, debuggers, and decompilers for x86/x64 and ARM architectures.

<Blog & Notes />

2024-03-15

Understanding Buffer Overflow Attacks

A deep dive into how buffer overflow vulnerabilities work and how to prevent them

SecurityExploits
2024-03-10

Getting Started with Reverse Engineering

Essential tools and techniques for beginners in reverse engineering

Reverse EngineeringTutorial
2024-03-05

Web Application Security Best Practices

Common vulnerabilities in web applications and how to secure them

Web SecurityOWASP
2024-02-28

Introduction to Malware Analysis

Tools and methodologies for analyzing malicious software safely

MalwareAnalysis

<Contact />

Get in Touch

Interested in collaborating on cybersecurity projects or discussing ethical hacking? Feel free to reach out!

© 2025 Mowassir Noor. Built with Next.js & Tailwind CSS