Hack-notes
  • Whoami
  • MalDev
    • Reflective loader
  • Academy HackTheBox
    • Attacking Common Applications
      • Attacking Common Applications - Skills Assessment I
      • Attacking Common Applications - Skills Assessment II
      • Attacking Common Applications - Skills Assessment III
    • Attacking Common Services
      • Attacking Common Services - Easy
      • Attacking Common Services - Medium
      • Attacking Common Services - Hard
    • AD Enumeration & Attacks - Skills Assessment Part I
    • AD Enumeration & Attacks - Skills Assessment Part II
  • HackTheBox-writeups
    • Machines
      • Windows
        • Jab
      • Linux
        • ICLEAN
  • CheatSheet
    • AD
      • linux
      • Windows
      • Bloodhound cypher query
      • Powerview
    • Privilege Escalation
      • Linux
      • Windows
    • Payloads (Reverse shell)
    • Post-Exploitation
      • Windows
    • CLM and Applocker Bypass
  • Your Path to the OSCP+
  • Pwning OSEP with `secrets.txt` on my first attempt
Powered by GitBook
On this page
  • Social Profiles
  • Certifications
  • Contact Me
  • Support me

Was this helpful?

Whoami

NextMalDev

Last updated 21 days ago

Was this helpful?

I'm Jamai Badr Eddine. I graduated in October 2023 with a Master's degree in Information Systems Security (ISS) from the National School of Applied Sciences (ENSA) in Kenitra. I began my professional career the same month, working as Pentester and Red Teamer.

Social Profiles

  • LinkedIn:

Certifications

  • Offensive Security Certified Professional ()

  • Certified Red Team Expert ()

  • Offensive Security Experienced Penetration Tester ()

Contact Me

  • email: badreddine.jamai@uit.ac.ma

Support me

badr-eddine-jamai-704870177
OSCP
CRTE
OSEP
Buy me a coffee