Skip to content
View Mohibullah-Barakzai's full-sized avatar

Block or report Mohibullah-Barakzai

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

👨‍💻 Mohibullah Barakzai

🔐 Penetration Tester & Security Researcher
Experienced in exploit development, reverse engineering, vulnerability research, and adversary emulation — with a focus on uncovering complex attack paths and engineering resilient enterprise defenses.

LinkedIn
Portfolio
Email


🚀 About Me

  • 🔎 Expertise: Penetration testing & security research with hands‑on experience in exploit development, reverse engineering, vulnerability research, and adversary emulation
  • 🛡️ Foundations: Strong background in networking, Linux, and cybersecurity; focused on uncovering complex attack paths and building resilient defenses
  • Technical Skills: Proficient in C++, Python, and JavaScript for exploit prototypes, automation, and web security testing
  • 🎯 Professional Growth: Actively pursuing the Offensive Security track (OSCP, OSWE, OSED)
  • 🌍 Focus Areas: Red teaming, exploit development, and adversary emulation aligned to real‑world threat models

🏆 Certifications

CompTIA Security+
CEH
Google Cybersecurity
CCNA
Kali Linux


🛠️ Tech Stack

Languages & Scripting
C++ Python JavaScript Bash PowerShell SQL

Operating Systems
Windows Linux (Kali, ParrotOS, Ubuntu) macOS

Offensive Tools
Burp Suite Nmap Wireshark Metasploit BloodHound CrackMapExec Responder Mimikatz

Defensive & SOC Tools
Velociraptor Wazuh Elastic Stack

Core Competencies
Reverse Engineering Malware Analysis Threat Intelligence Red/Blue Teaming


📂 Featured Projects

🔹 ShadowOps‑Lab v2.0.0
A reproducible red+blue security framework engineered with audit‑grade rigor, demonstrating adversarial simulation and SOC defense with reproducibility standards.

🔹 Apple Security Bounty
Discovered and responsibly disclosed a critical macOS ImageIO framework vulnerability as part of Apple’s Security Bounty program, delivering reproducible proof‑of‑concept and validated remediation.

🔹 Active Directory Attack & Defense Lab 🚧
Currently under development — a custom AD lab simulating enterprise environments, covering enumeration, credential abuse, privilege escalation, and Sigma‑style detection strategies.


🌐 Platforms & Labs

Hack The Box
TryHackMe
HackerOne
Bugcrowd
PentesterLab
CTFTime
EC-Council CTF


📊 GitHub Stats

GitHub Stats
GitHub Streak


⭐️ “Breaking systems like an adversary, defending them like a SOC analyst — with reproducible, audit‑grade workflows.”

Pinned Loading

  1. ShadowOps-Lab ShadowOps-Lab Public

    Reproducible next‑gen security framework — attack like a pentester, defend like a SOC analyst.

    Shell