Hello

I'm Mahmoud Salah

About Me.

I am a highly skilled Penetration Tester and Cybersecurity Instructor, specializing in Web and Mobile Application Security. With a proven track record of identifying and mitigating critical vulnerabilities, I help organizations fortify their digital assets against sophisticated cyber threats.

My expertise lies in uncovering complex security flaws, simulating real-world attack scenarios, and delivering comprehensive security assessments that drive proactive defense strategies. Using advanced ethical hacking techniques, industry best practices, and cutting-edge tools, I ensure the security of web and mobile applications against evolving attack vectors.

Beyond technical assessments, I am deeply committed to mentorship and cybersecurity education, empowering teams and individuals to adopt a security-first mindset. My passion for offensive security, ethical hacking, and continuous learning fuels my mission to enhance digital resilience and protect businesses in an ever-changing threat landscape.

Education

  • Bachelor of Computer Science and Artificial Intelligence Faculty of Computers and Artificial Intelligence, Benha University
  • Expected Graduation: 2027
  • Key Achievements:
    • Cybersecurity Instructor at GDG, mentoring aspiring professionals in ethical hacking, penetration testing, and cybersecurity fundamentals.
    • Completed the GDSC Cyber Security BootCamp, gaining hands-on expertise in penetration testing and secure development practices.
    • Graduated from the Cyber Talents Cyber Security BootCamp, specializing in advanced vulnerability assessment and incident response.
    • Certified in CS50x by Harvard University, mastering computer science fundamentals and programming principles.
    • Earned the CCNA certification, demonstrating proficiency in networking concepts and infrastructure security.
    • Continuously advancing cybersecurity expertise through specialized certifications, technical training, and industry engagements.

Skills

  • Web & Mobile Penetration Testing
  • Expert in manual and automated security testing for web and mobile applications, identifying and exploiting critical vulnerabilities such as SQL Injection, XSS, CSRF, SSRF, RCE, and insecure authentication mechanisms.
  • Vulnerability Assessment & Exploitation
  • Skilled in evaluating security risks, performing in-depth vulnerability assessments, and executing controlled exploitations to assess real-world impact.
  • Ethical Hacking & Red Teaming
  • Specialized in simulating sophisticated adversarial attacks, including API exploitation, session hijacking, privilege escalation, and evasion techniques to test an organization’s resilience.
  • Secure Code Review
  • Proficient in analyzing web and mobile application source code to identify security flaws, focusing on preventing insecure deserialization, injection attacks, and business logic vulnerabilities.
  • Tool Proficiency
  • Experienced with industry-leading security tools, including Burp Suite Pro, OWASP ZAP, Frida, Wireshark, Nmap, Metasploit, and Kali Linux, alongside custom-developed automation tools.
  • Exploit Development
  • Developing and customizing exploits for web and mobile applications, covering command injection, insecure file uploads, and directory traversal vulnerabilities.
  • Cryptography & Secure Authentication
  • Deep understanding of encryption mechanisms, TLS security, secure token-based authentication (JWT, OAuth), and session management best practices.
  • Programming & Scripting
  • Proficient in Python, JavaScript, C++, C, PHP, and Bash for developing security tools, automation scripts, and customized payloads for penetration testing.

Certifications.

The CS50x certificate from Harvard University signifies a comprehensive understanding of computer science fundamentals, covering programming, algorithms, data structures, and software engineering principles. It demonstrates my commitment to mastering critical technical concepts, enabling me to approach complex problem-solving with a structured and efficient mindset. Verify certificate.

Achieved the Google Cybersecurity Certificate, a prestigious program designed by Google and delivered through Coursera. This certification demonstrates expertise in cybersecurity foundations, risk management, network security, threat detection, incident response, and automation with Python, equipping professionals with cutting-edge, industry-relevant skills. Verify certificate.

Red Hat System Administration I (RH124) Successfully completed the Red Hat System Administration I course from Mahara Tech, offered by the Information Technology Institute (ITI). This certification showcases proficiency in Linux system administration, including managing users, processes, services, system security, networking, and troubleshooting, with a focus on Red Hat Enterprise Linux environments. Verify certificate.

This certificate recognizes my role as a Cybersecurity Instructor at the GDG On Campus Bootcamp at Benha University, where I led intensive training sessions, empowering participants with real-world cybersecurity skills. Over five months, I conducted hands-on workshops covering:
🔹 Linux & Bash Scripting – Automating security tasks and system hardening.
🔹 Password Cracking & Cryptography – Encryption, hashing, and attack methodologies.
🔹 Network Security & Wireshark – Deep packet inspection and traffic analysis.
🔹 Web Penetration Testing – Exploiting SQLi, XSS, command injection, and authentication flaws.
🔹 Digital Forensics & Steganography – Cyber threat investigation and data analysis.

In addition to mentoring and fostering a collaborative learning environment, I co-organized a Capture The Flag (CTF) competition, enhancing participants' problem-solving skills and offensive security expertise.

This experience solidified my dedication to cybersecurity education, ethical hacking, and community-driven learning. GDG Link.

The Cyber Talent Cyber Security Bootcamp certificate reflects my in-depth training in essential cybersecurity principles, covering a range of core topics such as threats and vulnerabilities, web application security, data encryption techniques, and digital forensics. Spanning three weeks, this bootcamp equipped me with the foundational knowledge necessary to begin a career in cybersecurity. With a focus on practical applications, I gained a comprehensive understanding of security frameworks and methodologies, ensuring readiness to address contemporary cybersecurity challenges across multiple domains. Verify certificate.

The volunteering certificate from CODEAVOUR International for CODEAVOUR 5.0, the largest AI and programming event in Egypt, recognizes my role in organizing this prestigious event, supported by leading organizations such as the Motwani Jadeja Foundation, STEMpedia, Amazon AWS, ARTPARK, and others. As part of the Egyptian League for Robotics & AI and the Mechaverse League, I contributed to the successful coordination of workshops, competitions, and collaborations, showcasing cutting-edge advancements in AI and programming. This experience honed my organizational, teamwork, and leadership skills while strengthening my involvement in the global tech community. CODEAVOUR Link.

The GDSC Cybersecurity Bootcamp certificate acknowledges my completion of an extensive training program covering a broad spectrum of cybersecurity domains. Through this bootcamp, I gained valuable hands-on experience in Linux systems, networking, web penetration testing, cryptography, vulnerability assessment, and network defense. The program equipped me with the skills to identify and address a wide range of security threats, enhancing my expertise in both offensive and defensive cybersecurity practices. This certification has further solidified my foundation in the field and my commitment to continuously advancing in cybersecurity. GDG Link.