π Studying Computer Science at UIR β UniversitΓ© Internationale de Rabat (Morocco) π Specialized in Cybersecurity with a strong focus on Malware Analysis, Reverse Engineering, and Cryptography π© Active CTF player (Reverse / Crypto / Forensics) and challenge creator π Building tools, analyzing binaries, breaking ciphers, and learning every day
- Static & Dynamic Analysis (Windows & Linux)
- Tools: IDA, Ghidra, Radare2, x64dbg, objdump, strace, ltrace
- Binary formats: ELF, PE
- Techniques:
- Anti-debugging & obfuscation analysis
- Control-flow & data-flow reconstruction
- Packed binaries (UPX & custom packers)
- Decompiled logic reconstruction
- Low-level understanding: x86 / x86-64 Assembly
- Classical ciphers & custom crypto schemes
- XOR-based constructions & stream ciphers
- RSA internals, weak parameters, implementation flaws
- Hash functions & encoding layers
- Tools: PyCryptodome, SageMath, custom Python solvers
- Categories: Reverse Engineering, Cryptography, Steganography, OSINT, DFIR
- Roles:
- CTF Player (solver)
- CTF Challenge Creator & Organizer
- Experience with multi-layered challenges (rev + crypto + steg)
- Writing clean technical writeups (GitHub / LinkedIn)
- Languages: Python, C, C++, Bash
- Python for:
- Crypto solvers
- Malware tooling
- Binary analysis automation
- C/C++ for:
- Reverse engineering challenges
- Obfuscated binaries
- Low-level logic implementation
- OS: Linux (Kali, Ubuntu), Windows
- Debugging & tracing
- Git & GitHub (projects, writeups, tooling)
- Virtual machines & sandbox environments
- Docker (basic challenge deployment)
- Designed custom binaries with:
- Anti-analysis tricks
- Hidden
win()functions - VM-like interpreters
- Encrypted
.rodatasections
- Platforms: Cyber Glitchers, Nexus-Security, FlagYard
- Focus: realism & educational value
- Custom crypto designs for CTFs
- Frequency analysis & XOR-based traps
- RSA misconfiguration challenges
- Solver scripts provided with detailed writeups
- Step-by-step reverse engineering walkthroughs
- Malware analysis reports
- Crypto challenge breakdowns
- Goal: help others learn how to think, not just solve
- π― Master advanced reverse engineering & malware analysis
- 𧬠Deepen expertise in cryptographic attacks & implementations
- π© Compete in high-level international CTFs
- π Build original, high-quality CTF challenges
- π Secure global cybersecurity internships & research opportunities
- πΌ Transition into a professional malware analyst / reverse engineer
- π§ Email: mohamed-amine.eljabri@uir.ac.ma
- πΌ LinkedIn: https://www.linkedin.com/in/aminee-eljabri-b21438328/
- π© FlagYard Profile: https://flagyard.com/profile/amiineecmoi
I donβt just run binaries β I interrogate them until they confess.
β¨ Feel free to explore my repositories, read the writeups, and connect. Letβs break things β then understand them. β¨