Skip to content
View x0ph3nt's full-sized avatar
🎯
Try Harder
🎯
Try Harder

Block or report x0ph3nt

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
x0ph3nt/README.md

Abdulaziz Alsalahi

aka x0ph3nt

Offensive Security Enthusiast | Active Directory Learner


🧠 About Me

> whoami
Abdulaziz Alsalahi (x0ph3nt)

> focus
Offensive Security & Active Directory Exploitation

> mindset
Always improving. Always learning. No limits.

I use this space to showcase what I build, what I learn, and what I break.

Currently preparing for advanced certifications such as OSCP and continuously leveling up my skills in real-world attack techniques.


⚔️ Technical Arsenal

🐧 Linux

  • Comfortable with enumeration, privilege escalation, and system navigation
  • Strong terminal workflow

🌐 Web Exploitation

  • XSS
  • Basic SQLi
  • IDOR
  • Recon & fuzzing

🧠 Scripting

  • Bash (fundamentals)
  • Python (actively deepening knowledge)

🛠 Tools I Work With

nmap
burpsuite
ffuf
impacket

📜 Certifications

  • 🏆 CAPT — Hackviser
  • 🛡 CRTA — Active Directory Red Team
  • 🎯 Preparing for eJPT
  • 🚀 Targeting OSCP and beyond

🔥 Platforms

  • 🧩 TryHackMe — Top 6% (Returning soon for Top 1%)
  • 🧠 Continuous lab practice & AD attack simulations

🌐 Website & Writeups


📊 GitHub Stats


⚡ Philosophy

while(true){
  learn();
  practice();
  break_things();
  improve();
}

“Stay dangerous. Stay curious.”

Popular repositories Loading

  1. x0ph3nt.github.io x0ph3nt.github.io Public

    Personal site documenting my cybersecurity journey, tools, and hands-on experiments.

    JavaScript

  2. x0ph3nt x0ph3nt Public

    Personal site documenting my cybersecurity journey, tools, and hands-on experiments.

  3. Walkthroughs Walkthroughs Public

    My TryHackMe writeups, notes, and learning journey in cybersecurity & penetration testing