0%
PORTFOLIO v2.0 // SECURITY ENGINEER

HAMID
ALI

Cybersecurity · CSE · Ethical Hacking

Computer Systems Engineering student specializing in penetration testing, bug bounty research, and network security. Building the future while breaking what's broken.

90° 180° 270°
0
Labs
0
Vulns
0
Projects
terminal — hamid@kali
$ whoami
hamid-ali // CSE + CyberSec
01

About

I'm a Computer Systems Engineering student with deep focus on cybersecurity, ethical hacking, and network defense. My approach bridges low-level systems knowledge with real-world offensive security techniques.

I actively hunt bugs, build labs, and contribute to security research. I believe in learning by breaking things responsibly — understanding how attacks work to build better defenses.

Currently pursuing CCNA certification and expanding expertise into cloud security and IIoT threat modeling. Goal: land a red team / security engineer role at a global tech company.

Web Pentesting82%
Bug Bounty75%
Networking / CCNA70%
Linux & Scripting68%
Frontend Dev80%
Cloud Security55%
02

Core Skills

Cybersecurity & Pentesting
OWASP Top 10Recon & Enum Web App TestingAuth Flaws Info DisclosureAPI Security Misconfigurations
🐛
Bug Bounty & Vuln Analysis
SQLiXSSIDOR CSRFLFI/RFICmd Injection Auth BypassBusiness Logic Subdomain TakeoverFile Upload ClickjackingOpen Redirect
🌐
Networking & CCNA
TCP/IP & OSIRouting & Switching VLANsSubnetting FirewallsCisco Packet Tracer
🖥
Linux & Cloud
Linux FS & PermsUser Management Bash ScriptingCloud Security Server DeploymentIIoT Security
03

Arsenal

01 // Reconnaissance
OSINT & Recon
Amass
Subfinder
Assetfinder
Google Dorking
Shodan
02 // Scanning
Scan & Fuzz
Nmap
Nuclei
FFUF
Dirsearch
Nikto
03 // Exploitation
Offensive Tools
Burp Suite
SQLmap
Custom Payloads
Metasploit (basics)
04 // Reporting
Documentation
PoC Write-ups
Impact Analysis
HackerOne Format
CVSS Scoring
04

Projects

Security Research
AI-Driven IIoT Security Survey
Comprehensive research paper analyzing AI-based security frameworks for Industrial Internet of Things environments. Covers threat detection models and defense architectures.
IIoTAI/ML Threat DetectionResearch
View on GitHub
Startup MVP
CampusKonnect — Student Marketplace
University buy/sell platform built from scratch. Collected 15+ listings in pilot phase, generated real revenue, and validated a scalable campus startup concept.
Google SitesForms SheetsMVP
View on GitHub
Embedded Systems
Automatic Light Control System
Arduino-based embedded project using PIR motion sensors and LDR light detection for energy-efficient automation in smart environments.
ArduinoPIR Sensor LDREmbedded C
View on GitHub
Hands-on Labs
TryHackMe — 120+ Labs
Extensive hands-on practice across web exploitation, privilege escalation, network attacks, Linux hardening, and CTF challenges on TryHackMe platform.
CTFLinux Web AttacksPrivEsc
View TryHackMe Profile
05

Research

📄 SURVEY PAPER
AI-Driven Security Frameworks for Industrial IoT Networks
A semester-long research project investigating how artificial intelligence can be leveraged to detect, prevent, and respond to cyber threats in Industrial IoT environments. Includes comprehensive literature review and framework comparison.
Industrial Internet of Things threat landscape
AI/ML-based anomaly detection models
Comparative analysis of security frameworks
Responsible disclosure methodology
PDF available on GitHub repository
TYPE Survey / Research
DOMAIN IIoT Security
STATUS Published
View Paper
06

Certifications

🛡
Cisco Ethical Hacker
Cisco Networking Academy
EARNED
🌐
CCNA (In Progress)
Cisco
IN PROGRESS
💻
TryHackMe Top Labs
TryHackMe Platform
120+ LABS
🔬
Bug Bounty Research
Self-directed / HackerOne Style
20+ VULNS
07

Contact

// LinkedIn
// GitHub
// TryHackMe
Open to internships, research collaborations, and bug bounty discussions.