SCANNING BIOMETRICS...
COUNTER-THREAT OPERATIONS
IDENTITY VERIFIED β€” ACCESS GRANTED
THREAT LEVEL: MAXIMUM

YASSINE LASRAOUI

RED TEAM OPERATOR // COUNTER-THREAT SPECIALIST
root@redx:~$ β–ˆ
0WEAPONS BUILT
0MODULES CLEARED
0INTEL REPORTS

OPERATOR PROFILE

"Security isn't about perfection β€” it's about staying one step ahead, because every system can be broken given enough time."

Red team operator and cybersecurity specialist with hands-on experience in penetration testing, cybercrime analysis, counter-terrorism intelligence, and adversarial threat simulation. I build real weapons, break real systems, and then build the defenses to stop them.

Focused on the intersection of cybercrime investigation and counter-terrorism operations β€” understanding how threat actors operate to disrupt, investigate, and neutralize threats before they materialize.

Founder of the REDX cybersecurity initiative β€” building next-generation offensive security solutions.

REDX
REDX-000
operator_profile.sh
β”Œβ”€β”€(redxγ‰Ώkali)-[~/ops]
└─$ cat /etc/redx/operator.conf

  Name:     Yassine Lasraoui
  Callsign: REDX-000
  Role:     Red Team Lead
  Sector:   Cybercrime / Counter-terrorism
  Stack:    Python β”‚ Bash β”‚ SQL
  Focus:    OffSec β”‚ OSINT β”‚ Forensics
  Status:   ACTIVE πŸ”΄

TACTICAL ARSENAL

OFFENSIVE OPS

  • Penetration Testing
  • Web Application Exploitation
  • Network Attack & Lateral Movement
  • Social Engineering & Phishing
  • Payload Development
  • Red Team Engagement

INTELLIGENCE

  • OSINT & Digital Reconnaissance
  • Threat Actor Profiling
  • Dark Web Monitoring
  • MITRE ATT&CK Framework
  • Cybercrime Investigation
  • Counter-Terrorism Analysis

FORENSICS & DEFENSE

  • Digital Forensics & Evidence
  • Incident Response
  • Malware Analysis
  • Log Analysis & SIEM
  • Vulnerability Assessment
  • Security Architecture

TOOLING

  • Python (Primary)
  • Bash / Shell Scripting
  • SQL & Database Exploitation
  • Kali Linux & Custom Distros
  • Custom Tool Development
  • Automation & CI/CD

WEAPONS LAB

Custom-built offensive & defensive tools β€” open source. Click to deploy.

CRITICAL
πŸ•·οΈ

VulnScan

Web vulnerability scanner. XSS, SQL Injection, LFI, security headers, SSL misconfigurations. Auto form crawling, zero dependencies.

XSSSQLiLFIHeaders
DEPLOY
HIGH
🎣

RedPhish

Advanced phishing URL & email analyzer. Homoglyphs, brand impersonation, entropy scoring, SPF/DKIM/DMARC validation.

PhishingEmailDMARC
DEPLOY
HIGH
πŸ™

HashKraken

Multi-algorithm hash cracker. MD5, SHA-1/256/512, NTLM. Dictionary + brute force with mutation rules engine.

CrackingMD5NTLM
DEPLOY
MEDIUM
πŸ”

SubHunter

Async subdomain enumerator. Multi-threaded DNS bruteforce, crt.sh passive recon, CNAME takeover detection.

ReconDNSBug Bounty
DEPLOY
MEDIUM
πŸ‘»

NetSpectre

Raw socket packet sniffer. Real-time capture, protocol parsing, TCP flag analysis, live color output, JSON export.

PacketsSocketsNetwork
DEPLOY
STEALTH
πŸ”

CryptoStego

Steganography toolkit. LSB encoding, XOR encryption, stego analysis, capacity calculator. Hide anything.

StegoCryptoCovert
DEPLOY
πŸ”΄ FLAGSHIP OPERATION

REDX β€” Cybersecurity Platform

Founder and red team lead. Integrated platform for offensive security, threat simulation, automated recon, and security research. Multi-developer project β€” active development as dissertation.

PlatformOffensive SecurityThreat SimulationLeadership

TRAINING & OPERATIONS

ACTIVE

BSc Cybersecurity (Honours)

Solent University β€” Southampton, UK  |  2023 – Present

KILL CHAIN β€” MODULE PROGRESSION

Click any module to reveal learning outcomes and operational impact

Y1 RECONNAISSANCE β€” Foundations

01Problem Solving Through Programming

Developed logical thinking, algorithmic reasoning, and structured problem-solving using Python. Built foundational automation skills for security scripting, exploit development, and tool creation.

02Introduction to Networks & Security

Built foundational understanding of TCP/IP, OSI model, network protocols, and core security principles. Essential for understanding attack vectors and packet-level threats.

03Network Applications

Understood how OS and network services enable communication. Explored DNS, DHCP, HTTP, FTP β€” services frequently targeted in real-world pentests and exploitation.

04Databases

Designed relational databases, wrote complex SQL queries, and analysed data integrity. Critical foundation for SQL injection attacks, data exfiltration, and database forensics.

05Routing & Switching

Configured enterprise routing/switching infrastructure. Hands-on with VLANs, ACLs, routing protocols β€” knowledge exploited in network pivoting and lateral movement.

06Security Essentials

Cybersecurity fundamentals: CIA triad, risk management, access control, and defensive strategies. Built baseline knowledge for offensive and defensive operations.

Y2 WEAPONIZATION β€” Offensive & Defensive

07Ethical Hacking & Penetration Testing

Full penetration testing engagements: recon, vulnerability discovery, exploitation, privilege escalation, and professional reporting. Used Metasploit, Burp Suite, Nmap, and custom scripts.

08Threat Intelligence Analysis

Analysed real-world threat actors, APTs, and cybercriminal operations using MITRE ATT&CK, Diamond Model, and intelligence lifecycle frameworks. Produced actionable intelligence reports.

09Network Systems Automation

Automated network configuration, monitoring, and management using scripting. Built automated security scanning pipelines and infrastructure-as-code deployments.

10Network Implementation

Designed and tested secure network architectures. Implemented firewall rules, segmentation strategies, and secure communication channels aligned with business needs.

11Research Methods Project

Academic research capabilities: literature review, critical analysis, methodology design, and professional report writing β€” essential for intelligence documentation and consulting.

Y3 EXPLOITATION β€” Advanced Operations

12CyberOps (Cisco)

SOC analyst operations: detected, analysed, and responded to threats using SIEM tools, packet analysis, and incident response procedures. Cisco CyberOps Associate certified.

13Cybercrime & Digital Forensics

Cybercrime investigation: evidence acquisition, disk imaging, file system analysis, timeline reconstruction, chain of custody. Key for law enforcement and counter-terrorism career paths.

14Cloud Computing & Virtualization

Cloud security: AWS/Azure architectures, container security, IAM exploitation, misconfiguration risks, and cloud-native security controls assessment.

15Internet of Things (IoT)

IoT attack surfaces, firmware vulnerabilities, protocol weaknesses, and physical security bypass. Critical for smart infrastructure and counter-terrorism scenarios.

16Dissertation β€” REDX Platform

Designed and co-developed the REDX platform β€” integrated offensive security for attack simulation, automated recon, vulnerability management, and threat reporting.

17Industrial Consulting Project

Real-world consulting for an external organisation. Risk assessments, security audits, and professional recommendations β€” replicating cybersecurity consulting in the field.

CLEARANCE & CERTIFICATIONS

Cisco CyberOps Associate

CLEARED

Ethical Hacking & Pen Testing

CLEARED

TryHackMe β€” Red Team Path

IN PROGRESS

Hack The Box Labs

ACTIVE

CLASSIFIED INTEL

Click to expand β€” PDF reports linked when available

CONFIDENTIAL
Penetration Testing Report β€” Web Application Assessment

Full-scope penetration testing: external/internal recon, automated & manual vulnerability discovery, exploitation, CVSS scoring, and remediation aligned with OWASP.

ReconExploitationCVSSOWASP
VIEW REPORT (PDF)Report available after assessment completion
SECRET
Threat Intelligence β€” Real-World Threat Actors & APTs

Threat actor profiling, TTPs, attack infrastructure, state-sponsored operations analysis. Using MITRE ATT&CK, Diamond Model, and Kill Chain frameworks.

APTMITRE ATT&CKCounter-Intelligence
VIEW REPORT (PDF)Report available after assessment completion
CONFIDENTIAL
Digital Forensics β€” Cybercrime Case Study

Evidence acquisition, disk imaging, file system analysis, timeline reconstruction, chain of custody. Adversarial and law enforcement perspectives β€” applicable to counter-terrorism evidence handling.

EvidenceForensicsChain of Custody
VIEW REPORT (PDF)Report available after assessment completion
RESTRICTED
Industrial Consulting β€” Security Assessment

Real-world consulting: risk analysis, vulnerability assessment, security architecture review, and prioritised remediation roadmap for external organisation.

RiskArchitectureConsulting
VIEW REPORT (PDF)Report available after assessment completion

COMMS CAPABILITY

πŸ‡²πŸ‡¦

Arabic

NATIVE
πŸ‡¬πŸ‡§

English

FLUENT
πŸ‡«πŸ‡·

French

ADVANCED

ESTABLISH COMMS

Secure channels for professional inquiries, consulting, and opportunities.

ENCRYPTED MAIL

yassineax10@gmail.com

DIRECT LINE

+44 744 292 8375

LINKEDIN

Connect

GITHUB

redX000