OPERATOR PROFILE
"Security isn't about perfection β it's about staying one step ahead, because every system can be broken given enough time."
Red team operator and cybersecurity specialist with hands-on experience in penetration testing, cybercrime analysis, counter-terrorism intelligence, and adversarial threat simulation. I build real weapons, break real systems, and then build the defenses to stop them.
Focused on the intersection of cybercrime investigation and counter-terrorism operations β understanding how threat actors operate to disrupt, investigate, and neutralize threats before they materialize.
Founder of the REDX cybersecurity initiative β building next-generation offensive security solutions.
βββ(redxγΏkali)-[~/ops] ββ$ cat /etc/redx/operator.conf Name: Yassine Lasraoui Callsign: REDX-000 Role: Red Team Lead Sector: Cybercrime / Counter-terrorism Stack: Python β Bash β SQL Focus: OffSec β OSINT β Forensics Status: ACTIVE π΄
TACTICAL ARSENAL
OFFENSIVE OPS
- Penetration Testing
- Web Application Exploitation
- Network Attack & Lateral Movement
- Social Engineering & Phishing
- Payload Development
- Red Team Engagement
INTELLIGENCE
- OSINT & Digital Reconnaissance
- Threat Actor Profiling
- Dark Web Monitoring
- MITRE ATT&CK Framework
- Cybercrime Investigation
- Counter-Terrorism Analysis
FORENSICS & DEFENSE
- Digital Forensics & Evidence
- Incident Response
- Malware Analysis
- Log Analysis & SIEM
- Vulnerability Assessment
- Security Architecture
TOOLING
- Python (Primary)
- Bash / Shell Scripting
- SQL & Database Exploitation
- Kali Linux & Custom Distros
- Custom Tool Development
- Automation & CI/CD
WEAPONS LAB
Custom-built offensive & defensive tools β open source. Click to deploy.
VulnScan
Web vulnerability scanner. XSS, SQL Injection, LFI, security headers, SSL misconfigurations. Auto form crawling, zero dependencies.
DEPLOYRedPhish
Advanced phishing URL & email analyzer. Homoglyphs, brand impersonation, entropy scoring, SPF/DKIM/DMARC validation.
DEPLOYHashKraken
Multi-algorithm hash cracker. MD5, SHA-1/256/512, NTLM. Dictionary + brute force with mutation rules engine.
DEPLOYSubHunter
Async subdomain enumerator. Multi-threaded DNS bruteforce, crt.sh passive recon, CNAME takeover detection.
DEPLOYNetSpectre
Raw socket packet sniffer. Real-time capture, protocol parsing, TCP flag analysis, live color output, JSON export.
DEPLOYCryptoStego
Steganography toolkit. LSB encoding, XOR encryption, stego analysis, capacity calculator. Hide anything.
DEPLOYREDX β Cybersecurity Platform
Founder and red team lead. Integrated platform for offensive security, threat simulation, automated recon, and security research. Multi-developer project β active development as dissertation.
TRAINING & OPERATIONS
BSc Cybersecurity (Honours)
KILL CHAIN β MODULE PROGRESSION
Click any module to reveal learning outcomes and operational impact
Y1 RECONNAISSANCE β Foundations
Developed logical thinking, algorithmic reasoning, and structured problem-solving using Python. Built foundational automation skills for security scripting, exploit development, and tool creation.
Built foundational understanding of TCP/IP, OSI model, network protocols, and core security principles. Essential for understanding attack vectors and packet-level threats.
Understood how OS and network services enable communication. Explored DNS, DHCP, HTTP, FTP β services frequently targeted in real-world pentests and exploitation.
Designed relational databases, wrote complex SQL queries, and analysed data integrity. Critical foundation for SQL injection attacks, data exfiltration, and database forensics.
Configured enterprise routing/switching infrastructure. Hands-on with VLANs, ACLs, routing protocols β knowledge exploited in network pivoting and lateral movement.
Cybersecurity fundamentals: CIA triad, risk management, access control, and defensive strategies. Built baseline knowledge for offensive and defensive operations.
Y2 WEAPONIZATION β Offensive & Defensive
Full penetration testing engagements: recon, vulnerability discovery, exploitation, privilege escalation, and professional reporting. Used Metasploit, Burp Suite, Nmap, and custom scripts.
Analysed real-world threat actors, APTs, and cybercriminal operations using MITRE ATT&CK, Diamond Model, and intelligence lifecycle frameworks. Produced actionable intelligence reports.
Automated network configuration, monitoring, and management using scripting. Built automated security scanning pipelines and infrastructure-as-code deployments.
Designed and tested secure network architectures. Implemented firewall rules, segmentation strategies, and secure communication channels aligned with business needs.
Academic research capabilities: literature review, critical analysis, methodology design, and professional report writing β essential for intelligence documentation and consulting.
Y3 EXPLOITATION β Advanced Operations
SOC analyst operations: detected, analysed, and responded to threats using SIEM tools, packet analysis, and incident response procedures. Cisco CyberOps Associate certified.
Cybercrime investigation: evidence acquisition, disk imaging, file system analysis, timeline reconstruction, chain of custody. Key for law enforcement and counter-terrorism career paths.
Cloud security: AWS/Azure architectures, container security, IAM exploitation, misconfiguration risks, and cloud-native security controls assessment.
IoT attack surfaces, firmware vulnerabilities, protocol weaknesses, and physical security bypass. Critical for smart infrastructure and counter-terrorism scenarios.
Designed and co-developed the REDX platform β integrated offensive security for attack simulation, automated recon, vulnerability management, and threat reporting.
Real-world consulting for an external organisation. Risk assessments, security audits, and professional recommendations β replicating cybersecurity consulting in the field.
CLEARANCE & CERTIFICATIONS
Cisco CyberOps Associate
CLEAREDEthical Hacking & Pen Testing
CLEAREDTryHackMe β Red Team Path
IN PROGRESSHack The Box Labs
ACTIVECLASSIFIED INTEL
Click to expand β PDF reports linked when available
Full-scope penetration testing: external/internal recon, automated & manual vulnerability discovery, exploitation, CVSS scoring, and remediation aligned with OWASP.
Threat actor profiling, TTPs, attack infrastructure, state-sponsored operations analysis. Using MITRE ATT&CK, Diamond Model, and Kill Chain frameworks.
Evidence acquisition, disk imaging, file system analysis, timeline reconstruction, chain of custody. Adversarial and law enforcement perspectives β applicable to counter-terrorism evidence handling.
Real-world consulting: risk analysis, vulnerability assessment, security architecture review, and prioritised remediation roadmap for external organisation.
COMMS CAPABILITY
Arabic
NATIVEEnglish
FLUENTFrench
ADVANCEDESTABLISH COMMS
Secure channels for professional inquiries, consulting, and opportunities.