NADER ALHARBI

I'm a Penetration Tester

About Me

Cybersecurity enthusiast with a strong interest in penetration testing, red teaming, and ethical hacking.

Skilled in identifying and exploiting vulnerabilities to strengthen systems and networks.

Continuously learning and exploring new exploitation techniques.

Strong team player with a proactive approach to learning and problem-solving.

Dedicated to contributing effectively to the cybersecurity field while advancing technical expertise.

Profile Image

Education

Bachelor degree in Cybersecurity

University of Jeddah

2021 - Present

Experience

Offensive Security Trainee - TAHAKOM

  • Part of the penetration testing team performing high-production security assessments.
  • Identified 35+ vulnerabilities, including critical findings across multiple environments.
  • Contributed to technical security reports, including risk analysis and remediation guidance.
  • Gained hands-on experience in testing using tools such as Burp Suite, Nmap, Metasploit, and other offensive security tools.

Jun - Sep 2025

Cybersecurity Content Specialist - Synapse

  • Developed cybersecurity focused content.
  • Demonstrated strong technical writing and communication skills, while consistently meeting deadlines.

    Mar 2025 - Present
  • Accomplishments

    CVE-2025-39245

    CSV Injection Vulnerability in some HikCentral Master Lite versions.
    This could allow an attacker to inject executable commands via malicious CSV data.

    Reference

    Certifications

    Professional certifications that enhanced my expertise and validated my skills in various domains.

    Certification 1

    Certified Red Team Professional (CRTP)

    Issued by Altered Security

    Key Topics and skills gained

    • Active Directory (AD) Enumeration
    • AD attacks
    • ACLs Abuse
    • AD Persistence
    • Child to parent domain escalation
    • Trust Attacks
    • Forest privilege escalation

    Certification 2

    Web Application Penetration Tester eXtreme (eWPTX)

    Issued by INE

    Key Topics and skills gained

    • Web Application Penetration Testing Methodology
    • Web Application Reconnaissance
    • Authentication Attacks
    • Advanced Injection Vulnerabilities
    • API Penetration Testing
    • Server-Side Attacks
    • Filter Evasion & WAF Bypass

    Certification 3

    Certified Professional Penetration Tester (eCPPT)

    Issued by INE

    Key Topics and skills gained

    • Client-Side Attacks
    • Web Application PT
    • Network Penetration Testing
    • Exploit Development
    • Post-Exploitation
    • Red Teaming and Active Directory Penetration Testing

    Certification 5

    Mobile Application Penetration Testing (eMAPT)

    Issued by INE

    Key Topics and skills gained

    • Android and iOS Architecture
    • Static and Dynamic Analysis
    • Developing APK Exploits
    • Reversing APKs
    • Intercepting Web Requests

    Certification 9

    Junior Penetration Tester (PT1)

    Issued by TryHackMe

    Key Topics and skills gained

    • Offensive security frameworks
    • OWASP Top 10 vulnerabilities
    • Privilege Escalation
    • Report Writing
    • Pentester Mindset

    Certification 9

    Certified Red Team Analyst (CRTA)

    Issued by CWL

    Key Topics and skills gained

    • Red Team Methodologies
    • Understanding of MITRE ATT&CK
    • Internal & External Recon
    • Perform Kerberos based attacks in fully patched Active Directory
    • Pivoting and Lateral Movement Techniques

    Certification 4

    Certified Threat Hunting Professional (eCTHP)

    Issued by INE

    Key Topics and skills gained

    • Threat hunting Methodologies
    • Threat hunting using Splunk
    • Threat hunting using ELK
    • Memory-based threat hunting

    Certification 5

    Junior Penetration Tester (eJPT)

    Issued by INE

    Key Topics and skills gained

    • Assessment Methodologies
    • Host & Network Auditing
    • Host & Network PT
    • Web Application PT

    Certification 10

    Cybernetics ProLabs

    Issued by Hack The Box

    Key Topics and skills gained

    • Web Application Attacks
    • Kerberos Abuse
    • Active Directory Enumeration
    • Active Directory Exploitation
    • Phishing
    • Privilege Escalation
    • Lateral Movement
    • Evading Endpoint Protections

    Certification 10

    RastaLabs ProLabs

    Issued by Hack The Box

    Key Topics and skills gained

    • Situational Awareness
    • Active Directory Enumeration
    • Active Directory Exploitation
    • Phishing
    • Password Cracking and Credential Theft
    • Privilege Escalation
    • Lateral Movement
    • Evading Endpoint Protections

    Certification 10

    Offshore ProLabs

    Issued by Hack The Box

    Key Topics and skills gained

    • Web Application Attacks
    • Enumeration
    • Exploiting Real-World Active Directory Flaws
    • Local Privilege Escalation
    • Lateral Movement and Crossing Trust Boundaries
    • Evading Endpoint Protections
    • Compromising all 5 Domains

    Certification 6

    Zephyr ProLabs

    Issued by Hack The Box

    Key Topics and skills gained

    • Active Directory
    • Red Teaming
    • Enumeration
    • ACLs Abuse
    • Lateral movement and crossing trust boundaries
    • Pivoting
    • SQL attacks

    Certification 6

    Dante ProLabs

    Issued by Hack The Box

    Key Topics and skills gained

    • Enumerating networks and machines
    • Exploiting numerous vulnerabilities
    • Crafting custom payloads
    • Lateral movement
    • Pivoting
    • Escalating privileges

    Courses & Bootcamps

    Continuous learning is key to staying ahead in the fast-evolving cybersecurity landscape. Here are some of the courses and bootcamps I've completed to enhance my skills.

    August 2023

    TryHackMe

    Top 1% of overall users

    TryHackMe is a Cybersecurity Learning platform where I completed 100+ rooms ranging from cybersecurity basics to Penetration testing and red teaming

    December 2023

    Cybersecurity Bootcamp

    NCA & KAUST

    An exceptional bootcamp experience where I advanced through three intensive stages, solidifying my skills and expanding my knowledge in the cybersecurity field.

    March 2024

    Threat hunting Bootcamp

    CyberHub

    A comprehensive training program covering the eCTHP curriculum. I ranked among the top students and was awarded a voucher for the eCTHP certification

    April 2024

    Web Application Penetration Testing Bootcamp

    CyberHub

    This bootcamp primarily focused on the eWPT and eWPTX certifications, significantly enhancing my skills in Web Application Penetration Testing.

    May 2024

    Web Application Penetration Tester (eWPT)

    INE

    Even though I did not take the eWPT certifications I finished the course where I learned The basics of Web Pentesting

    July 2024

    NCA & SITE

    Cybersecurity Bootcamp

    Fruitful bootcamp that explored certifications like Network+ and Security+, supported by hands-on SOC analysis and penetration testing simulations. We concluded the program with a practical exam demonstrating the skills acquired.

    August 2024

    Active Directory Penetration Testing Bootcamp

    CyberHub

    This Bootcamp focused on Active Directory penetration testing life cycle. including topics like Active Directory Foundations, Breaching Active Directory, Enumerating, Lateral Movement, Persistence.

    October 2024

    Mobile Application Penetration Testing Bootcamp

    CyberHub

    This Bootcamp initially was about the eMAPT Certificate. But, It went above and beyond the Certificate topics. Covering Advanced topics like Frida, Binary patching techniques, Bypassing certificate pinning, root and virtual machine checks, Frameworks like Flutter, Xamarin Forms, and React Native

    Projects

    Here are some of the projects I've worked on that showcase my skills and expertise. Click a project to view its demo video.

    Google Chrome Password Stealer

    Google Chrome Password Stealer

    This malware decrypts and steals passwords stored in Google Chrome, sending them to the attacker’s Command and Control (C2) server without detection from Windows Defender on Windows 10.

    Python Stealer Evasion
    Subnet Scanner

    Subnet Scanner

    This Python program identifies live hosts on a subnet, useful for penetration testers to locate active hosts.

    Python Enumeration
    Fake CAPTCHA Attack Simulation

    Fake CAPTCHA Attack Simulation

    This demo replicates how threat actors use fake CAPTCHA pages to trick victims into executing malicious code. Designed to raise awareness, it highlights the importance of verifying website authenticity to prevent falling for such social engineering attacks.

    Try Demo
    Awareness Social Engineering
    TelegramC2

    NRcTwo

    This is an IP-less Command and Control (C2) server I developed that leverages Telegram as the communication channel. The C2 framework includes multiple functionalities, such as:
    • Gathering system information from the victim machine
    • Executing commands on the victim machine
    • Taking screenshots
    • Retrieving public IP and location
    • Persistence via startup apps

    C2 Telegram Bot Python

    Connect

    If you're interested in collaborating or have any questions, don’t hesitate to reach out.