Logo

I'm a

I'm Ashad Mohamed . An enthusiast in information security and psychology. I add value to the industry by providing guidance and solution to companies and new startups in the security field.

My Technology Stack

These tools have provided invaluable real-world experience, enabling me to build software solutions, strengthen web security, troubleshoot complex networks, secure sensitive data, and automate tasks seamlessly. Each technology marks a significant step in my journey, empowering me to address diverse challenges while ensuring system security and efficiency.

TransistorReformTupleSavvyCalStatamic
TransistorReformTupleSavvyCalStatamic

Open Source Projects

Explore a diverse range of open-source projects that demonstrate proficiency in various technologies and programming languages. These projects cover a wide spectrum within the realm of software development, encompassing areas such as system-level programming, web security, network diagnostics, encryption, and automation. My engagement with these projects has provided me with invaluable insights and skills that have significantly contributed to my cybersecurity journey. From gaining a deep understanding of low-level system components to identifying and mitigating web vulnerabilities, these projects have offered me hands-on experience that is directly applicable to defending against cyber threats and effectively securing systems.

Tinker

Tinker

PythonDjango

A Windows keylogger running under a service in C/C++ using win32api.

Cloud-1

Cloud-1

DockerfileAnsibleShell

Cloud-1 is an automated deployment of web-applications on a remote server using Ansible.

Ping

Ping

C/C++Makefile

This is a custom implementation of the `ping` utility based on inetutils-2.0.

Inception of things

Inception of things

KubernetesShellVagrant

IOt is a small kubernetes clusters with CI/CD implemented using ArgoCD and GitLab.

badass

Badass

GNS3Docker

Badass is a simulation and configuration of BGP EVPN network using GNS3 with docker images.

My Talks and Articles

Here you can find all the talks and articles that I've made.

Cybersecurity Workshop

Description: Learn to write secure programs, explore C function vulnerabilities, tackle web application challenges, and gain insights into various cyber threats and cybersecurity types.

View Presentation
The power of self-respect

Description: Discover the significant power of self respect in attaining personal discipline and seizing highest power and control of your life.


View Article
SSDLC: Threat Modeling

Description: Explore cyber defense strategies, Secure Software Development Lifecycle (SSDLC), and threat modeling frameworks.


View Presentation
Cyber Security: Introduction to Cryptography

Description: The presentation offered valuable insights into why cryptography matters and how we can use and apply different algorithms in real-world scenarios. It was helpful for everyone to understand the application of cryptographic principles in technology and data protection.


View Presentation

“I think we ought to read only the kind of books that wound or stab us. If the book we are reading doesn’t wake us up with a blow to the head, what are we reading for? So that it will make us happy? Good Lord, we would be happy precisely if we had no books,and the kind of books that make us happy are the kind we could write ourselves if we had to….”

Franz Kafka
German-speaking Bohemian novelist