booting securinets shell...
About Skills Projects Writeups CTF Contact
RE
Securinets ISSAT Mateur /// Available for opportunities

Khalil Jaouani.

Reverse Engineering Enthusiast.
Breaking binaries, dissecting protocols,
and digging deep into how systems really work.

Scroll
01 —

About

I'm Khalil — a curious mind with a deep interest in reverse engineering, low-level systems, and understanding software from the inside out. I spend most of my time analyzing binaries, dissecting protocols, and digging into how things work beneath the surface.

Malware Analysis Binary Exploitation CTF Challenges Systems Security Reverse Engineering Protocol Analysis Low-Level Systems
Securinets ISSAT Mateur
Securinets ISSAT Mateur Cybersecurity Club Member
0Years Learning
0CTFs Played
0Tools Mastered
0% Committed
LocationMateur, Tunisia 🇹🇳
EducationISSAT Mateur
ClubSecurinets ISSAT Mateur
Emailkhalil.jaouani@issatm.ucar.tn
Status● Open to Opportunities
02 —

Skills

01

Languages

C / C++ Python x86/x64 Assembly
02

RE & Security Tools

IDA Pro Ghidra GDB / pwndbg Wireshark Radare2
03

General

Linux Git Docker
03 —

Projects

  Loading from GitHub...
04 —

Writeups

No writeups yet

Writeups will appear here after CTF competitions.

Coming soon...

View GitHub
05 —

CTF

01

Reverse Engineering

Specialized in RE challenges — dissecting binaries, crackmes, and malware samples using IDA Pro, Ghidra & Radare2.

02

Binary Exploitation

Buffer overflows, ROP chains, heap exploitation — going deep into pwn challenges with GDB and pwndbg.

03

Forensics & Analysis

Memory dumps, packet captures, disk forensics — piecing together the puzzle from artifacts and network traffic.

// GitHub Stats
GitHub Streak
06 —

Contact

Let's build something together.

Open to collaborations, CTF teams, security research, and interesting projects. Don't hesitate to reach out.