Offensive Security Engineer β’ Web & Binary Penetration Tester
MSc Student in Electrical Engineering β Renewable Energy Systems
β’ Algerian roots
Languages: Tamazight (native) β’ Arabic (native) β’ French (fluent) β’ English (fluent) β’ Italian (basic) β’ Spanish (basic)
"Security is understanding how things break. Every bug = lesson. Every exploit = knowledge."
EE background + offensive security passion.
Breaking things ethically: web apps, binaries, low-level exploits.
Bug hunting, HTB boxes, CTFs, bug bounties.
- Langs: Python β’ JavaScript β’ Bash β’ C β’ SQL
- OffSec: Web App Pentest β’ Binary Exploitation β’ Reverse Eng β’ Exploit Dev β’ Vuln Research
- Tools: Burp Suite β’ Ghidra β’ IDA Pro β’ GDB β’ OSINT β’ Threat Hunting
- Bug Bounty β’ CTF β’ Red Teaming
Practical progression I'm targeting:
- CompTIA PenTest+ β methodology & reporting foundation
- OSCP β hands-on gold standard, real pressure hacking
- Burp Suite Certified Practitioner (BSCP) β deep web mastery with the top tool
- eWPTX (INE) β advanced chaining & modern attacks
- OSWE (OffSec) β ultimate white-box web expert (source review + elite exploits)
Portfolio: assemmerzoug.github.io/Portfolio
Active on HackTheBox, TryHackMe, bug bounty platforms
- GitHub: @ASSEMMERZOUG
- X: @ASSEMMRG
- LinkedIn: Assem Merzoug
Open to collabs: web sec, CTFs, or energy + security!
Always learning. Always breaking. π΄βοΈ