Offensive Security Specialist.
Red Team Lead.

|

500+Vulnerabilities Identified
100%Evasion Rate
0False Positives
$50M+Risk Mitigated
Hasan Alboraee
The Operator

Hasan Alboraee.

I am a dedicated Cyber Security Specialist based in Sana'a, Yemen, with a razor-sharp focus on Red Teaming and Offensive Security. My career is defined by a pursuit of understanding the adversary—not just their tools, but their mindset.

Currently serving as the Red Team Lead at DeepSafer, I architect and execute sophisticated adversary simulation programs. My role is to mentor operators and align offensive strategies with organizational risk models. Previously, as an Offensive Tools Developer, I built custom exploitation frameworks.

Beyond operations, I believe in knowledge transfer. As a former Lecturer at Al-Razi University, I taught the next generation the fundamentals of ethical hacking and network security.

View Resume
Methodology

Operator Mindset.

Offense Informs Defense

My background in both detection engineering and red teaming allows me to simulate attacks that are realistic and impactful, directly improving Blue Team capabilities.

Tool Development

Reliance on public tools is a liability. I specialize in developing custom malware and loaders in Go, C, and Nim to bypass EDR and static analysis.

Cloud-Native Attack

As a Multi-Cloud Red Team Analyst (MCRTA), I extend the kill chain into AWS and Azure, exploiting misconfigurations and identity providers.

Continuous Evolution

Security is a moving target. I maintain an active research posture, constantly updating my tradecraft with the latest TTPs.

Services

What I Do.

Red Teaming

Full-spectrum simulation of APT TTPs. Specializing in cloud red teaming (MCRTA), EDR evasion, and custom C2 infrastructure.

Malware Dev

Development of evasive payloads using Golang, C++, and Nim. Expertise in reverse engineering and neutralizing threats.

Cloud Security

Deep expertise in Azure and AWS environments. Identifying misconfigurations, IAM privilege escalation, and attack paths.

Detection Engineering

Building robust detection mechanisms, SOC log analysis, SIEM tuning, and writing YARA rules.

Web App Security

Manual and automated assessments to uncover logic flaws, injection points, and auth bypasses.

Social Engineering

Testing human resilience through spear-phishing and security assessments.

Professional History

Operational Timeline.

JAN 2025 - PRESENT

Red Team Lead

DeepSafer

Lead full-spectrum adversary simulation programs, architect red team strategies, and mentor operators.

2024

Ethical Hacking Lecturer

Al-Razi University

Instructed on cybersecurity fundamentals, ethical hacking methodologies, and penetration testing tools.

2023

Detection Engineer

DeepSafer

Developed detection mechanisms, tuned SIEM alerts, and created robust YARA rules for malware identification.

Threat Intelligence

Security Tools.

Email Breach Checker

Scan dark web dumps and leak databases to verify if your credentials have been compromised.

root@intel:~$ ./init_scan.sh
Field Notes

Intelligence & Research

View Full Archive
OCT 12, 2024EXPLOIT DEV

Bypassing EDR

An in-depth analysis of user-mode hooks and novel techniques for silent execution.

Read Brief
SEP 28, 2024OPSEC

Infrastructure Obfuscation

Leveraging serverless functions to mask C2 traffic against advanced network forensics.

Read Brief
AUG 15, 2024ADVERSARY SIM

Emulating Lazarus

Case study on replicating the operational tradecraft of North Korean state-sponsored actors.

Read Brief
Initiate Contact

Direct Comms.

For sensitive inquiries or collaboration.

PGP Key Available Upon Request