Khalil Ammar

KhalilAmmar

Cybersecurity Enthusiast & 3rd Year
Network & Telecom Engineering Student at INSAT.

Scroll
00

MEET KHALIL

CTF Player

khalil.sh — zsh

01I’m an engineering student at INSAT specializing in Networks and Telecommunications, with a strong interest in cybersecurity. I enjoy exploring how systems work at a low level, especially through reverse engineering, binary analysis, and Android application reversing.

02Outside of my studies, I regularly take part in CTF competitions, work on personal projects, and occasionally create challenges of my own. These experiences have helped me develop practical skills in areas like Android security, exploitation, and debugging.

03I’m currently working on improving my skills in system and web penetration testing through hands-on labs on dedicated learning platforms. My goal is to build a solid understanding of systems and security, and to create tools and solutions that are both useful and reliable.

04In parallel, I’ve been diving deeper into the effective use of AI—focusing on prompt engineering, workflow optimization, and the integration of tools such as MCP servers—to better understand how to systematically leverage AI as a practical, reliable component within technical and security-focused workflows. I am currently exploring the intersection of AI agents and offensive security automation.

"AI is not a substitute for human intelligence — it's a tool to amplify it."

Dr. Fei-Fei Li, Stanford
Achievement
CTF Event Duo
Khalil Ammar
01

Featured Projects

Project Architectures
PROJECT: 01 / 07
Honeypot

LLM-Powered Adaptive Honeypot

CowrieFastAPIWazuhDockerPython
Project Summary

Built a deception platform as a layered pipeline: Cowrie/FastAPI collect attacker input, a policy-gated LLM generates realistic responses, and Wazuh ingests normalized telemetry. The key value was not only trapping attackers longer, but learning how to turn noisy interaction logs into structured intelligence we could act on.

Core Features
Implemented Feature
Dynamic LLM-driven SSH and HTTP interaction modules
Implemented Feature
Policy-guided output sanitization and model gating
Implemented Feature
Centralized event normalization and Wazuh SIEM integration
Implemented Feature
Automated IoC extraction from adversarial sessions
02

Key Achievements

Achievement photo 1
Achievement photo 2
Achievement photo 3
Achievement photo 4
Achievement photo 5
Achievement photo 6
Achievement photo 7
1st Place CTF

1st Place - Cybersphere Congress Advanced CTF

Organized by Securinets INSAT. Restricted AI use. Gained hands-on experience and overcame complex challenges. Prizes: 2x .xyz domains, INE premium voucher, Root me parcours metier, Root me gift cards.

CyberCamp

1st Place - CyberCamp Bootcamp & Competition

Winner in mobile penetration testing track.

Africa Top 4

Top 4 in Africa - Securinets CTF Qualifiers

Strong offensive security performance at continental level.

World Top 7

Top 7 Worldwide - Securinets International Finals

Ranked among the leading international teams.

Global Top 1%

Top 1% - TryHackMe

Completed pentesting and SOC learning paths with practical labs.

World Top 8

Top 8 Global - Cybears Algeria Qualifiers

Strong performance against international teams in the qualifiers.

Hackathon Top 4

4th Place - Hack For Good Hackathon

Developed HANINY, an AI-powered driver monitoring system. Placed 4th out of 54 teams and pitched to over 500 people.

2nd Place

2nd Place - DarkNets CTF 3.0

Competed primarily in Reverse Engineering, while also tackling Web, Pwn, and Cryptography challenges.

Challenge Author

CTF Author & Organizer - MOJO JOJO CTF

Hosted a Capture The Flag event, authoring and designing the Web Exploitation challenges.

03

Writeups & Breakdowns

I design and solve CTF challenges across reverse engineering, mobile security, and exploitation. Browse selected technical notes and systemic challenge breakdowns.

Reverse EngineeringSecurinets Mini CTF

GoCipher: Elite Go Reversing

Brute-forcing an obfuscated Go binary by targeting instruction alignment vulnerabilities.

Read Full Report
Reverse EngineeringMOJO CTF

Warmup: ELF Header Recovery

Repairing a corrupted ELF header and bypassing multiple layers of ptrace anti-debugging.

Read Full Report
Reverse EngineeringMOJO CTF

Slow: GDB-Python Automation

Bypassing massive function-pointer obfuscation and usleep slowdowns via GDB scripting.

Read Full Report
Forensics / REMOJO CTF

PFF: Artifact Forensic Leak

Reversing embedded PDF JavaScript and brute-forcing Steganographic image layers.

Read Full Report
Bash / REMOJO CTF

Mojo-Vault: Integrity Bypass

Race-condition extraction of temporary runtime scripts and self-integrity MD5 patching.

Read Full Report
Reverse Engineering / NetworkMOJO CTF

13337: The Final Boss

A multi-stage challenge involving self-modifying code, network handshakes, and cryptographic brute-forcing.

Read Full Report
Building an AI-Powered Driver Assistant
AI & IoTLloyd Assurances Hackathon

Building an AI-Powered Driver Assistant

A deep dive into building a real-time ML pipeline for road safety with sub-300ms latency.

Read Full Report
04

Certifications

Verified training and formal credentials that back the practical offensive-security work shown in this portfolio.

Red Team Leaders

Red Team Leaders

Certified Red Team Operations Management (CRTOM)

Advanced certification focusing on managing and executing complex Red Team operations, including planning multi-phase adversary simulations, leading red team engagements, and aligning offensive scenarios with real-world threat intelligence.

View Certificate

Hack & Fix

Hack & Fix

CPPS — Certified Phishing Prevention Specialist

Comprehensive certification covering the full spectrum of phishing attack methodologies, social engineering tactics, and organizational defenses. Covers email threat analysis, lure identification, user awareness program design, and technical countermeasures to protect against modern phishing campaigns.

View Certificate
TryHackMe

Learning Path

Jr Penetration Tester

TryHackMe · Completed · 100%

Open Proof →

Practical path covering core offensive security skills for junior penetration testing across web applications and enterprise infrastructure.

Introduction to Cyber SecurityIntroduction to PentestingIntroduction to Web HackingBurp SuiteNetwork SecurityVulnerability ResearchMetasploitPrivilege Escalation
05

Core Skills

Security & Reverse Engineering

Web, Mobile & Network

Systems, Development & Engineering

06

Contact

Open to security internships, CTF collaboration, and network engineering opportunities.

TAKE A BREAK

Visit the arcade for a quick game.

PLAY NOW →