About

About

Hi, I’m Hussein (ZeroByte) 👋

I am a Security Researcher specializing in Exploit Development, Binary Analysis, and Malware Research. My expertise lies in deconstructing complex systems to understand their inner workings and identify security risks.

🛡️ Technical Focus & Research

My research is driven by a deep interest in low-level system internals. I focus on:

  • Exploit Development: Hunting for 0-day and N-day vulnerabilities within hardware, operating systems, and core applications.
  • Malware Analysis: Analyzing sophisticated malware and “cracked” software to reverse-engineer their behavior, identify malicious payloads, and document the risks they pose to users.
  • Binary Exploitation: Active participant in CTF competitions (pwn.college, Hack The Box), focusing on memory corruption and x86-64 Assembly.

🚀 Experience & Projects

  • Vulnerability Research: Active Bug Bounty Hunter on HackerOne and Bugcrowd. I have successfully disclosed vulnerabilities such as XSS, subdomain takeovers, and sensitive data exposure.
  • Community Leadership: Founder and lead of the Al-Mirsad team, a dedicated community for advanced cybersecurity training and malware research.
  • Software Development: I leverage my knowledge of C and Assembly to build low-level tools and explore data structures through custom-built applications.

🎓 Education & Certifications

  • Academic: High School graduate from Al-Najah (Marib) with a focus on Mathematics and Physics (89.88%).
  • Professional Certs: * OST2: Vulnerabilities 1001 & 1002 (C-Family Implementation).
    • Harvard CS50: Computer Science, AI with Python, and Cybersecurity.

🛠️ Skills

  • Languages: x86-64 Assembly, C, Python.
  • Specialties: Reverse Engineering, Malware Analysis, OS Internals, Penetration Testing.
  • Human Languages: Arabic (Native), English (Fluent), Turkish (Beginner).

“I don’t just use software; I break it apart to see how it works—and how it can be secured.”