About

Muhammad Abdullah aka Hwat Sauce


Back

Creative, passionate, and self-taught individual with a love for Offensive Security, Penetration Testing, Red Teaming, Reverse Engineering, CTFs and Little bit of Crypto. Willing to work with others in the hopes of learning new things and creatively providing solutions to complex problems and collaborating with them.

By day, I'm a coffee-fueled coder and nerd, hammering out lines of code like there's no tomorrow. But when the sun sets, the real fun begins. I don my virtual cape, pull on my digital gloves, and dive deep into the cyber-verse. I'm not just a hacker — I safeguard the digital landscape.

I dance through encryption like it's a rhythm game, always two steps ahead of the cyber crooks. Don't worry, though — I mostly focus on keeping things secure.

In this age of digital goldmines, I'm the silent protector, watching over your data while you sleep. If there's a breach to be patched or a botnet to be busted, you can count on me. So if you need a partner in code or just someone to talk shop about the latest infosec trends, I'm your go-to. Here's to being a keyboard ninja by night and a security enthusiast by day!

Skills

  • Programming Languages: Python, C++, C#, Java, Bash, and Assembly.
  • Tools & Frameworks: Docker, Metasploit, Burp Suite, Nessus, and Nmap.
  • Platforms: Linux, Windows, AWS, GCP, Azure, and Cloudflare.
  • Blogging: As a hobby, I periodically blog about cybersecurity. You can find my posts on Medium.

Experience

Education

Certifications

HackTheBox Pro Labs:

What are Pro Labs?

Hack The Box Pro Labs are advanced, real-world penetration testing environments designed to simulate corporate networks. They offer multi-layered attack paths, Active Directory setups, and realistic scenarios for red teaming and cybersecurity skill development.

  • Dante - Beginner

Dante Pro Lab offers a realistic environment with both Linux and Windows machines, focusing on network penetration testing. You'll sharpen skills in enumeration, exploit development, lateral movement, privilege escalation, and web attacks while practicing buffer overflows and Metasploit usage.

  • P.O.O - Beginner

This lab focuses on Active Directory attacks, helping players master enumeration, lateral movement, privilege escalation, and situational awareness. It also builds strong skills in web application attacks and AD-specific enumeration techniques.

  • Full House - Intermediate

In this Red Team Operator Level 1 lab, you'll gain hands-on experience in source code review, web and Windows exploitation, Active Directory attacks, reversing, blockchain exploitation, and AI bypass techniques.

  • Zephyr - Intermediate

Zephyr Pro Lab focuses on real-world Active Directory exploitation, relay attacks, lateral movement, pivoting, and modern web attacks. You'll develop skills in enumeration, SQL attacks, password cracking, privilege escalation, and trust boundary crossing in a red team environment.

Achievements

Projects

  • Digital Wallet: Developed a C++ based digital wallet with streamlined fund transfer and transaction tracking functionalities.
  • GUI Based Network Monitoring System: Designed a GUI Network Monitoring System using C# with user-friendly graphical interfaces for exploring network functionalities.
  • Blockchain Implementation: Developed a Java-based blockchain with features like user authentication, transaction tracking, and dynamic coin rate fluctuation. This project was a collaborative effort with Muhammad Munib, Radeel Ahmed, and Husnain Tahir.
  • 16 bit Instruction Set Architecture Simulator: This code provides a basic framework for simulating an ISA processor with a limited set of instructions and capabilities. It can be extended further to support additional instructions and features as needed.
  • Bash Chat: The Bash Chat Application is a simple yet effective way to facilitate communication between users on a local network. Leveraging the power of Bash scripting and the networking capabilities of Netcat, this application allows users to chat with each other in a terminal environment.
  • HeepHound: HeapHound is a Python-based tool built with my dear friend Muhammad Munib and Radeel Ahmed for analyzing Java heap dump files (.hprof) to extract sensitive data, assess risks, and generate forensic reports. It identifies credentials, tokens, and other artifacts using built-in heuristics, producing reports in JSON, HTML, and text formats. Ideal for security investigations, malware analysis, and incident response.
  • NetEye: Net-Eye is an all-in-one Python-based network reconnaissance tool that detects live hosts, scans ports, grabs banners, resolves DNS, performs GeoIP lookups, and runs detailed Nmap scans. It also identifies known vulnerabilities based on discovered services, helping users assess and secure their networks effectively.

Additional Experiences

Contact Me