Back to team
Furqan Ahmad

Furqan Ahmad

Cyber Security Analyst

Cyber Security Analyst specializing in offensive security, reverse engineering, and threat analysis. Experienced in conducting penetration tests, malware investigations, and vulnerability research across web, mobile, and enterprise environments. Skilled in identifying high-risk vulnerabilities, performing exploit development, and strengthening security posture through proactive defense strategies.

What I Do

Offensive Security & Penetration Testing

Conducting comprehensive Web, API, Network & Cloud Penetration Testing. Proficient in Active Directory Exploitation, Privilege Escalation, and Binary Exploitation including Buffer Overflows and Heap Exploits.

Tools

NessusAcunetixMetasploitBurp Suite

Skill Set

Web & Network Penetration TestingActive Directory ExploitationAttack Surface MappingRooted/Jailbroken Device Testing

Reverse Engineering & Malware Analysis

Performing Static & Dynamic Analysis of Windows/Linux Binaries and Android Application Reverse Engineering (APK Analysis). Expertise includes Memory Forensics, IOC Development, and Deobfuscation & Protection Bypass Techniques.

Tools

GhidraJADXVolatility

Skill Set

Static & Dynamic AnalysisAPK AnalysisDeobfuscationMalware Triage

Digital Forensics & Incident Response

Executing Windows Log Analysis to detect unauthorized access and lateral movement. Specializing in Disk & Artifact Analysis for attack timeline reconstruction and Anti-Forensics Detection to identify log tampering and artifact wiping.

Tools

WazuhQRadarKibanaWireshark

Skill Set

Windows Log AnalysisMemory ForensicsAnti-Forensics DetectionThreat Detection & Monitoring

Past Projects

Dorime Defender (Final Year Project)

AI-powered runtime vulnerability detection and patching system. Designed hybrid static & dynamic vulnerability detection engine. Integrated open-source security tools into unified framework. Automated runtime patch suggestion for developers.

Data Encryption Framework

Security tool (Freelance Project). Developed dual-layer encryption mechanism. Designed secure key handling and storage architecture. Built for enterprise-level data confidentiality enhancement.

Malware Simulation & C2 Research Lab

Personal Research. Developed controlled C2 simulation for detection testing. Studied evasion techniques in monitored environments. Built webhook-based communication architecture for research.

Tech Stack

Drag to rotate