01. About_Me

I am a cybersecurity graduate from Israa University (2021-2025) with a passion for digital protection and ethical hacking. With hands-on experience in penetration testing, vulnerability assessment, and ethical hacking through real-world CTF competitions and controlled lab environments, I aim to secure digital infrastructures against evolving threats.

Skilled in tools such as Burp Suite, Nmap, and Metasploit, I have a strong understanding of OWASP Top 10 vulnerabilities and web application attack techniques. I trained at the National Cyber Security Center of Jordan and consistently rank among top performers in national and international cybersecurity competitions.

  • Location: Amman, Jordan
  • Email: adel.abuzalata@gmail.com
  • Phone: +962 796 680 872
  • Languages: Arabic, English, Russian

02. Technical_Skills

core_competencies

  • Web Application Penetration Testing
  • Network Penetration Testing
  • Privilege Escalation (Linux & Windows)
  • SQL Injection & Web Exploitation
  • Active Directory Attacks & Exploitation
  • CTF Problem Solving

tools_&_technologies

Metasploit Burp Suite SQLmap Nmap Gobuster Nikto Wireshark TCPdump Hydra John the Ripper Hashcat

platforms_&_os

Kali Linux Parrot OS Windows TryHackMe HackTheBox

03. Documented_Projects

Web Application Security Testing Lab

Conducted a full penetration test on DVWA / OWASP WebGoat deliberately vulnerable web applications.

  • Identified and exploited SQL Injection, XSS, CSRF, and broken authentication vulnerabilities.
  • Documented findings in a structured report with CVSS severity ratings and remediation steps.
Burp Suite OWASP DVWA

Network Penetration Testing Lab

Simulated a full attack chain: reconnaissance → exploitation → post-exploitation → reporting.

  • Used Nmap for port scanning, Metasploit for exploitation, and Wireshark for packet analysis.
  • Performed privilege escalation on Linux and Windows hosts within isolated test environments.
Nmap Metasploit Wireshark

Active Directory Attack Simulation

Executed Active Directory exploitation in a controlled lab setting to map privilege escalation paths.

  • Enumerated AD environment using BloodHound and PowerView.
  • Executed Kerberoasting and Pass-the-Hash attacks.
  • Developed understanding of lateral movement techniques and domain compromise scenarios.
BloodHound PowerView AD

04. Experience_&_Education

Jul 2025 – Sep 2025

Security Trainee

National Cyber Security Center (NCSCJO) – Amman, Jordan

  • Gained practical exposure to offensive security techniques and vulnerability assessment workflows.
  • Participated in security analysis tasks, identifying and documenting system weaknesses.
  • Applied penetration testing methodologies within a national security operations environment.
2021 – 2025

Bachelor’s in Cybersecurity

Israa University – Amman, Jordan

Core focus on network security, ethical hacking, and digital forensics.

2024

Computer Technician

Freelance / Self-Employed – Amman, Jordan

  • Diagnosed and repaired hardware and software issues across desktop and laptop systems.
  • Performed OS installations, malware removal, data recovery, and driver configuration.

05. Certs_&_Achievements

Certifications & Courses

  • eJPTv2 ✓ Certified
  • CCNA
  • eWPT (Web Pentest)
  • eCPPT (Advanced Pentest)
  • TryHackMe Learning Paths
  • HackTheBox Learning Paths

CTF Competitions

  • 5th Place – IEEE Penetration Test Competition
  • 5th Place – Final CyPetra CTF Competition
  • 5th Place – Arab Universities Cybersecurity CTF (2025)
  • 9th Place – ZUJCTF 2023
  • 16th Place – NCSC CTF 2024
  • Participant – Black Hat MEA 2025
  • Participant – Jordanian Nat. Cyber Warriors CTF 2024