About

About

I’m Muhammad Idrees Khan (aka شیبہ) — a Penetration Tester and AI Red Teamer with a strong focus on offensive security, automation, and vulnerability research. My work spans web, network, API, cloud, and AI security, where I specialize in identifying real-world attack paths and translating them into actionable remediation guidance.

I am currently pursuing a Bachelor’s degree in Cybersecurity at :contentReference[oaicite:0]{index=0}, Islamabad (Expected April 2025). I enjoy working at the intersection of practical exploitation, secure system design, and emerging attack surfaces, particularly in AI-driven systems.


What I Do

  • Penetration Testing & Red Teaming
    End-to-end web, network, and API security assessments using OWASP Top 10, OWASP API Top 10, MITRE ATT&CK, PTES, and CVSS-based reporting.

  • AI & LLM Security
    Hands-on AI red teaming, testing LLMs and autonomous agents for prompt injection, authorization bypass, logic flaws, and agent exploitation. I also build intentionally vulnerable AI systems for exploitation demos and security research.

  • Automation & Tooling
    Passionate about automating security workflows using Python, Bash, and PowerShell—from vulnerability prioritization to cloud misconfiguration detection.

  • DFIR & Threat Intelligence
    Experience with OSINT investigations, malware analysis workflows, forensic tooling, and incident-response optimization.


Experience

AI Red Teamer

Hackers Academy — Remote (Jul 2025 – Sep 2025)

  • Performed AI red-teaming on LLMs and autonomous agents, identifying prompt-injection, chain-of-thought leakage, and authorization bypass issues.
  • Built intentionally vulnerable AI agents for exploitation demonstrations and training.
  • Automated adversarial testing using Python fuzzers and documented findings with PoCs, threat models, and remediation guidance.

Junior Penetration Tester

:contentReference[oaicite:1]{index=1} — Moscow, Russia (Aug 2024 – Jun 2025)

  • Executed web and network penetration tests, including reconnaissance, privilege escalation, and Active Directory exploitation.
  • Assessed applications and infrastructure using Burp Suite, Nmap, Metasploit, SQLmap, Hydra, and related tooling.
  • Delivered technical reports with CVSS scoring and actionable remediation recommendations.

Cyber Security Analyst Intern

:contentReference[oaicite:2]{index=2} — Remote (UAE) (Apr 2024 – May 2024)

  • Conducted OSINT and threat-intelligence analysis to improve organizational security visibility.
  • Supported malware analysis and forensic investigations.
  • Optimized incident-response workflows, reducing investigation time by 30%, and maintained the organizational risk register.

Projects & Research

  • AI-Assisted Vulnerability Prioritization & Remediation Tool
    Prototype system for automated vulnerability ranking and fix suggestions using ML-based heuristics.

  • OWASP API Vulnerable Lab (Spring Boot + JWT)
    Demonstrates OWASP API Top 10 issues such as BOLA, auth bypass, and injection, with both vulnerable and fixed implementations.

  • AutoCSPM — Automated Cloud Security Posture Management
    Automated scanners for cloud misconfiguration detection and compliance validation in live and pre-deployment environments.


Certifications

  • Junior Penetration Tester — TryHackMe
  • Network Support & Security — Cisco
  • Digital Forensics (Windows, Linux, Mobile)
  • OSINT & Threat Intelligence

What’s Next?

I’m currently deepening my expertise in DevSecOps, cloud security, system security, and advanced red teaming, while actively participating in CTFs and security competitions (Red Team & Blue Team).

I’m always open to challenging roles and collaborations in:

  • Penetration Testing
  • Security Engineering
  • AI & Cloud Security
  • Digital Forensics & Incident Response

This blog is where I document research, publish tools, analyze vulnerabilities, and explore modern attack surfaces—from classic web exploits to emerging AI threats.