$cat about | more

This is where I document my work in Application Security โ€” from vulnerability research and penetration testing to building secure systems with DevSecOps principles. Everything here reflects real hands-on experience, published openly for anyone exploring the same path

$whoami

My name is Hala. I am an Application Security Engineer | Penetration Tester | DevSecOps Practitioner | Python Developer | PortSwigger Labs Enthusiast | Lifelong Learner, based in the Northern Virginia / DC metro area.

Check out my security projects, the tools I use, what I'm researching now, and my collection of vulnerability write-ups.

$whoami -v

Check out my security research! ๐Ÿ”ฌ
Subscribe to my AppSec write-ups. ๐Ÿ“ก

My interests include application security, web exploitation, API security, penetration testing, secure code review, DevSecOps pipeline hardening, OWASP methodologies, cloud security, and building security into the SDLC.

OWASP Top 10 Burp Suite SQLi XSS SAST/DAST API Security Python FastAPI Docker AWS CI/CD Security IDOR JWT Attacks SSRF

$cat stats.json

50+ Labs Solved
10+ Projects
15+ Write-ups
3 Certs

$ls ~/projects/

๐Ÿ” Secure Task Management API
2025

A FastAPI-based task management system built with security-first principles. Implements JWT auth, role-based access control, input validation, and rate limiting.

FastAPI Python JWT RBAC SQLAlchemy
โ–ธ click to expand

Built an intentionally vulnerable version alongside the production-ready implementation for security testing practice. Features include password hashing with bcrypt, parameterized queries, CORS configuration, and comprehensive input sanitization.

The vulnerable version demonstrates common API security flaws: broken authentication, mass assignment, IDOR, and SQL injection points.

๐Ÿ•ต๏ธ PortSwigger Lab Solutions
2024-2025

Comprehensive documentation of PortSwigger Web Security Academy lab solutions covering SQL injection, XSS, CSRF, authentication bypasses, and more.

Burp Suite Web Exploitation OWASP Write-ups
โ–ธ click to expand

Each lab solution includes detailed methodology, Burp Suite configurations used, payloads tested, and lessons learned. Organized by vulnerability category with difficulty progression.

Covers apprentice through expert-level labs with emphasis on understanding the underlying vulnerability mechanics.

๐Ÿ›ก๏ธ DevSecOps Pipeline
2025

CI/CD pipeline with integrated security scanning using GitHub Actions. Includes SAST, dependency scanning, secret detection, and container security checks.

GitHub Actions Docker Trivy Semgrep AWS
โ–ธ click to expand

Automated security pipeline that runs on every pull request. Integrates Semgrep for SAST, Trivy for container vulnerability scanning, and custom Python scripts for secret detection.

Demonstrates shift-left security practices with automated gate checks that prevent vulnerable code from reaching production.

๐ŸŒ Vulnerable E-Commerce App
2025

An intentionally vulnerable Next.js e-commerce application for practicing application security testing and demonstrating common web vulnerabilities.

Next.js React OWASP Top 10 Docker
โ–ธ click to expand

Contains seeded vulnerabilities across the OWASP Top 10 including XSS, CSRF, insecure deserialization, and broken access controls. Each vulnerability is documented with exploitation steps and remediation guidance.

Designed to be deployed in isolated Docker containers for safe testing and learning.


$ls ~/writeups/ --sort=date


$cat ~/toolkit.conf

$ cat toolkit.conf [web_testing] proxy = Burp Suite Professional scanner = Nuclei, Nikto fuzzer = ffuf, wfuzz recon = Amass, Subfinder [code_analysis] sast = Semgrep, Bandit sca = Snyk, pip-audit secrets = Trufflehog, Gitleaks [infrastructure] containers = Docker, Trivy cloud = AWS (S3, EC2, CloudFront) cicd = GitHub Actions [development] language = Python, JavaScript framework = FastAPI, Next.js, React os = Kali Linux, WSL 2 api_test = Postman, curl

$ls ~/certs/

๐Ÿ…
CompTIA Security+
CompTIA
๐Ÿ…
AWS Cloud Practitioner
Amazon Web Services
๐Ÿ…
PortSwigger BSCP
PortSwigger (In Progress)

$echo $CONTACT_INFO

Open to collaboration on AppSec research, CTF challenges, and DevSecOps projects. Feel free to reach out via any of the channels above.