// THE OPERATOR

Abdul Wahab
Junaid

I’m an offensive security specialist, quantum cryptography researcher, and open-source tool builder with 5+ years of frontline experience in adversarial simulation and defense engineering. My work lives at the intersection of hands-on red teaming and forward-looking cryptography — helping organizations build resilience against today’s threats and tomorrow’s quantum-powered adversaries.
My journey began in 2019, reverse engineering malware and hunting CVEs in enterprise software. Since then, I’ve led security assessments across fintech, healthcare, and government sectors, discovered 15+ CVEs, and built security tools used by thousands of practitioners. I believe the strongest defenders think like attackers, yet engineer with surgical precision.
“Security is not a product — it’s a mindset of continuous adversarial thinking, hardened by rigorous engineering.”
Currently, I’m diving deep into post-quantum cryptography (NIST finalists) and cloud-native exploitation. I regularly publish research on advanced threat modeling, binary exploitation, and infrastructure hardening. My goal is to bridge the gap between academic cryptography and real-world offensive security.
Offensive Engagements50+
CVEs Discovered15+
GitHub Stars (combined)2.8k+
Global Talks & Trainings12
Years Experience5+
CertificationsOSCP, CISSP, GPEN, CEH

Red Team DNA

I simulate real-world adversaries to uncover blind spots. From stealthy initial access to lateral movement and data exfiltration — every assessment is built on TTPs used by actual threat actors. My red team operations have reduced mean time to detection by 30% across major enterprises.

Quantum-Ready Defense

With the rise of cryptographically relevant quantum computers, I focus on helping organizations transition to post-quantum algorithms (CRYSTALS-Kyber, Dilithium). I combine crypto-agility with offensive testing to ensure hybrid schemes resist both classical and quantum threats.

2019
Started bug hunting & earned first CVE; joined freelance security consulting.
2021
OSCP certified; published first open-source tool (Black-Hat-Python arsenal).
2023
Lead red team exercises for global fintech; presented quantum security research at local symposiums.
2024
BSc in Computer Science; joined RDD AGENCY as Cyber Security Strategist, leading cloud penetration tests.
2025
Focused on post-quantum cryptography migration strategies; authored multiple deep-dive articles on NIST PQC.
2026
Building quantum-resistant security frameworks & mentoring next-gen security researchers.

Open Source as a Force Multiplier

I maintain and contribute to a suite of security tools used by ethical hackers worldwide: Kali-Linux field guide, Black-Hat-Python offensive scripts, and Hacking-Tools repo covering malware analysis & exploit dev. Open source is my way of sharing knowledge and accelerating the community’s defense capabilities.

Python / Rust Binary Exploitation Cloud Pentesting
Penetration Testing Red Teaming Quantum Cryptography Cloud Security (AWS/Azure) Reverse Engineering SIEM & Threat Hunting

Collaborate & Connect

Looking for an offensive security expert, speaker, or research collaborator? I’m open to speaking engagements, security consulting, and quantum security projects.

Get in touch →