Skip to main content
whoami

Hi, I'm Youssef Khafaja

Cybersecurity Engineer • Mathematician • Cryptography Researcher

I design and build secure systems with a strong foundation in mathematics, cryptography, and software engineering. I enjoy analyzing complex problems and turning them into practical, secure, and elegant solutions.

About Me

Get to know more about my journey and approach

Youssef Khafaja - Profile Picture

Who am I?

I’m a Mathematics Student with a strong interest in cybersecurity, cryptography, and building secure software systems.

My expertise lies in applying mathematical thinking to real-world security problems and creating tools that improve offensive and defensive capabilities. I’m currently focused on developing security tools, exploring modern cryptography, and continuously improving my technical depth and practical problem-solving skills.

  • B.Sc. in Mathematics — 2026
  • Cybersecurity Engineer & CTF Player
  • Python, C++, Linux
  • Security tool development & cryptography

Skills & Technologies

Technical, mathematical and soft skills I regularly use.

Cybersecurity

Penetration Testing Web Security Network Security Linux Hardening

Cryptography

RSA, ECC, AES Cryptanalysis Number Theory Abstract Algebra

Mathematics

Real Analysis Complex Analysis Differential Equations Numerical Analysis

Dev & Coding

Python C++ SQL HTML / CSS

Cloud & DevOps

Docker Kubernetes VirtualBox / VMware AWS (Foundational)

Tools & Workflow

Vim LaTeX Notion Obsidian

Soft Skills

Problem-Solving Analytical Thinking Continuous Learning Attention to Detail

Languages

Arabic
English

Experience

My professional journey

Sep 2022 — Present

CTF Team Leader

University CTF Team Offensive Security

Led the university CTF team; coordinated training and competition strategy.

  • Coordinated team strategy and training sessions
  • Mentored new members on web and binary exploitation
  • Organized internal practice events and post-mortems
Jun 2022 — Present

Linux Administrator & Automation Specialist

Self-Employed System Administration

Hands-on Linux system administration and automation across Fedora, Arch, and Debian environments; focused on security labs, system reliability, and workflow automation.

  • Installed, configured, and maintained Linux systems for daily development, system administration, and cybersecurity labs.
  • Built and managed both rolling-release (Arch) and stable (Fedora, Debian) environments for long-term reliability and testing.
  • Automated system provisioning, backups, and log analysis using Bash scripting.
  • Deployed and secured core services (NGINX, Apache, SSH) with custom firewall rules using firewalld and iptables.
  • Managed QEMU/KVM virtualization stacks for isolated testing, experimentation, and malware analysis environments.
Jan 2020 — Present

Technical Diagnostics & Hardware Specialist

Freelance Hardware & Engineering

Hands-on diagnostic, repair, and maintenance services for residential and commercial HVAC systems and electrical infrastructure, with a strong focus on safety, reliability, and efficiency.

  • Diagnosed and repaired HVAC control circuits and household electrical appliances through systematic fault isolation.
  • Performed component-level repairs and preventive maintenance for both residential and commercial units.
  • Interpreted electrical schematics to identify faults, verify safe operation, and optimize power usage.
  • Delivered reliable on-site service, maintaining high client retention through technical transparency and consistent results.

Education

My academic background

Oct 2021 — Present

Bachelor of Science

Mathematics & Computer Science

Mathematics degree with focus on theory applied to cybersecurity.

  • Applied Abstract Algebra & Number Theory to cryptographic problems
  • Used Graph Theory to analyze network resilience and secure paths
  • Modeled algorithmic complexity with Analysis & Differential Equations
  • CTF Team Leader: mentoring, strategy, and coordination

Read more

Sep 2025

Professional Training Program

Cybersecurity & Information Assurance

Intensive, government-accredited training program covering offensive and defensive security operations.

  • Accredited by NTRA & EG-CERT (Offensive & Defensive Ops)
  • Executed web/network penetration tests using Burp Suite & Nmap
  • Performed log analysis & threat hunting via ELK Stack & Splunk
  • Hardened Linux systems & WordPress sites against OWASP Top 10

Read more

Projects

Some of my recent work

Jan 28, 2026
Cybersecurity & Pentesting Labs

Cybersecurity & Pentesting Labs

Comprehensive documentation of the eJPT v2 certification journey, featuring the deployment of vulnerable lab environments, execution of penetration testing methodologies, and development of custom security automation scripts.

Personal In Progress
Nov 25, 2025
Differential Chaos Encryption (DCE) Framework

Differential Chaos Encryption (DCE) Framework

A research-grade Python framework for secure image encryption leveraging dynamical systems. Focuses on sensitivity analysis, modular architecture, and resistance against differential attacks.

Graduation Project In Progress
Oct 1, 2025
Personal Portfolio & Technical Blog

Personal Portfolio & Technical Blog

A high-performance, statically generated portfolio and technical blog engineered using Hugo. Designed to showcase cybersecurity research and projects with a focus on speed, SEO, and accessibility.

Personal Active
Jun 1, 2025
Alpha Attack: Full-Chain Exploitation

Alpha Attack: Full-Chain Exploitation

A comprehensive penetration testing engagement targeting Cuppa CMS. Documenting a critical attack chain from Local File Inclusion (LFI) to Remote Code Execution (RCE) and final root privilege escalation.

Research Completed
Nov 28, 2024
Fedora Workstation Customization

Fedora Workstation Customization

A highly customized, terminal-centric workflow built on Fedora Linux using the Hyprland compositor. Designed for maximum efficiency, distraction-free programming, and cybersecurity research through keyboard-driven navigation and custom automation.

Personal Active
Sep 1, 2024
Quantum Key Distribution (BB84) Simulation

Quantum Key Distribution (BB84) Simulation

A high-fidelity simulation of the BB84 quantum cryptographic protocol implemented in Python and Qiskit. Models quantum state transmission, basis mismatch, and eavesdropping detection via QBER analysis.

Research Completed

Certificates

My professional certifications

Sep 23, 2025
NTI Cybersecurity Specialist Verified

NTI Cybersecurity Specialist

NTI NTI-CYBER-2025
Cybersecurity
Jul 18, 2025
Certified Ethical Hacker Verified

Certified Ethical Hacker

MaharaTech Vl4Wu3VlnF
Offensive Security
May 27, 2025
Cybersecurity For Beginners Verified

Cybersecurity For Beginners

Mahara Tech (ITI) E3ieMJ4HBx
Cybersecurity Foundation
Apr 25, 2025
Cloud and Virtualization Concepts

Cloud and Virtualization Concepts

NDG & MaharaTech X2k1jZJCnC
Cloud Infrastructure
Nov 29, 2024
Red Hat System Administration I Verified

Red Hat System Administration I

MaharaTech 8AKpOw7Itm
Linux
Aug 15, 2024
QBronze | Quantum Computing & Programming Verified

QBronze | Quantum Computing & Programming

QWorld QBronze138-77
Quantum Computing

Achievements

Notable accomplishments and milestones

Elite Operations
COMPETITION

CTF Top 10 Finalist

Ranked 10th globally in THM CTF. Specialized in breaking complex Cryptography schemes and executing advanced Digital Forensics investigations.

CERTIFICATION

NTI Certified Specialist

Completed intensive training in Cybersecurity & Information Assurance at the National Telecommunication Institute.

PROJECT

DCE Encryption System

Proprietary algorithm utilizing Differential Chaos Theory (Lorenz Attractors) to generate high-entropy keys for secure data transmission.

Command Center

Secure contact hub — social, email and PGP key for encrypted communication.

root@0xAlphaDark:~$ ./initiate_handshake.sh --secure

0xALPHADARK—PGP PGP Public Key