ZAHIDUL ISLAM RATUL

CYBERSECURITY PROFESSIONAL

> Certified Ethical Hacker | Security Researcher | Writer

INITIALIZE HANDSHAKE
Zahidul Islam Ratul

> WHOAMI

user@bio:~

> Certified Ethical Hacker (NSDA Level 4, CRTOM, CCEP) specializing in penetration testing, vulnerability assessment, and SOC.

> Skilled in Python, Active Directory, and security tools. Passionate about identifying risks and strengthening defenses.

> Dedicated volunteer and intern committed to continuous learning and delivering impactful security solutions.

> EDUCATION: Mechanical Engineering.

> _

> ARSENAL

OFFENSIVE TOOLS

MetasploitBurp Suite SQLmapNmap FFUFBloodHound MimikatzOpenVAS

CORE & SCRIPTING

PythonLinuxTCP/IP Active DirectoryOSINTPrompt Engineering

DEFENSIVE SECURITY

SplunkWiresharkMalware Analysis DocumentationLog AnalysisPhishing Detection

METHODOLOGIES

Vulnerability AssessmentWeb App SecurityOWASP Top 10DFIR

SOFT SKILLS

Technical WritingLeadershipProblem-SolvingAnalytical Thinking

> CERTIFICATIONS

Penetration Testing for Freelancing - Level 4

NSDA, Gov. of Bangladesh (Dec 2025)

CRTOM (Certified Red Team Operations Mgmt)

Red Team Leaders (2025)

CCEP (Certified Cybersecurity Educator)

Red Team Leaders (2025)

EHP (Ethical Hacking Professional)

Bytecapsule (Dec 2025)
> MORE CERTIFICATES

> PROJECTS

Web Email Bundler
[TYPE: AUTOMATION TOOL]

Web-Email-Bundler (Python Web Crawler)

Built lightweight Python web crawler extracting valid emails with intelligent false-positive filtering. Integrated configurable delays and URL normalization for ethical scraping.

> STACK: Python, BeautifulSoup, Requests

> VIEW GITHUB
Active Directory Lab
[TYPE: OFFENSIVE SIMULATION]

Active Directory Pentesting Lab

Demonstrated sophisticated attack methodologies including LLMNR poisoning, SMB relay attacks, and BloodHound analysis. Executed Mimikatz credential extraction and analyzed Windows security weaknesses.

> TOOLS: BloodHound, Mimikatz, Responder

> VIEW DETAILS

> TECHNICAL WRITING

I Built Malware In A Controlled Lab

Detailed walkthrough of creating malware in a lab environment that compromised a Windows system in seconds.

> READ ARTICLE ON MEDIUM

How I Tested SMB Relay Attacks

A lab-based demonstration of SMB Relay attacks, analyzing the vulnerabilities and mitigation strategies.

> READ ARTICLE ON MEDIUM
> MORE ARTICLES

> ESTABLISH_CONNECTION

> Target Locked. Ready for engagement.

> Available for freelance projects and security jobs.

> STATUS: ONLINE