I’m Ahmed Alsalimi, a Red Team Operator and Penetration Tester specializing in:
- Advanced Red Teaming & Adversary Simulation
- Web & API Penetration Testing
- DevSecOps and Application Security
- Mobile Penetration Testing
- Enterprise Vulnerability Management
- Detection Evasion & Post-Exploitation
- Purple Teaming & Threat-Informed Defense
- Active Directory & Network Penetration Testing
My work focuses on uncovering high-impact vulnerabilities, breaking complex systems, and strengthening cyber resilience across enterprise environments.
More about me
- From: Saudi Arabia 🇸🇦
- Role: Penetration Tester • Red Team Operator
- Expertise: Web, API, Mobile, Infra, AD, Cloud
- Specialties: Exploitation, Code Review, Red/Purple Teaming
- Interests: Malware, Reverse Engineering, Detection Bypass
- Lifelong learner — always leveling up
- Reach me at ahmed.alsalimi@outlook.com
- CVE-2026-26416: Authorization Bypass Leading to Privilege Escalation in Cognix Recon Client
- CVE-2026-26417: Broken Access Control in Password Reset Functionality in Cognix Recon Client
- CVE-2026-26418: Missing Authentication and Authorization in Web API in Cognix Recon Client
- CVE-2024-41226: Response Manipulation Led to CSV Injection
▶︎ •၊၊||၊|။||||။၊၊|• 0:10


