Skip to content
View kaaek's full-sized avatar
đź’­
Busy with the spring semester
đź’­
Busy with the spring semester

Highlights

  • Pro

Block or report kaaek

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
kaaek/README.md

Hi, I'm Khalil El Kaaki

Research Assistant in Post-Quantum Cryptography, Computer Engineering Student @ AUB

Brief

  • I'm a third-year Computer Engineering student at the American University of Beirut.
  • I'm driven by a focus on security: penetration testing, cryptography, and research.
  • I approach projects with a start-now mindset: open the editor, write that first imperfect (or even bad) line, and refine as you go. Creativity is fleeting, and implementation can always be cleaned up later.
  • I'm currently looking into a post-quantum password-authenticated key exchange (PQ-PAKE) implementation for the Thread network layer protocol for IoT.
  • My interests span the full security landscape: penetration testing engagements, SOC operations, malware development, analysis, and formal verification.
  • Beyond academics, I've spent years contributing to SkillSaff, a community service project offering college counseling resources, exam materials, and technical tutorials to marginalized public schools in Beirut. After a three-year pause, I'm returning to continue this work soon.

Tech Stack

This is as an exhaustive list as I can come up with. Here goes.

Programming & Scripting: Bash, Python, Java, C/C++, MATLAB, and SQL (yes, it's a programming language as it is turing-complete.)
Reconnaissance & Enumeration: Nmap, Subfinder, Ffuf/Dirb, WhatWeb, Nikto, Wireshark
Exploitation & Vulnerability: Metasploit, Burp Suite, SQLmap, Hydra, John the Ripper, Hashcat
Post-Exploitation & PrivEsc: GTFOBins, PEASS-ng
Backend Frameworks & DevOps: Spring Boot, PostgreSQL/SQLite, Docker

Featured Projects

UAV-MEC Trajectory Network Optimizer: PyTorch project that simulates and optimizes the trajectory of an aerial (UAV) compute edge node to maximize the number of tasks completed for users (optimizing for service.)

Backend Development Course (In Progress): Building a Spring Boot curriculum for Java developers covering RESTful APIs, bean validation, HTTP semantics, security hardening, and DevOps integration. I plan to give this course on campus :)

What I'm up to

  • Learning about cryptography and formal verification.
  • I'm taking Ethical Hacking II this semester, which focuses on Windows hacking, active directory attacks, malware development, among other topics.
  • I'm also taking DevSecOps, and I'm learning AWS for now.
  • Preparing (as much as I can) for graduate programs in security research
  • Seeking internship opportunities in penetration testing or applied cryptography

Connect

[email protected] • LinkedIn • Discord

I'm open to discussions and collaboration :)

Enjoy your stay on my page. Peace.

Pinned Loading

  1. Batch-UI-Without-the-UI Batch-UI-Without-the-UI Public

    An interactive Menu system in a Batch script. The menu should provide the user with different options, and the script should perform the corresponding tasks based on the user's selection from menus…

    Batchfile

  2. UAV-MEC-Trajectory-Network-Optimizer UAV-MEC-Trajectory-Network-Optimizer Public

    PyTorch project that simulates and optimizes the trajectory of an aerial (UAV) compute edge node to maximize the number of tasks completed for users (optimizing for service.)

    Python 1

  3. Card-Management-System Card-Management-System Public

    This project is a backend-focused API-based Card Management System (CMS) for a fin-tech company. The system will manage three main entities: Card, Account, and Transaction. The goal is to build a R…

    Java

  4. Library-Management-System Library-Management-System Public

    The Library Management System is a Spring Boot microservice for a library. It includes CRUD operations for managing books, authors, borrowers, and borrowing transactions. The system will use DTOs (…

    Java

  5. Email-Client Email-Client Public

    This micro-service will be responsible for sending emails to borrowers when they successfully borrow a book.

    Java

  6. Physical-Layer-Communication-Chain Physical-Layer-Communication-Chain Public

    Physical-layer communication chain: a message signal is sampled or approximated by Fourier coefficients, quantized into a vector, mapped to bits, encoded into a codeword, and modulated into symbols…

    MATLAB