Skip to content
View bericontraster's full-sized avatar
🎯
Focusing
🎯
Focusing

Block or report bericontraster

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
bericontraster/README.md

Hi, I'm Muhammad Zubair!
Offensive Security Professional

Summary

Offensive Security Professional with 3+ years of hands-on experience in penetration testing and red team operations. OSCP-certified and currently advancing in malware development to simulate advanced persistent threats.

Disclaimer

All project names, client organisations, and sources are intentionally anonymised. The material presented is a generalised representation of work I have performed, ensuring that no confidential information, internal documentation, or employer-specific assets are disclosed.

This portfolio reflects my personal skills, methodologies, and experience, while fully respecting NDAs, licensing agreements, and professional confidentiality requirements.

Projects

Enterprise-Grade Offensive Security Training

These training programs were developed to meet recognised international standards and equip learners with practical, real-world offensive security skills. The courses were aligned with respected global certification bodies to ensure credibility and rigorous methodology.

Advanced Penetration Testing Program: Designed and developed an end-to-end penetration testing curriculum, incorporating approved concepts and authorised learning materials where applicable.

Web Application Security Course: Developed a complete web application security course mapped to modern offensive and defensive practices.

Proxmox-Based Virtual Lab Environment

Built and maintained a Proxmox-powered enterprise lab environment consisting of 30+ virtual machines distributed across segmented network zones. The platform supports snapshot-driven attack simulations, red-team exercises, malware analysis, and remote student access. Secure connectivity is provided through a custom OpenVPN gateway.

Custom Vulnerable Lab Development

Designed and deployed multiple purpose-built vulnerable applications and systems for hands-on training and practical assessments. These labs include scenarios covering:

  • Web exploitation (XSS, SQLi, SSTI, IDOR)
  • Active Directory attack chains (Kerberoasting, ACL abuse, lateral movement)
  • Windows & Linux privilege escalation
  • SSRF and GraphQL exploitation

All environments were mapped to realistic adversary techniques and integrated into structured learning cycles and practical exercises.

🌐 Socials:

LinkedIn Medium X

Popular repositories Loading

  1. enterprise-offensive-security-labs enterprise-offensive-security-labs Public

    A collection of enterprise-focused offensive security labs designed to simulate realistic internal and external attack scenarios. These environments reflect misconfigurations, adversary techniques,…

    1

  2. bericontraster bericontraster Public

  3. bericontraster.github.io bericontraster.github.io Public

    My blog is a comprehensive resource for cybersecurity enthusiasts, featuring CTF writeups, in-depth research articles, hacking walkthroughs, and tech-driven content.

    Shell