Skip to content
View MohammedAsadKhan's full-sized avatar
  • Conrad Blutcher Institute
  • Texas

Block or report MohammedAsadKhan

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
MohammedAsadKhan/README.md

Hi, I'm Mohammed! πŸ‘‹

🎯 Red Team Enthusiast | ☁️ Cloud Security Explorer | πŸŽ“ Student @ TAMUCC


πŸ‘¨β€πŸ’» About Me

Junior at TAMUCC studying Computer Science with a focus in cybersecurity. I compete in CTFs and NCL, I build tools, and I believe the best way to learn security is to think like an attacker and build like a defender.


πŸ” Cybersecurity Projects:

πŸ” CipherShift

Caesar and Vigenere Cipher Analyzer and Breaker

  • The Problem: Every CTF has cipher challenges that eat up time, manually testing 25 Caesar shifts or jumping between CyberChef and dcode.fr mid-competition.
  • The Solution: A multi-cipher toolkit that auto-cracks Caesar and Vigenere ciphers using frequency analysis and IoC-based key detection, with a fast CLI built for CTF speed runs.
  • Tech Stack: Python | Streamlit | Plotly | Frequency Analysis | Cryptanalysis

πŸ›‘οΈ HexGuard

Automated Binary File Identification Tool

  • The Problem: Adversaries often use file extension evasion (e.g., renaming .exe to .jpg) to bypass security filters in CTFs and real-world systems.
  • The Solution: A Python-based tool that ignores the extension and reads Magic Bytes (File Signatures) at the binary level to identify the true file type.
  • Tech Stack: Python | Binary Analysis | Digital Forensics

πŸ… Certifications:

  • βœ… CompTIA Security+

🚩 CTF & Competitions:

  • PicoCTF β€” Specialized in Binary Exploitation, Cryptography, and General Skills.
    • March 2026: Ranked 489th out of 8,747 teams. Contributed 5,300 of the team's 11,900 points. Completed all challenges in Binary Exploitation, Forensics, General Skills, and Reverse Engineering.
    • National Cyber League (NCL) β€” Ranked competitor focusing on Password Cracking, Web App Exploitation, and Enumeration.
    • Spring 2026 Practice Game: Ranked 31st out of 7,276 competitors, top scorer from the TAMUCC ICS Club.

πŸ“ Writeups & Resources:

πŸ“– NCL Gymnasium Writeup

A beginner-friendly guide to the National Cyber League Gymnasium, written for new ICS Club members at TAMUCC.

I was completely lost when I started competing in the NCL during the Fall 2025 semester. No one handed me a roadmap, so I figured it out the hard way. Once I did, I wrote everything down so the next person wouldn't have to go through the same thing. If you're just getting started in CTFs and NCL, this is for you.


🀳 Connect with me:

LinkedIn Email


Pinned Loading

  1. HexGuard HexGuard Public

    A Python-based defensive tool for file integrity verification using magic byte analysis. Designed to detect file extension evasion techniques common in CTFs and malware delivery.

    Python

  2. NCL-Gymnasium-Walkthrough NCL-Gymnasium-Walkthrough Public

    Step-by-step NCL Gymnasium walkthroughs to help competitors build accuracy and master every challenge category. Short, tells exactly what it is, and speaks to the accuracy angle which is what sets …

    Python 1

  3. CipherShift CipherShift Public

    A Caesar cipher analyzer and breaker built for CTF players who got tired of manually testing 25 shifts. Features auto-crack via frequency analysis, confidence scoring, brute force mode, double enco…

    Python

  4. JacobDPoland/CaptureTheIsland JacobDPoland/CaptureTheIsland Public

    This is a CTF site built with the ASP.NET MVC framework for the group project for Internet Programming at TAMUCC.

    HTML