Amr En-Niari
Red Team Operator

Offensive Security Consultant specializing in penetration testing, Active Directory exploitation, and red team operations. Breaking defenses to build stronger security.

4mr@kali:~
┌──(4mrkali)-[~]
└─$ whoami
Red Team Operator | Offensive Security

┌──(4mrkali)-[~]
└─$ cat /etc/certs
CRTO | CRTL | CRTE | APTLabs | Ifrit | Zephyr

┌──(4mrkali)-[~]
└─$ nmap -sV --script=vuln target
Scanning...
About
Who I Am

I'm Amr En-Niari, an Offensive Security Consultant based in Rabat, Morocco. I specialize in penetration testing and red team operations, with deep expertise in Active Directory exploitation, malware development, and evasion techniques.

With a State Engineering degree in Computer Science from ENSA Tangier and multiple advanced certifications, I've dedicated my career to assessing the strength of digital infrastructures. I identify critical vulnerabilities that help organizations protect their most sensitive assets.

Currently at Nearsecure, I execute pentest and red team engagements for clients across banking and critical infrastructure, developing custom offensive tools and delivering actionable security assessments.

3+
Years Experience
7
Certifications
#1
Morocco — SIT Africa
1%
Worldwide — TryHackMe
Experience
Where I've Worked
Nearsecure Sep 2023 — Present
Offensive Security Consultant · Rabat, Morocco
  • Execution of penetration testing and red team engagements for banking and critical infrastructure clients
  • Design and development of advanced offensive tools for intrusion testing and red team operations
  • Analysis and writing of detailed technical reports with business-impact risk assessments
  • Coordination of operations based on elaborate attack scenarios tailored to each target
  • Development of custom C2 frameworks and evasion tooling to bypass EDR/AV solutions
  • Management of offensive projects and preparing debriefing meetings with clients
  • Conducting presentations on labs and recent vulnerabilities with live demonstrations
Freelance Part Time
Penetration Tester · Rabat, Morocco
  • Black-box, white-box, and grey-box penetration tests on web applications, networks, and infrastructure
  • Social engineering and phishing simulations to assess human factor vulnerabilities
  • Custom scripts and tools development to automate testing processes
  • Post-exploitation activities including privilege escalation and lateral movement
Nearsecure Feb 2023 — Sep 2023
Jr Offensive Security Intern · Rabat, Morocco
  • Developed a C2 framework to bypass Kaspersky, Windows Defender, and Sophos EDR
  • Active Directory and infrastructure attack execution
  • Designed and developed CTF exercises to train team members
Certifications
Credentials
CRTE
Certified Red Team Expert
Altered Security
↗ Verify Credential
CRTL
Certified Red Team Lead
Zero-Point Security
↗ Verify Credential
CRTO
Certified Red Team Operator
Zero-Point Security
↗ Verify Credential
C2 Dev
C2 Development with C#
Zero-Point Security
HTB APTLabs
Pro Lab — APTLabs
Hack The Box
HTB Zephyr
Pro Lab — Zephyr
Hack The Box
HTB Ifrit
Pro Lab — Ifrit
Hack The Box
Pro Lab Certificates
☠️ APTLABS Feb 2026
Hack The Box Pro Labs: APTLabs
Advanced Active Directory, Multi-Forest Exploitation, APT Simulation, Phishing, Custom Malware Deployment, SCCM Abuse, Trust Exploitation, EDR Evasion
40 CPE Credits · 40 Hours
🔥 IFRIT 02 Feb 2026
Hack The Box Pro Labs: Ifrit
Network & AD Enumeration, Active Directory & Custom Exploitation, Lateral Movement across multiple Forests, Bypassing EDR Solutions, Relay Attacks, Operating Covertly
40 CPE Credits · 40 Hours · HTBCERT-484F812796
💨 ZEPHYR 19 Apr 2023
Hack The Box Pro Labs: Zephyr
Enumeration, Relay Attacks, Pivoting, SQL Attacks, Password Cracking, Privilege Escalation, Web Application Attacks, AD Exploitation, Crossing Trust Boundaries
40 CPE Credits · 40 Hours · HTBCERT-1044581000
Arsenal
Technical Skills
⚔️
Offensive Security
Red Teaming Vulnerability Assessment Exploit Development Social Engineering Post-Exploitation Privilege Escalation Lateral Movement AD Attacks MITM
🦠
Malware Dev & Evasion
Custom Malware EDR/AV Bypass Process Injection API Re-implementation Code Obfuscation XOR / RC4 Encoding Shellcode Dev
🌐
Network & Infrastructure
Network Recon VLAN Hopping NAC Bypass Proxy Pivoting Wireshark Firewall Evasion SSH Tunneling DNS Tunneling
🔓
Web Application Security
OWASP Top 10 SQL Injection XSS Auth Bypass Burp Suite JWT Manipulation OAuth 2.0 REST API Testing
Projects
What I've Built
Offensive Tool
Custom C2 Framework
Modular Command & Control framework for managing remote agents during red team engagements. Features encrypted communication channels and advanced evasion techniques to bypass Kaspersky, Windows Defender, and Sophos EDR. Supports msfconsole payload generation and flexible command execution.
C#C/C++EncryptionProcess InjectionEDR Bypass
Red Team Suite
Red Teaming Toolkit
Suite of custom red teaming tools for internal and external penetration tests. Includes custom scanners, privilege escalation scripts, lateral movement utilities, and post-exploitation modules optimized for stealth with advanced evasion via API hooking and encrypted payload delivery.
PythonPowerShellAPI HookingPayload Encryption
Achievements
Competition Results
🥇
1st Place
INPT CTF 2024
🥇
Top #1 Morocco
SIT Africa 2023
🌍
Top #69 Africa
picoCTF 2022
🏆
Top 1% Worldwide
TryHackMe 2023
💀
Elite Hacker
Hack The Box
Platform Profiles
💀
Hack The Box
@4mr
🎯
TryHackMe
@4mr
Education
Academic Background
ENSA — National School of Applied Sciences 2018 — 2023
State Engineer in Computer Science · Tangier, Morocco
  • Specialization: Computer Engineering and Networks
Contact
Let's Work Together
Looking for an experienced offensive security consultant for your next penetration test, red team engagement, or security assessment? I'm available for freelance projects and consulting work across Europe and Morocco.