[ 0.001] BIOS v2.6.1 — Initializing security modules... [ OK ]
[ 0.142] Loading offensive security toolkit... [ OK ]
[ 0.389] Mounting certificates: eJPTv2, CRTA, Web-RTA... [ OK ]
[ 0.612] Starting Red Team Research environment... [ OK ]
[ 0.841] Welcome, operator. Identity confirmed. [ OK ]
SHIKHALI JAMALZADE
// Red Team Researcher · Security Tool Developer · Baku, AZ

16-year-old offensive security researcher and tool developer. Graduate of MilliSec LLC's intensive cybersecurity program. Holder of eJPTv2, CRTA, and Web-RTA certifications. Builder of GOD'S EYE, RedSEC, XSSSlayer, and CJ-SCANNER. Currently targeting a full scholarship in Cyber Security Engineering at TalTech.

Baku, AZ MilliSec LLC Graduate eJPTv2 · CRTA · Web-RTA · AD-RTS · MCRTA github.com/alisalive
5 CERTS EARNED
5+ TOOLS BUILT
16 YEARS OLD

skill_matrix.json

OFFENSIVE SECURITY
AD Attacks Kerberoasting DCSync Pass-the-Hash Web App Pentesting SSRF XXE SQLi JWT Attacks Privesc Linux Privesc Windows Docker Pivoting
TOOLS & PLATFORMS
Metasploit Burp Suite Nmap BloodHound Impacket CrackMapExec Mimikatz TryHackMe HackTheBox VulnHub nuclei ffuf subfinder hydra SEC
DEVELOPMENT
Python Security Automation Bash PowerShell Pydantic Click Jinja2 PyYAML Git GitHub Actions CI/CD Claude API
LANGUAGES
Azerbaijani — Native Turkish — Native English — Professional

certifications.log

// EARNED
eJPTv2
INE / eLearnSecurity — Earned during MilliSec LLC training program. First certification.
EARNED
CRTA
CyberWarFare Labs
EARNED
Web-RTA
CyberWarFare Labs
EARNED
AD-RTS
CyberWarFare Labs — Advanced Active Directory Red Team Specialist
EARNED
MCRTA
CyberWarFare Labs — Multi-Cloud Red Team Analyst
EARNED
// PLANNED
CPTS
Hack The Box
PLANNED
OSCP
Offensive Security
PLANNED
CRTO
Zero-Point Security
PLANNED

projects.sh --list

RedSEC
→ GitHub

Red team log aggregation and correlation tool with MITRE ATT&CK mapping and SEC integration. Parses 9 offensive tools (nmap/nuclei/ffuf/hydra/impacket...), YAML correlation rules, detection risk scoring (0.0–1.0), and exports to Risto Vaarandi's SEC format. 52 tests passing on Python 3.11/3.12. CI/CD via GitHub Actions.

Python MITRE ATT&CK SEC Integration Pydantic YAML Rules CI/CD MIT License
GOD'S EYE
→ GitHub

AI-powered Python pentesting orchestrator. Web fingerprinting, WAF detection, subdomain enumeration, CVE lookup, AD attack chain analysis, real IP behind CDN discovery, email harvesting, cookie security analysis, and HTML report generation. Claude AI integration. 189+ tests.

Python Claude API Recon OSINT CVE Lookup
XSSSlayer
→ GitHub

Automated XSS detection tool supporting reflected, stored, and DOM-based injection vectors. CLI interface with payload customization for targeted security assessments.

Python XSS Detection Web Pentesting Automation
CJ-SCANNER
→ GitHub

Clickjacking vulnerability scanner. Performs X-Frame-Options and Content Security Policy header analysis to identify framing vulnerabilities in web applications.

Python Web Security Header Analysis CLI Tool

experience.log

2025
Intensive Cybersecurity Training
MilliSec LLC — Baku, AZ
  • Advanced offensive curriculum: web attacks, Active Directory exploitation, network pentesting, and professional report writing.
  • CRTA exam chain: SSRF exploitation → privilege escalation → Docker pivoting → DCSync → Pass-the-Hash.
  • Web-RTA exam chain: JWT attacks, XXE, SSRF, and SQLi attack chains on authorized targets.
  • Produced professional pentest reports following OSCP, CREST, and OWASP methodologies.
2025 — Present
Independent Security Researcher
Bug Bounty (BugCrowd) / Open Source
  • Bug bounty hunting on BugCrowd targeting openai.com, engnovate.com, and millisec.edu.az.
  • Active Directory labs: TryHackMe Attacktive Directory, HackTheBox Silentium.
  • Built and open-sourced: RedSEC, GOD'S EYE, XSSSlayer, and CJ-SCANNER.
  • Target: TalTech Cyber Security Engineering — full merit scholarship application.

contact.sh --open

alisalive@kali:~$ cat interests.txt
Red team operations
Active Directory attacks
Security tool development
CTF competitions
AI-powered security automation
TalTech — Cyber Security Engineering

alisalive@kali:~$ cat status.txt
Open to collaborations.
Available for opportunities.
DM me. Let's break things.

alisalive@kali:~$