Tahar Amine ELHOUARI

Sr. Penetration Tester & Cyber Security Consultant

About Me

Hi, my name is Tahar Amine and I am a senior penetration tester and cyber security consultant. As well as ethical hacker, I also have multiple years of experience in the information security industry! I have worked at a number of companies in different information technology sectors gaining teamwork and leadership skills and experience. Although some of my qualifications include a couple of certifications of appreciation from tech giants through my security research, winning of many national and international hacking contests, and detailed & practical knowledge of security & hacking tools, technologies and best practices in both offensive and defensive sides. Well-known bug bounty hunter, who managed to identify and fix security issues concerning worldwide companies and agencies, some of them: Google, EC-Council, Microsoft, Intel, U.S Air Force, U.S Cyber Army, and more.

I am most skilled in: Penetration Testing & Vulnerability Assessment (VAPT) and Red Teaming

Projects & Publications

Cross Site Scripting ‘XSS’ in a Nutshell - Security Paper, published by the well known exploits and security papers archive: 'Exploit-DB' by OffSec 'Offensive Security, LTD'.

Details and Information to Share About Corona Virus (COVID-19)

https://telegra.ph/Details-and-Information-to-Share-About-Corona-Virus-COVID-19-05-08

This article contains different information that was mistaken by the Media and the NEWS worldwide concerning CoronaVirus (COVID-19).

Cybercriminalité la Sécurité de l’Information Sous la Loupe

https://www.algerie62.com/cybercriminalite-la-securite-de-linformation-sous-la-loupe/

The following article has been written by "Algérie62" (Algerian NEWS Website), during an interview at 'SECURA 2020 - International Safety & SecurityTradeshow in North Africa - The largest Safety & Security event in North Africa'.

Secondé par Tahar Amine El Houari, consultant dans le domaine de la sécurité informatique, revient dans quelques détails relatifs au domaine de la sécurité de l’information. « Il y’a très peu de gens et d’organismes qui connaissent vraiment l’importance de la sécurité de l’information. La sécurité de l’information, c’est la force de frappe de tous les pays et entreprises économiques et financière qui se protègent contre les attaques de toutes envergures ».

Awesome Curated List Of Environments And Platforms For Hacking And CTFs!

https://mrtaharamine.blogspot.com/2018/02/hacking-environments-and-platforms.html

Lot of people think that hacking and security is all about reading books and watching tutorials! But unfortunately that is completely wrong! Since, you are into a field related to IT you'll need to practice a lot. Practicing things you learn will develop your skills to the next level!

Top 10 Best Linux Distro Operating Systems For Ethical Hacking & Penetration Testing – 2020

https://gbhackers.com/top-10-penetration-testing-ethical-hacking-linux-distributions/

I created this article back in 2017 when I was a 'Security Blogger' at GBHackers. Today it is owned by them!

Cyber Security - Capture The Flag (CTF)

https://mrtaharamine.blogspot.com/2017/08/CTF.html

Cyber Security is a high priority of companies & governments. Cyber Attacks & Breaches have been on the rise in the last years. By that Security Professionals have been through rigorous training as how HACKERS are able to get into companies & govs infrastructures and how to defend against them.

SyntaxDB appeals to a wannabe programmer with its clean UI and simple usage. You just need to enter a language or a concept and SyntaxDB throws up the relevant answers.

Cross-site request forgery [CSRF], also known as “one-click attack” or session riding or Sea-Surf and abbreviated as CSRF or XSRF, is a type of malicious attack exploit of a website (“Web Application”); where unauthorized commands are transmitted from a user that the website trusts.

How to Hack - The Full Penetration Testing Process

https://www.cybrary.it/blog/0p3n/hack-full-penetration-testing-process/

Texas A&M University CTF (TamuCTF) event was really one of the best CTFs, most of the challenges are realistic and I like that. In this writeup we will see the solution of the best challenge of this whole CTF contest. Honestly, it was like a PenTest challenge and not just a simple CTF one.

Experience & Background

Micro Expert - Cyber Security

https://www.micro-expert.com/

Head of Cyber Security

January 2020 - Present

HackerOne

https://hackerone.com/

Security Researcher - Bug Bounty Hunter

November 2017 - Present

Strategic Business

Director of Information Technology & Security

May 2018 - Present

Cybrary

https://cybrary.it/

Cyber Security Teaching Assisstant

December 2019 - April 2020

Government Sector

CONFIDENTIAL

Cyber Security Specialist

February 2019 - October 2019

Divona & SLC (Smart Link Communication)

https://fr.wikipedia.org/wiki/Smart_Link_Communication

Chief of Cyber Security Projects

March 2018 - October 2019

Taghellist Technology

Lead Penetration Tester

April 2017 - May 2018

ILM Center

http://ilm-center.net/

Etthical Hacking Instructor

November 2017 - January 2018

Education

Ibn Rochd - High School

3rd Year (Final High School Year)

2015 - 2017

3rd Year - Scientific Student

A Little More About Me

Alongside my interests in computer science and ethical hacking, some of my other interests and hobbies are:

  • Business and Entrepreneurship
  • Photography & Photo Editing
  • Military, Army & National Security
  • Learning different stuff & Traveling
  • Sports & Martial Arts
  • Chess & Cars Racing
  • Guns & Knives