Skip to content
View lawbyte's full-sized avatar
🏠
Working from home
🏠
Working from home

Highlights

  • Pro

Organizations

@seccodeid @sksd-id

Block or report lawbyte

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
lawbyte/README.md

Azka Ainul Ma’arij

Offensive Security Engineer | Senior Security Consultant | Mobile Security Specialist

Security with Vantage Point | CTF with r3kapig, SKSD, PETIR


πŸš€ About Me

I am an Offensive Security Consultant specializing in advanced penetration testing across:

  • 🌐 Web Applications
  • πŸ“± Mobile (Android & iOS)
  • πŸ”Œ APIs (REST & GraphQL)
  • 🏦 Financial Infrastructure
  • 🏭 SCADA / OT Environments
  • 🧠 Active Directory & Red Teaming

I operate at the intersection of real-world adversarial simulation, exploit development, and deep technical research.


🏒 Current Role

Senior Security Consultant β€” Vantage Point Security

At Vantage Point Security, I conduct enterprise-grade offensive security assessments for high-profile organizations, particularly within the financial sector.

My work includes:

  • Advanced web, API, and mobile penetration testing
  • Chained exploitation & realistic adversary simulation
  • Active Directory & infrastructure compromise scenarios
  • Custom exploit tooling & research-driven attack methodologies
  • Delivering executive-level risk reporting with technical depth

I operate at the intersection of offensive research and enterprise defense β€” helping organizations identify critical weaknesses before real attackers do.


πŸ† Competitive Highlights

  • πŸ₯‡ 1st Place β€” Standoff 16 (Real-World SCADA Cyber Battle) – r3kapig
  • πŸ† 6th Place β€” Black Hat MEA 2025 – PETIR
  • 🏁 Finalist (12th) β€” Black Hat MEA 2024 – PETIR
  • 🌏 1st Place β€” Cyber Jawara International 2024
  • πŸ₯‡ 1st Place β€” CTF - GEMASTIK 2025 – PETIR
  • πŸ’Ό HTB Business CTF 2024 – 13/943 Companies (1st SEA, 3rd APAC) - Vantage Point

Competing at international scale, simulating real industrial systems and enterprise environments.


πŸ› οΈ Professional Focus

Offensive Security

  • Advanced Web & API Exploitation
  • Android Reverse Engineering & Dynamic Instrumentation
  • Mobile App Security (OWASP MASVS aligned)
  • SCADA / Industrial System Attack Simulation
  • Active Directory Abuse & Post-Exploitation

Research & Exploit Engineering

  • Binary Reverse Engineering
  • Custom Exploit Development
  • Cryptographic Analysis
  • Security Bypass Techniques

Tooling

Python Frida IDA Pro Ghidra Burp Suite Metasploit BloodHound Wireshark Docker, etc...


πŸ“± Hack The Box β€” Mobile Challenge Author

I work part-time with Hack The Box designing realistic, production-grade mobile security challenges.

Focus areas:

  • Android exploitation
  • Reverse engineering
  • Bypass techniques
  • Real-world adversarial simulations
  • Advanced mobile attack chains

πŸ“œ Certifications

  • OSCP+
  • CREST CRT
  • CREST CPSA
  • Burp Suite Certified Practitioner
  • Certified eXpert Mobile Application Pentester (CXMAP)
  • Certified Android Penetration Tester (CAPT)

🌍 Community & Leadership

  • Organizer β€” Hack The Box Indonesia
  • International competitor β€” r3kapig
  • University team member β€” PETIR
  • Speaker & Trainer in offensive cybersecurity events

⚑ Current Interests

  • Advanced mobile exploitation research
  • SCADA / OT offensive simulations
  • CTF infrastructure & challenge development
  • Offensive automation tooling

🀝 Let's Connect


"Offense drives defense. Adversarial thinking builds resilient systems."

Pinned Loading

  1. Active-Directory-Exploitation-Cheat-Sheet Active-Directory-Exploitation-Cheat-Sheet Public

    Forked from S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet

    A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.

  2. avs avs Public

    APK Vulnerability Scanner (AVS)

    Python 3 1

  3. Android-Protection-Bypass-Stuff Android-Protection-Bypass-Stuff Public

    Forked from WangChongwen-me/Android-Protection-Bypass-Stuff

    Android Protection Bypass Stuff that I compiled from few resources.

    JavaScript

  4. jwt-lab jwt-lab Public

    Python