Skip to main content

About

Table of Contents

Introduction
#

Taha Marouani, a persistent, serious and ambitious Telecommunications Engineering student.
A self-learner who’s dedicating his time to focus on what really matters: Touching grass, making a change, and developing a solid career.
Armed with passion for Cybersecurity, Philosophy and Books, I’m finding my purpose through this non-sense by learning.

Academic Journey
#

  1. Engineering Degree in Telecommunications

    2024-2027

    With a strong focus on Signal Processing, Telecommunications, and Physics, I study the engineering principles behind how information is transmitted, processed, and received, contributing to the advancement of modern communication infrastructures.
    Operating Systems
    Linux
    Cisco Packet Tracer
    Huawei eNSP
    Bash
    radio_signal [#1026]Created with Sketch.Networking
    C
    C++
    C#
    .NET
    Node.js
    Next.js
    React
  2. National Entrance Exams for Engineering School

    2024-2027

    As a PTSI student within the CPGE program, I underwent an intensive and rigorous scientific training focused on mathematics, physics, and engineering sciences. This was a very rewarding journey as it enhanced my analytical thinking, problem-solving abilities, and capacity to work under pressure (lots of pressure), all while building a solid foundation for advanced studies in engineering having the most important skills as an engineer.
    Physics
    Maths
    Chemistry
    Machanics
    Electronics
    Python
    Problem Solving
    Critical Thinking
    Engineering
    Work under pressure
  3. Baccalaureat Degree

    2020

Technical Experience
#

  1. Cybersecurity Internship - Biat IT

    Summer 2025

    • Created an on-premise Open Source SOC Lab: Wazuh, TheHive, MISP, Cortex.
    • Automated the deployment of different components using Docker containers.
    • Reviewed and enhanced Threat Intelligence reports of previously filtered incidents.
    • Studied and analyzed XDR/NDR logs to trace lateral movement attempts.
    • Analyzed recent severe alerts and enhanced the final provided report.
    • Performed a Threat Hunt based on traces from a critical recent incident.
    SOC
    Firewall
    Wazuh
    IDS
    179IPS
    The Hive
    MISP
    Cortex
    SIEM
    SOAR
    Icon_24px_MicrosoftAd_ColorActive Directory
    Windows
    Threat Hunting
    Threat Intelligence
    Security Operations
    logsLog Analysis
  2. Malware Analysis Project

    November - April 2025

    • Created an on-premise and cloud Malware Analysis Lab.
    • Analyzed Zeus Trojan - Banking Version and WannaCry Ransomware.
    • Performed Static and Dynamic analysis on different samples.
    • Reverse Engineered multiple samples and classified differences in tradecraft.
    • Replicated malware behavior and re-created their base source codes.
    • Researched coverd evasion techniques and tactics and mapped them to MITRE IDs.
    Malware Analysis
    Reverse Engineering
    Binary Analysis
    Static Analysis
    Dynamic Analysis
    Assembly (x86)
    Windows PE
    ionicons-v5-iAnti-Debugging & Evasion
    radio_signal [#1026]Created with Sketch.C2 Communication
    Wireshark Logo IconThis is shape (source) for Clarity vector icon theme for gtkWireshark
    ProcMon
    IDA / Ghidra
    MITRE ATT&CK Mapping
    Trojan
    Ransomware
  3. Shortcodes

    AWESOME

    With other shortcodes

CTFs and Ranking
#

HackTheBox Profile
#

Since Summer 2025, I started seriously and methodologically attacking HackTheBox Labs and sherlocks.
You can find my profile stats down below.

avatar

EvilSamirLoussif

Hacker · Tunisia
mini avatar
EvilSamirLoussif
EU Machines 3
Profile ↗
32 Roots
34 Users
801 Global
155 Points
0 Bloods
Hacker 37.8% Pro Hacker

CTFTime Profile
#

I’m a part of Curiosity, a Tunisian CTF Team formed by July 2025.
Currently, we’re ranked Tunisia’s Top 1 and 262nd Globally.

I currently focus on:

  • DFIR
  • Reverse Engineering
  • and some Binary Exploitation tasks.

You can view my CTFTime Profile Here .

There are no articles to list here yet.