About
Omar Amir Fahim
Cybersecurity Student | Pentesting & Network Security | CCNA Certified
I am a Cybersecurity student at Asia Pacific University (APU) with a focus on offensive security, penetration testing, and network analysis. My journey is driven by a deep interest in identifying vulnerabilities and understanding the attack methodologies that shape the modern threat landscape[cite: 2].
Technical Arsenal
Security & Pentesting
- Operating Systems: Kali Linux[cite: 2]
- Tooling: Burp Suite, Nmap, Wireshark, Cheat Engine[cite: 2]
- Methodologies: Web Application Security, Vulnerability Assessment, Reverse Engineering (IL2CPP/Memory Analysis)[cite: 2]
Networking
- Certification: CCNA (Switching, Routing, and Wireless Essentials)[cite: 2]
- Concepts: TCP/IP & OSI Model, Packet Inspection, Network Infrastructure Security[cite: 2]
Key Projects & Impact
TEDxAsia Pacific U | Lead Curator & Tech Team
- Lead Curator: Designing speaker evaluation frameworks and managing curation workflows for high-impact talks[cite: 2].
- Tech Innovation: Independently developed a custom HTML-based teleprompter with auto-scroll and speaker-specific scripts to support live delivery[cite: 2].
Reverse Engineering & Development
- Game Security: Analyzed runtime memory structures and modified values for Pixel Worlds using memory forensics[cite: 2].
- Backend Scaling: Refactoring a Discord bot backend that processes approximately 3 million records to optimize performance and data structure[cite: 2].
Competitions & Community
- Bingo CTF 2025: Achieved 26th place with team dehashed, solving challenges in Web, Forensics, Pwn, and RE[cite: 2].
- Active Learner: Regularly attending deep-dive sessions including Bug Bounty Hunting (BarqSec), Memory Forensics (APU FSEC), and Heap Exploitation (Kaspersky Cyber Fest)[cite: 2].
Education
- BSc (Hons) in Computer Science (Cybersecurity)
- Asia Pacific University (APU) & De Montfort University (Dual Award)[cite: 2]
- Expected Graduation: March 2028[cite: 2]
“Just documenting the learning journey. This blog serves as a repository for my technical findings, lab write-ups, and security research.”