# $ whoami

Eslam Kamal

33xCVE | CARTP | CRTE | CRTP | eWPTX | eCPPT | eJPT

Analytical Penetration Tester with over 3 years of hands-on experience in various domains such as Web, Network, Cloud, and IoT pentesting. Strong knowledge of network architectures, operating systems, and cybersecurity tools. Confident and communicative professional proficient in scripting paired with familiarity with Unix and Windows. A collaborative team player committed to working with businesses and organizations to identify and resolve security vulnerabilities and weaknesses affecting digital assets and computer networks.

Acknowledged by:

* [Lenovo](https://files.gitbook.com/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNXCJWNoU0PexwJ6yBpmG%2Fuploads%2FzhG5j7OZ7zvoJsC7Oz5K%2Flenovo-ack.jpg?alt=media\&token=42937586-91a5-406c-98ce-19976930ff42)
* IBM
* [Nvidia](https://www.nvidia.com/en-us/security/acknowledgements/)
* [Dutch Judiciary](https://www.linkedin.com/posts/eslam-kamal_hackeronereport-dutch-writeups-activity-7016052578421497856-nP4O?utm_source=share\&utm_medium=member_desktop)
* [Deutsche Telekom](https://www.telekom.com/en/corporate-responsibility/data-protection-data-security/security/details/acknowledgements-358300)
* [Drexel University](https://files.gitbook.com/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNXCJWNoU0PexwJ6yBpmG%2Fuploads%2Fnm0hLJjRdvNL0qH0SIuP%2Fzxy.png?alt=media\&token=f1a90e2d-1f15-4aca-a352-082b3bdd0548)
* Costco
* Mondelēz International
* [Solaredge](https://www.solaredge.com/bug-bounty-leaderboard)
* [University of Cambridge](https://files.gitbook.com/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FNXCJWNoU0PexwJ6yBpmG%2Fuploads%2Fca5CsM05ESaAZCs34TTa%2FUniversity%20of%20Cambridge%20ACK.png?alt=media\&token=24001036-52f8-411d-9cab-5e72ead00495)
* [APNIC](https://www.apnic.net/community/security/apnic-vulnerability-reporting-program/)

And many other companies around the world for finding security vulnerabilities with different severities in their systems.

### Social Links

* [Facebook](https://www.facebook.com/StrikerHacker33/)
* [Linkedin](https://www.linkedin.com/in/eslam-kamal/)
* [Twitter](https://twitter.com/xxEslam_Kamalxx)
* [Github](https://github.com/strik3r0x1)


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://strik3r.gitbook.io/strik3r-blog/usd-whoami.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
