Hi, I’m Jad Mayouf

I’m a cybersecurity student at the University of South Florida with a strong focus on problem-solving across systems, networks, and applications. My interests range from malware understanding, detection techniques, intrusion detection, and analysis to reverse engineering. I’ve been exploring defensive and offensive security since I was as young as 13 years old therefore it was natural for my to study Cybersecurity, beginning with jailbreaking my PlayStations and phones, and I continue to refine my skills through studying, projects and Capture The Flag competitions.

USF Capture The Flag Event

Current leaderboard placement in the Meta Capture the Flag event hosted for all students at the University of South Florida. I am currently ranked sixth.

Meta Capture the Flag leaderboard highlighting Jad Mayouf in sixth place Capture the Flag challenge board showing recent problems

Projects

Raspberry Pi Secure Web Gateway

Raspberry Pi Mitmproxy Linux Alerting VirusTotal API Python Code

This project transforms a Raspberry Pi into a transparent Secure Web Gateway (SWG). The Pi intercepts HTTP/HTTPS downloads, identifies potentially risky file types (executables, archives, scripts, etc.), and automatically queries VirusTotal. If a file is flagged by any engine as malicious or suspicious, the download is blocked in real time.

Undetected Windows Reverse Shell - Live Demo and Mitigations.

Malware Analysis Detections Windows Internals Sandboxing Memory Network Forensics Code

This is a controlled, educational reverse-shell demonstration run inside isolated VMs. I showcase how malware can evade Windows Defender in this case and why. I then test this malware against my own Secure Web Gateway to see if it can evade it and why not if it can not.

Video Game Hacking and Kernel Level Anti-Cheats

Python Memory Forensics Direct Memory Access Reverse Engineering Detections IDA Pro Cheat Engine Code

This project is to feed my curioisty of learning how video game cheats work. The research involved includes understanding memory, how its read and how to write to it. It also taught me reverse engineering to find the values needed in memory. Finally, a major part was learning how to stay undetected when reading and writing the memory of a program protected at the kernel level.

Video Game Hacking Part 2 - User Mode Anti-Cheat Bypass

Windows Driver Dev Kernel Bypass Reverse Engineering Detections

Coding a Windows kernel driver to bypass a user-mode anti-cheat, with a focus on testing, debugging, and detection signals. This is my first project that taught me everything I know about video game hacking.

Home Lab WIP — Wazuh + Sysmon + Reverse Shell Tests

Wazuh Ubuntu Server Windows VM Sysmon Detection Lab

Building a home lab: Wazuh on Ubuntu, a Windows VM agent with Sysmon for telemetry analysis, and my reverse shell as the test sample to measure detections and tune rules. Work in progress.

Resume

View Resume

Contact

Email: jadmayouf@usf.edu

Phone: 813-557-6764