Hello! I’m Nour Issa, a hacker and Computer Security Researcher. This hub is a collection of my links, projects, and online presence. Explore and connect!

About

Background, interests, and how I approach work.

Focus Areas

Vulnerability research, reverse engineering, secure tooling, and adversarial simulation.

What I Value

Clarity in write-ups, reproducible research, mentorship, and shipping pragmatic results.

Recent Read

Systems security & memory corruption case studies — notes coming soon.

Toolbox

Python, C, GBD, WinDbg, Windows internals, Burpsuite, Mentiforce, AI.

About Me

I am a self-learned researcher and hacker, beginning my journey back in 2022. Since then, I've been learning and practicing as much as I can and will continue with the hopes of becoming great at what I do.

Building on this journey, I founded and lead the Spectra Vulnerability Research Group, where I apply my hands-on experience to offensive security and adversarial machine learning. Current work examines exploit development, malware design, and the integration of AI/ML into offensive capabilities — particularly how state-sponsored actors (APTs) leverage adversarial AI to refine intrusion methods, automate disinformation, and scale cyber operations.

Research extends into Neuropsychosocial Engineering, a developing framework on how AI-driven technologies reshape cognition, perception, and social behavior. This approach connects low-level technical exploitation with the broader human impact of emerging technologies.

Experience includes supporting criminal investigations through cyber intelligence analysis, threat hunting, and counterintelligence tasks, as well as contributing written research and commentary to the wider cybersecurity community. Past work spans vulnerability discovery, exploit chaining, malware development, and adversary emulation, with a long-term focus on understanding not only where systems break — but how those breaks affect human resilience.

Upcoming Projects

A glimpse at what’s on my bench.

DeepFake Technology Research Journal

A comrpehensive outlook to how deepfake technology will become the epitome of propaganda and social turmoil.

Binary Trace Visualizer

Interactive visualization for syscall & IPC flows with exportable graphs.

Firmware Sandbox

Emulated testbed for quick fuzz + diff testing across versions.

Exploit Dev Notes

Modern ROP/JOP chains index with tagged patterns, templates, and pitfalls.

Malware Zoo (Safe)

Static artifacts for education; automated detonation reports (no live samples).

Custom Shellcode Encoder & Decoder

A robust shellcode encoder and decoder framework designed to obfuscate payloads and bypass signature-based detection.

Completed Projects

A collection of past projects & research.

Sentinel

Sentinel is a defensive, cross-platform host monitoring tool that collects runtime state (processes, listeners, outbound connections, services, autoruns), compares to a saved baseline, and surfaces suspicious changes with severity scoring and a spinner-style CLI UI.

Learn more →

PocketVault

A fast, USB-friendly GUI tool for encrypting and decrypting your own files. Combines a static passcode + ephemeral session/auth code + a Fernet secret.key to ensure only authorized users can decrypt.

Learn more →

Exploit Dev Notes & Learning Framework

A Systematic approach housing resouces and learning material for the aspiring exploit developer in a unqiue RPG style.

Learn more →

Python to Exe Converter

A Python program that converts any Python .py file into a standalone Windows executable (.exe).

Learn more →

Exploiting Android MMI for OTP Interception

Researched Android MMI functionality to identify security gaps exploitable through targeted social engineering. In a controlled lab environment, simulated exploit chains capable of redirecting SMS and calls to demonstrate OTP interception risks for social media authentication. Findings underscored weaknesses in mobile communication systems and informed defensive strategies against MFA bypass techniques.

IoT Surveillance Exploitation Framework

Developed a research framework combining OSINT and targeted network reconnaissance to uncover systemic IoT and IP camera vulnerabilities.

Testimonials

What collaborators and clients have said.

“I've had the privilege of collaborating with Nour, and I can say with confidence that he is one of the most forward-thinking researchers I know.”
— Muhammad Izaz Haider, Founder of ThePentrix
“Nour has a strong motivation in systematically decreasing risk, which drives him to understand the nature and internals of every piece of technology.”
— Kein Tung, Founder & CEO of Mentiforce
“I have had the privilege of knowing Nour for some time now, and I can confidently say that he is one of the most hard-working, honest, and resilient individuals I have ever met.”
— Yousef Alkarnaz, Co-Founder of 5 Before 5 Solutions
1

Resources

Curated notes, readings, and miscellaneous links.

Go to Notes

Personal notes and research logs.

Visit Notes

Go to Readings

Recommended articles, papers, and references.

Visit Readings

Go to Misc

Other resources worth exploring.

Visit Misc

Contact

Reach out if you want to collaborate.

PGP

Fingerprint: dfc4dac57ddc62cc1275ad22965c7bae3e4cb7a1

Office Hours

Just ping me on LinkedIn.

Consulting

Not at the moment but soon!