Focus Areas
Vulnerability research, reverse engineering, secure tooling, and adversarial simulation.
Hello! I’m Nour Issa, a hacker and Computer Security Researcher. This hub is a collection of my links, projects, and online presence. Explore and connect!
Background, interests, and how I approach work.
Vulnerability research, reverse engineering, secure tooling, and adversarial simulation.
Clarity in write-ups, reproducible research, mentorship, and shipping pragmatic results.
Systems security & memory corruption case studies — notes coming soon.
Python, C, GBD, WinDbg, Windows internals, Burpsuite, Mentiforce, AI.
I am a self-learned researcher and hacker, beginning my journey back in 2022. Since then, I've been learning and practicing as much as I can and will continue with the hopes of becoming great at what I do.
Building on this journey, I founded and lead the Spectra Vulnerability Research Group, where I apply my hands-on experience to offensive security and adversarial machine learning. Current work examines exploit development, malware design, and the integration of AI/ML into offensive capabilities — particularly how state-sponsored actors (APTs) leverage adversarial AI to refine intrusion methods, automate disinformation, and scale cyber operations.
Research extends into Neuropsychosocial Engineering, a developing framework on how AI-driven technologies reshape cognition, perception, and social behavior. This approach connects low-level technical exploitation with the broader human impact of emerging technologies.
Experience includes supporting criminal investigations through cyber intelligence analysis, threat hunting, and counterintelligence tasks, as well as contributing written research and commentary to the wider cybersecurity community. Past work spans vulnerability discovery, exploit chaining, malware development, and adversary emulation, with a long-term focus on understanding not only where systems break — but how those breaks affect human resilience.
A glimpse at what’s on my bench.
A comrpehensive outlook to how deepfake technology will become the epitome of propaganda and social turmoil.
Interactive visualization for syscall & IPC flows with exportable graphs.
Emulated testbed for quick fuzz + diff testing across versions.
Modern ROP/JOP chains index with tagged patterns, templates, and pitfalls.
Static artifacts for education; automated detonation reports (no live samples).
A robust shellcode encoder and decoder framework designed to obfuscate payloads and bypass signature-based detection.
A collection of past projects & research.
Sentinel is a defensive, cross-platform host monitoring tool that collects runtime state (processes, listeners, outbound connections, services, autoruns), compares to a saved baseline, and surfaces suspicious changes with severity scoring and a spinner-style CLI UI.
Learn more →A fast, USB-friendly GUI tool for encrypting and decrypting your own files. Combines a static passcode + ephemeral session/auth code + a Fernet secret.key to ensure only authorized users can decrypt.
Learn more →A Systematic approach housing resouces and learning material for the aspiring exploit developer in a unqiue RPG style.
Learn more →A Python program that converts any Python .py file into a standalone Windows executable (.exe).
Learn more →Researched Android MMI functionality to identify security gaps exploitable through targeted social engineering. In a controlled lab environment, simulated exploit chains capable of redirecting SMS and calls to demonstrate OTP interception risks for social media authentication. Findings underscored weaknesses in mobile communication systems and informed defensive strategies against MFA bypass techniques.
Developed a research framework combining OSINT and targeted network reconnaissance to uncover systemic IoT and IP camera vulnerabilities.
What collaborators and clients have said.
“I've had the privilege of collaborating with Nour, and I can say with confidence that he is one of the most forward-thinking researchers I know.”— Muhammad Izaz Haider, Founder of ThePentrix
“Nour has a strong motivation in systematically decreasing risk, which drives him to understand the nature and internals of every piece of technology.”— Kein Tung, Founder & CEO of Mentiforce
“I have had the privilege of knowing Nour for some time now, and I can confidently say that he is one of the most hard-working, honest, and resilient individuals I have ever met.”— Yousef Alkarnaz, Co-Founder of 5 Before 5 Solutions
Curated notes, readings, and miscellaneous links.
Personal notes and research logs.
Visit NotesRecommended articles, papers, and references.
Visit ReadingsOther resources worth exploring.
Visit MiscReach out if you want to collaborate.
Email: spectra_vrg@protonmail.com
Fingerprint: dfc4dac57ddc62cc1275ad22965c7bae3e4cb7a1
Just ping me on LinkedIn.
Not at the moment but soon!