Skip to content
MA
Open to work

Hi, I'mMohammed AlYahya

Download CV

Security Lab

Interactive cybersecurity tools — 17 widgets across 5 domains. All client-side, no data leaves your browser.

3 Offensive 3 Defensive 4 Tools 4 Frameworks 4 Crypto

Designed & built by Mohammed AlYahya

Network Reconnaissance

> Network Reconnaissance Simulator

root@kali:~#
Click a preset or type a command to start scanning...
Web Application Attacks

> XSS Demonstration Sandbox

Try injecting HTML/JS into the search box below. The left panel shows vulnerable output, the right shows sanitized output.

VULNERABLE (innerHTML)
SANITIZED (textContent)
Mini CTF Challenge

> Mini CTF Challenge

The flag is hidden in the page source. Can you find it?

Email Threat Analysis

> Email Phishing Analyzer

Paste email headers below to analyze for phishing indicators.

Log Threat Detection

> Log Analyzer — Threat Detection

Security Headers Audit

> Security Headers Scanner

Subnet Calculator

> Subnet Calculator

CVE Lookup

> CVE Vulnerability Lookup

> Enter a CVE ID or click a famous vulnerability above

JWT Token Inspector

> JWT Token Decoder

Password Strength Analyzer

> Password Strength Analyzer

> Waiting for input...

STRIDE Threat Modeling

> STRIDE Threat Modeler

Select an asset type to generate a STRIDE threat model with recommended mitigations.

> Select an asset type above to begin threat modeling.

Incident Response (NIST 800-61)

> Incident Response Framework (NIST SP 800-61)

MITRE ATT&CK Skill Matrix

> MITRE ATT&CK Skill Matrix

Reconnaissance 90%
Initial Access 85%
Execution 80%
Persistence 75%
Privilege Escalation 88%
Defense Evasion 70%
Credential Access 82%
Discovery 90%
Lateral Movement 78%
Collection 72%
Exfiltration 65%
Impact 60%
Security Milestones

> Security Milestones

2023-01
Log4Shell Response
Led incident response for CVE-2021-44228 across 200+ servers
2023-06
PDPL Implementation
Implemented Saudi Personal Data Protection Law compliance framework
2024-01
ISO 27001 Audit
Conducted gap analysis and remediation for ISO 27001 certification
2024-06
NCA ECC Compliance
Achieved full compliance with NCA Essential Cybersecurity Controls
2025-01
Zero Trust Architecture
Designed and deployed zero-trust network segmentation
Encryption & Hashing

> Encryption & Hashing Playground

> Enter text above to see hashes and encodings

Caesar Cipher

> Caesar Cipher Encoder/Decoder

13
DNS Resolution

> DNS Resolution Visualizer

💻
Browser
🔍
Recursive
Resolver
🌐
Root
Server
🏢
TLD
Server
📋
Authoritative
Server
TCP/TLS Handshake

> TCP/TLS Handshake Visualizer

CLIENT
SERVER