Umair Sabir

Cyber Security Engineer · AirOverflow

Hi, I'm Umair Sabir.

I'm a Cyber Security Engineer at AirOverflow, where I run penetration testing engagements, build security tooling, and develop CTF challenges and platforms. My focus areas are offensive security — penetration testing, Active Directory, web, API, and network VAPT — alongside DFIR, security tool development, and AI-driven automation for security operations.

Areas of focus

Offensive security

Penetration Testing

External and internal engagements, web applications, APIs, and networks. End-to-end VAPT with clear, actionable reporting.

Red Team Operations

Adversary emulation, phishing campaigns, payload development, and full-chain intrusion exercises aligned with the MITRE ATT&CK framework.

Active Directory Security

Kerberos abuse, ACL chains, delegation attacks, BloodHound-driven path analysis, and AD hardening recommendations.

Cloud Security

Security assessments and configuration reviews across AWS and Azure — identity, networking, container, and Kubernetes attack surface.

Analysis & research

DFIR

Memory forensics, sandbox analysis, log review, and incident response support across Windows and Linux environments.

Malware Analysis

Static and dynamic analysis of malicious binaries, scripts, and document-borne payloads. Indicator extraction and behavioural reporting.

Reverse Engineering

Binary analysis with IDA, Ghidra, WinDbg, and x64dbg. Used in vulnerability research, malware work, and CTF challenge design.

Exploit Development

Windows-focused exploit development — custom shellcode, SEH overwrites, and ROP chain construction. Currently pursuing OSED.

Building & operating

Security Tool Development

Building and maintaining open-source offensive and defensive tooling in Python, Bash, and C — see the projects page.

AI Automation & Workflows

Designing AI-driven workflows for security operations and analysis — OpenCLAW, n8n, and custom automation for triage and reporting.

CTF Design & Platforms

Designing Jeopardy-style CTF challenges across pwn, web, crypto, and forensics, and building the lab and scoring infrastructure that hosts them.

Security Training & Mentorship

Practical penetration-testing workshops and team mentorship — including under the Ignite program and across competitive CTF teams.

Background

Education
MS, Cyber Security · Air University
Certifications
OSCP · CRTO · eCPPT
In progress
OSED — Windows exploit development
Languages
Python · Bash · C · ASM (x86/x64)
Tooling
OpenCLAW · n8n · BloodHound · Burp Suite
Location
Islamabad, Pakistan · UTC +05:00

Selected achievements

2024
National Cyber Security Champion — Ignite (Ministry of IT)
2024
Hackmasters'24 — Winner, OIC CTF (Istanbul)
2024
BlackHat MEA '24 — Finalist (Riyadh)
2023
National Cyber Security Champion — Ignite (Ministry of IT)
2023
MCS CTF '23 — Winner
2022
National Cyber Security Champion — Ignite (Ministry of IT)
20+ national hackathon & CTF wins

About this site

A central place for my work, writing, and projects. New posts go up when I have something useful to share. For collaborations, consulting, or just to say hello, the easiest way to reach me is by email or LinkedIn.