Just a small intro

Welcome to my world

Disclaimer: I never engage in any activity that would violate any law. If you system have been compromised you must report it to the legal authorities.


Hi, I’m Mashal Buhamad, an independent cybersecurity consultant (not associated with any vendor). After surviving a decade in the private and government sectors, I now spend my days making life exceptionally difficult for threat actors. With over 25 years in the trenches, I specialize in hardening infrastructure and pragmatically leveraging AI, despite my skepticism of it since i believe system’s admin need to have a solid grip on the basics not counting on AI to do the job.

From deep-dive penetration testing to architecting massive enterprise detection systems, I’ve helped organizations across the Gulf stay ahead of the curve. My approach to this work goes back to my days as a student in California, hitting the local computer shows. The vendors there had a simple, blunt rule: if you didn't have the money, they didn't have the time to argue. That 'show me the money' attitude taught me a valuable lesson that defines my career today. I have zero patience for big talk, theoretical pitches, or corporate pageantry. You can keep the nice group pictures. My philosophy is simple: show me how it works.

When I’m not hunting threats or demanding tangible results, you’ll find me chasing signals on the amateur radio bands - legally over echo link or FT-8 from the internet- I have the highest FCC license but have been rejected two times by CITRA (the local authority). My passion for RF engineering started during the recent geopolitical tension and my realization for the need for indecent communication capabilities.


Wall of Shame
Cyber Criminals

Well, these are the IP trying to hack into my network. All have been logged, Blocked, and Going to be reported.

109.70.100.12 2026-05-20T02:29:56
💣 /admin
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like
66.249.72.40 2026-05-20T01:44:51
💣 /sigintel/media/images/
Mozilla/5.0 (Linux; Android 6.0.1; Nexus 5X Build/MMB29P) AppleWebKit/537.36 (KH
164.92.212.216 2026-05-20T01:06:04
💣 /backup/
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko)
35.252.199.249 2026-05-19T22:21:22
💣 /backup/
Mozilla/5.0 (Linux; Android 12; Pixel 6) AppleWebKit/537.36 (KHTML, like Gecko)
35.252.199.249 2026-05-19T22:21:22
💣 /private/
Mozilla/5.0 (Linux; Android 12; Pixel 6) AppleWebKit/537.36 (KHTML, like Gecko)
4.205.9.198 2026-05-19T20:13:23
💣 /admin/controller/extension/
Go-http-client/2.0
146.174.160.166 2026-05-19T14:20:43
💣 /private/
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:127.0) Gecko/20100101 Firefox/127.0
5.255.122.18 2026-05-19T11:27:03
💣 /private/
DuckDuckBot/1.1; (+http://duckduckgo.com/duckduckbot.html)
5.255.122.18 2026-05-19T11:27:03
💣 /backup/
Mozilla/5.0 (compatible; DeepSeekBot/1.0; +https://www.deepseek.com/bot)
14.231.108.188 2026-05-19T10:33:40
💣 /backup/
Mozilla/5.0 (Macintosh; Intel Mac OS X 14.5; rv:127.0) Gecko/20100101 Firefox/12

Why work with me

Trusted Cybersecurity Consulting Solutions

Expertise

I bring deep knowledge and hands-on experience in IT and cybersecurity consulting, offering strategic and effective solutions tailored to each client's unique needs.

Innovative solutions

I stay on top of the latest trends and technologies in the industry, bringing innovative solutions that help my clients stay ahead of the curve.

Security & reliability

I prioritize security and reliability in every solution I deliver, ensuring that my client's data and systems are protected and consistently available.

My recent contributions

AI & Cybersecurity Portfolio

My reading side

Personal Library Collection

Outside the realms of cybersecurity and AI, I find inspiration in books. Here are a few random titles from my personal collection.

I finished reading 208 books and keep reading.
قصة مدينتين
قصة مدينتين
تشارلز ديكنز
الأحلام بين العلم والعقيدة
الأحلام بين العلم والعقيدة
علي الوردي
من قتل الإبداع ؟
من قتل الإبداع ؟
أندرو جرانت, جايا جرانت
‏همس النجوم :‏
‏همس النجوم :‏
نجيب محفوظ
حرب الكلب الثانية
حرب الكلب الثانية
إبراهيم نصرالله
State of Terror
State of Terror
Hillary Rodham Clinton
كيف نفكر؟ دليل البقاء على الحياة لعالم مختلف أو دليل الحائرين
كيف نفكر؟ دليل البقاء على الحياة لعالم مختلف أو دليل الحائرين
الآن جاكوبس
اعترافات قاتل اقتصادي
اعترافات قاتل اقتصادي
جون بيركنز

Kuwait weather

5-Day Forecast · Kuwait Meteorological Department
Warning
HF Propagation · 9K2 · NOAA SWPC
--
K-index
--
A-index
--MHz
LUF
--MHz
MUF
--
HF Cond.

Contact me

Secure Communication Channel
⚡ 0 blocked
Mashal Buhamad
Busy but my kids believe i'm not busy
Mashal Buhamad
Independent Cybersecurity Consultant

Please don't contact me if you are seeking information. Google might be more helpful.

25+
Years exp.
Infra & AI
Focus area
Threat Atlas
Key project