Just a small intro

Welcome to my world

Disclaimer: I never engage in any activity that would violate any law. If you system have been compromised you must report it to the legal authorities.


Hi, I’m Mashal Buhamad, an independent cybersecurity consultant (not associated with any vendor). After surviving a decade in the private and government sectors, I now spend my days making life exceptionally difficult for threat actors. With over 25 years in the trenches, I specialize in hardening infrastructure and pragmatically leveraging AI, despite my skepticism of it since i believe system’s admin need to have a solid grip on the basics not counting on AI to do the job.

From deep-dive penetration testing to architecting massive enterprise detection systems, I’ve helped organizations across the Gulf stay ahead of the curve. My approach to this work goes back to my days as a student in California, hitting the local computer shows. The vendors there had a simple, blunt rule: if you didn't have the money, they didn't have the time to argue. That 'show me the money' attitude taught me a valuable lesson that defines my career today. I have zero patience for big talk, theoretical pitches, or corporate pageantry. You can keep the nice group pictures. My philosophy is simple: show me how it works.

When I’m not hunting threats or demanding tangible results, you’ll find me chasing signals on the amateur radio bands - legally over echo link or FT-8 from the internet- I have the highest FCC license but have been rejected two times by CITRA (the local authority). My passion for RF engineering started during the recent geopolitical tension and my realization for the need for indecent communication capabilities.


Wall of Shame
Cyber Criminals

Well, these are the IP trying to hack into my network. All have been logged, Blocked, and Going to be reported.

35.243.190.24 2026-05-20T21:51:34
💣 /backup/
Mozilla/5.0 (iPhone; CPU iPhone OS 16_7 like Mac OS X) AppleWebKit/605.1.15 (KHT
2602:fb54:1400::33 2026-05-20T08:06:15
💣 /service-account.json
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko)
2602:fb54:1400::33 2026-05-20T08:06:14
💣 /credentials.json
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:150.0) Gecko/20100101 Firefox/1
2602:fb54:1400::33 2026-05-20T08:06:13
💣 /serviceAccountKey.json
Mozilla/5.0 (X11; Linux x86_64; rv:150.0) Gecko/20100101 Firefox/150.0
2602:fb54:1400::33 2026-05-20T08:06:13
💣 /google-service-account.json
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:149.0) Gecko/20100101 Firefox/149.0
2602:fb54:1400::33 2026-05-20T08:06:13
💣 /firebase-service-account.json
Mozilla/5.0 (X11; Linux x86_64; rv:149.0) Gecko/20100101 Firefox/149.0
2602:fb54:1400::33 2026-05-20T08:06:12
💣 /secrets.json
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko)
109.70.100.12 2026-05-20T02:29:56
💣 /admin
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like
66.249.72.40 2026-05-20T01:44:51
💣 /sigintel/media/images/
Mozilla/5.0 (Linux; Android 6.0.1; Nexus 5X Build/MMB29P) AppleWebKit/537.36 (KH
164.92.212.216 2026-05-20T01:06:04
💣 /backup/
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko)

Why work with me

Trusted Cybersecurity Consulting Solutions

Expertise

I bring deep knowledge and hands-on experience in IT and cybersecurity consulting, offering strategic and effective solutions tailored to each client's unique needs.

Innovative solutions

I stay on top of the latest trends and technologies in the industry, bringing innovative solutions that help my clients stay ahead of the curve.

Security & reliability

I prioritize security and reliability in every solution I deliver, ensuring that my client's data and systems are protected and consistently available.

My recent contributions

AI & Cybersecurity Portfolio

My reading side

Personal Library Collection

Outside the realms of cybersecurity and AI, I find inspiration in books. Here are a few random titles from my personal collection.

I finished reading 208 books and keep reading.
دراسة في سوسيولوجيا الإسلام
دراسة في سوسيولوجيا الإسلام
علي الوردي
أبي.. أمي، نحن متهمون
أبي.. أمي، نحن متهمون
علي شريعتي
عداء الطائرة الورقية
عداء الطائرة الورقية
Unknown author
لا يكتب التاريخ مرة واحدة
لا يكتب التاريخ مرة واحدة
عبدالرحمن محمد الإبراهيم
مذكرات توماس راسل حكمدار القاهرة (1902-1946)
مذكرات توماس راسل حكمدار القاهرة (1902-1946)
Unknown author
عبدالكريم قاسم وعراقيون آخرون
عبدالكريم قاسم وعراقيون آخرون
عبداللطيف الشواف
قد تكون قصة حب
قد تكون قصة حب
Unknown author
أصول الإسلام الشيعي
أصول الإسلام الشيعي
سيد حسين محمد جعفري

Kuwait weather

5-Day Forecast · Kuwait Meteorological Department
Warning
HF Propagation · 9K2 · NOAA SWPC
--
K-index
--
A-index
--MHz
LUF
--MHz
MUF
--
HF Cond.

Contact me

Secure Communication Channel
⚡ 0 blocked
Mashal Buhamad
Busy but my kids believe i'm not busy
Mashal Buhamad
Independent Cybersecurity Consultant

Please don't contact me if you are seeking information. Google might be more helpful.

25+
Years exp.
Infra & AI
Focus area
Threat Atlas
Key project