Adam El Adeb
3A40 F380 0ADF E5EA AA9D 3AFB 3343 11D2 6376 A91C
vulnerability researcher

Adam El Adeb

Vulnerability Researcher & Security Engineer

Security researcher with deep focus on AI-assisted vulnerability detection. Engineered custom reverse engineering models to automate defect discovery in compiled binaries.

Work has directly contributed to securing the internet ecosystem, including 4 confirmed vulnerabilities in Google Open Source projects and multiple critical severity CVEs in Industrial Control Systems. Helped more than 400 companies secure their data.

400+companies secured
4Google OSS findings
2CISA ICS advisories
2published posts
core expertise
AI in Cybersec
Reverse Engineering
Vulnerability Research
Web Penetration
Malware Analysis
Incident Response
verified certifications 9 credentials
Play It Safe: Manage Security Risks Google
Intro to Computers, OS, and Security Microsoft
Introduction to Cybersecurity Essentials IBM
Connect and Protect: Networks Security Google
Cybersecurity Tools & Cyberattacks IBM
Cybersecurity Concepts Packt
Vulnerability Types and Concepts Packt
Cybersecurity Incident Response and Communication Packt
CompTIA CySA+ (CS0-003) Packt
security research & findings
ICS · RCE
CISA ICS Advisories

Discovered and disclosed two critical vulnerabilities in Industrial Control Systems, acknowledged by CISA.

  • CVE-2026-21410 Critical
  • CVE-2026-22553 High
OSS
Google OSS Security

Identified 4 distinct vulnerabilities in Google's Open Source Software ecosystem. Coordinated with maintainers to patch and verify all fixes.

AI-Driven Reverse Engineering

Developed a proprietary AI model for static binary analysis, significantly reducing time to identify buffer overflows and logic errors in compiled code.

Automated Penetration Testing Framework

Engineered a scalable framework integrating custom exploit chains and reporting tools to streamline vulnerability validation across large enterprise networks.

CTI Aggregation Platform

Built a centralized Cyber Threat Intelligence platform aggregating real-time IOCs from multiple feeds, with automated correlation and threat scoring for SOC teams.

Advanced Malware Research (PoCs)

Developed PoC samples to study advanced evasion techniques and EDR bypass methods. Research focuses on defensive countermeasures and behavioral analysis signatures.

writingarchive →
How Windows Delivery Optimization's Trust Chain Can Be Broken Before It Starts Windows Internals
Mar 10, 2026
How Windows Delivery Optimization's Trust Chain Can Be Broken Before It Starts Windows Internals
Mar 10, 2026