I am Sofiene Hamzaoui, a Tunisian engineer with over 20 years of experience spanning cybersecurity, AI engineering, hardware debugging, and system optimization. Known online as sniper4u2, B13, or spaypeur, I specialize in:
- Advanced Pentesting: Breaking systems to make them bulletproof.
- AI Optimization: Running large models on constrained hardware.
- Hardware Hacking: Reverse-engineering firmware and debugging embedded systems.
- Cyber Defense: Securing critical infrastructure against advanced threats.
I’ve worked with cyber defense agencies, simulated SS7 attacks, reverse-engineered STM32 firmware, and developed cutting-edge tools like AIPenetraGuard. Whether tackling Pegasus-class spyware, optimizing CUDA workloads, or tuning Kali Linux, I thrive at the bleeding edge of technology.
-
Low-VRAM LLM Optimization:
- Ran Qwen-14B on a 4GB GPU using offloading, paged memory tricks, and CUDA tuning.
- Achieved 40% inference speed gains on quantized models (Q2_K–Q8_0).
-
Adversarial AI Defense:
- Designed adversarial tests for prompt injection and embedding manipulation.
- Built anomaly detectors to mitigate LLM hallucinations and contextual poisoning.
-
LangChain Enhancements:
- Patched LangChain’s wrappers, resolving token retry issues and API crashes.
- Integrated GPT-Engineer into CI/CD pipelines for seamless AI deployments.
- GGUF Quantized Models: Debugged loaders, reducing VRAM usage by 30%.
- Memory Optimization: Eliminated fragmentation in Python-native wrappers.
- Concurrency & Deadlocks: Debugged multi-threaded API services under high load.
- Hybrid Dependencies: Solved Python/Rust/CUDA dependency conflicts.
-
AIPenetraGuard:
- Developed a framework combining adversarial fuzzing, LLM red teaming, and real-time anomaly detection.
-
Telecom Exploitation:
- Simulated SS7 attacks and SMS interception using Sigploit.
- Identified vulnerabilities in SMPP and telecom interconnects.
-
Forensics & Recovery:
- Conducted spyware analysis with Cellebrite UFED.
- Automated recovery workflows for leaked credentials and metadata.
-
Web & App Security:
- Secured platforms like GadgetsForSale by fixing JWT misconfigurations and rate-limit bypasses.
- Designed DDoS defenses integrating dynamic IP filtering.
- Firmware Extraction: Used ST-LINK v2 and OpenOCD for reverse engineering STM32 microcontrollers.
- Bootloader Debugging: Fixed issues in STM32CubeProgrammer and rebuilt firmware configurations.
- IoT Security: Analyzed and patched firmware protections in closed-source IoT devices.
-
Kali & BlackArch Power User:
- Mastered 50+ tools, including sqlmap, Metasploit, Nikto, and OWASP ZAP.
- Built Dockerized pentest labs and optimized TLP for power efficiency.
-
System Tuning:
- Recovered broken Arch Linux installs by debugging rogue packages.
- Tuned I/O schedulers and systemd configurations for real-time scans.
-
Scripting:
- Developed Rust, Python, and Bash scripts for threat detection and log parsing.
-
Optimized CUDA Config for Low-VRAM GPUs:
-
LangChain API Wrapper Fix:
-
Pipeline Automation with GPT-Engineer:
-
STM32 Debug Session Fixer:
- Coming Soon
A cutting-edge Command & Control server with real mobile network exploitation capabilities.
Key Features:
- Real-time Agent Monitoring: Live tracking of compromised devices
- Advanced Payload Generation: Custom malware payload creation system
- GSM/SS7 Network Exploitation: Mobile network protocol manipulation and interception
- 0-Click Exploit Framework: Automated vulnerability exploitation engine
- Web-based Dashboard: Interactive command and control interface
- Secure Communications: Military-grade encryption and authentication
Technical Stack:
- Backend: Python, FastAPI, WebSockets
- Frontend: Next.js, React, TypeScript
- Protocols: GSM, SS7, HTTP/HTTPS
- Database: Redis, MongoDB
- Security: AES-256 encryption, JWT authentication
Demonstration:
- Live Demo Available (When running locally)
- Source Code
- API Documentation
-
LLM Quantization Benchmarks:
-
AI Red Teaming Logs:
-
Pentest Reports:
- Coming Soon
- ✅ Cybersecurity Veteran: 20+ years in government and private sectors.
- ✅ Advanced OSINT Researcher: Skilled in Maltego, Sherlock, and database leak analysis.
- ✅ Certified: First Aid, Truck Driving, Stewardship, Pharmacy.
- ✅ Multi-lingual: Fluent in English, French, Arabic, Russian, and German.
"When systems fail, I don’t just fix—I rebuild. From microcontrollers to AI models, I trace the flaw, decode the logic, and craft solutions that survive chaos."
- GitHub: github.com/sniper4u2
- Email: sofienehamzaoui2@gmail.com
- Tools Case: start.me Profile
If you’re looking for a cyber guardian, LLM optimizer, or red team specialist, let’s collaborate to outsmart the next generation of threats—together.