Skip to main content
Identity Record

Mohammad Raouf Abedini

AI Security Researcher

AI security researcher and final-year Cyber Security student at Macquarie University (graduating November 2026) with demonstrated ability to independently discover, validate, and responsibly disclose cross-platform vulnerabilities.

Authored “The Invisible Window” — a 12-page IEEE-format security research paper demonstrating 100% screen capture evasion on Windows 10/11 and macOS 14–26 using documented OS-level APIs, with a novel finding that Apple's macOS 15 mitigation remains ineffective on macOS 26.

Fluent in Python with production experience across C/C++, TypeScript, and Swift. Completed AI model evaluation for Anthropic (Claude Code Human Preference), benchmarking LLM code outputs for quality, security, and reliability. Motivated by reducing catastrophic risks from advanced AI — eager to measure capability uplift, characterise safety boundaries, and develop defensive applications.

70+
Projects
100%
Evasion Rate
3+2
Vendors Disclosed
Mohammad Raouf Abedini
SUBJECT: RAOUF.MONLINE
CLEARANCE: AI-SECURITY-RESEARCHER
LOCATION: CASTLE HILL, NSW
01.

Specializations

Vulnerability Research & Disclosure

  • Cross-Platform Exploit Development (Win32 API, macOS ScreenCaptureKit)
  • Responsible Disclosure (OWASP/FIRST/CISA Frameworks)
  • IEEE-Format Security Research
  • Penetration Testing & Secure Code Review
  • W3C Screen Capture Specification

AI Safety & LLM Security

  • LLM Integration & Evaluation (Anthropic)
  • AI-Assisted Vulnerability Research
  • AI Capability Uplift Measurement
  • Dual-Use Risk Assessment
  • Intent-vs-Artefact Safety Boundary Characterisation

Python & Systems Programming

  • Python (Primary), C, C++, TypeScript, Swift
  • High-Performance C/C++ Systems (1M+ ops/sec)
  • Network Packet Processing (libpcap)
  • Linux (Ubuntu/Kali), CMake, Docker
  • GitHub Actions CI/CD, Google Test

Offensive Security

  • Threat Modelling (MITRE ATT&CK, OWASP Top 10)
  • Network Intrusion Detection Systems
  • Wireshark, Nmap, Burp Suite
  • NLP-Powered Phishing Simulation
  • NIST Framework & Compliance
02.

Skills Matrix

Languages
Python (primary)CC++TypeScriptJavaScriptSwiftKotlinBashSQLGo (familiar)
Security
Vulnerability ResearchCross-Platform Exploit DevelopmentThreat ModellingSecure Code ReviewPenetration TestingResponsible DisclosureWiresharkNmapBurp Suite
AI & ML
LLM Integration & EvaluationAI-Assisted Vulnerability ResearchNLPGenerative AI ToolingML Model EvaluationDual-Use Risk Assessment
Systems
Linux (Ubuntu/Kali)CMakeDockerGit/GitHubGitHub Actions CI/CDGoogle TestFastAPICloudflare Workerslibpcap
Frameworks
OWASP Top 10MITRE ATT&CKNISTW3C Screen Capture Spec
03.

Active Operations

THE_LAB
001ACTIVEAD Attack & Defence Lab
002ACTIVESOC Automation Platform
003ACTIVEAI Red Team Framework
004ACTIVEML Anomaly Detection Pipeline
005ARCHIVEDLEO Satellite Cyber Lab
006ARCHIVEDMalware Analysis Sandbox
007CONCEPTPQC Migration Auditor
04.

Education

Bachelor of Cyber Security

2024–2026

Macquarie University · WAM 76.27

Digital Forensics · Network Security · Cloud Computing · NLP & ML · Offensive Security · Applied Cryptography

Diploma of Information Technology

2023–2024

Macquarie University · WAM 71.75

Foundations in systems, networking, and software engineering.