>> hello world, I'm

Samuel Alewi

|

Architecting high-scale distributed systems and specialized stealth automation frameworks.

Samuel Alewi - Backend Engineer

About Me

As a Backend Architect, I specialize in building Python ecosystems that handle massive concurrency without breaking. My work focuses on creating resilient server-side foundations that power products at scale.

Beyond traditional backend, I engineer Stealth Automation frameworks. I design specialized orchestrators and headless pipelines that bypass advanced anti-bot protections and operate where others are detected.

Leveraging my expertise in automation, I am currently pioneering research into specialized Cybersecurity domains. My focus lies in protocol analysis, anti-telemetry heuristics, and the development of defensive methodologies that bridge the gap between high-scale architecture and system integrity.

sys_monitor.py

Skills

Languages

Python JavaScript SQL Bash

Frameworks & Libraries

FastAPI Django Flask Celery SQLAlchemy Pydantic

Automation & Scraping

Playwright Selenium Scrapy BeautifulSoup Puppeteer Scrapling

Databases

PostgreSQL MySQL MongoDB Redis SQLite

Infrastructure

Docker Linux Kafka Git GitHub Actions AWS Nginx

Security

Kali Linux Burp Suite Nmap Wireshark Metasploit Pegasus John the Ripper

Projects

Contribution & Research

HumanTyping

Contribution

A Python library that simulates realistic human keyboard typing behavior for web automation (Playwright/Selenium). Uses Markov chains to generate natural typing patterns including human-like errors, corrections, fatigue effects, and variable speed. Supports both desktop automation and Appium mobile integration.

Callmebot

Contribution

A Python package that provides a free WhatsApp messaging API wrapper. Enables sending WhatsApp messages programmatically through the CallmeBot service, with support for session management, error handling, and environment-based configuration.

Fingrasp

Research

Exploring the development of an advanced device-integrity platform engineered to differentiate between legitimate hardware and simulated environments. This study explores multi-layered integrity protection—including behavioral scoring and transient session security—to eliminate false positives and ensure data originates from legitimate, real-world devices.

Contact