Futaba _ Webs πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

- The Hacker Who Laughs πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ, Founder at Futaba_Webs πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

Cyber Security Professional profecient in Offensive Security and Penetration testing, I offer a wide range of services ranging from: Penetration Testing - Offensive Security Auditing, Cyber Security Analyst - Vulnerability Assessments, SOC Analyst - Incident Response, Cyber Security Engineer - Secure Coding, and even Network Security Testing.

πŸŽƒ Dark Mode πŸŽƒ Light Mode πŸŽƒ Word Mode πŸŽƒ Download All πŸŽƒ Search Mode πŸŽƒ Experience πŸŽƒ Glossary πŸŽƒ About Me πŸŽƒ Home

πŸŽƒ ABOUT FUTABA_WEBS

Founder at Futaba_Webs πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ | Cyber Security Professional | Penetration Tester | Cyber Security Engineer & Researcher | Software & Electrical Engineer | Reverse Engineer | Gray & Purple Hat Hacker

Self-Taught Cyber Security Professional with a background in Software Engineering, IT Technical Support, Security Engineering, and proficiency in Electrical engineering and Reverse Engineering.

I have a love and passion for offensive security. I reverse engineer various core API’s and technologies in order to explore and fabricate new ideas that will make my projects come to life.

I use my Software Engineering skills to design custom exploits and penetration testing tools, and CTF servers that demonstrate my Security Engineering skills and ingenious ingenuity.

My Electrical Engineering skills allow me to devise various custom tools such as keyboard injection exploits that manipulate the virtual keyboard API of a system in order to inject payloads and bypass security measures for security testing, some with the ability to write their own code, which I use to extend further C/C++ Win32API and LinuxAPI exploits along with python scripts.

On top of being proficient in C/C++ I’m also proficient in 13 programming languages in total, my main ones being: C/C++, Python3, Bash, SQL, HTML/CSS/JS, PHP, and of course a bit of Powershell scripting as well.

My IT skills are on par with level 4 tier experience. I use my reverse engineering skills in order to deduce probable causes and solutions for technical problems.

Reverse engineering is my specialty and is how I learn. Given my level of ingenuity, I was allowed to operate above my tier level and demonstrate my skill sets to the fullest and solve lots of complex technical problems at the companies that I worked at, including the infamous Pfizer Pharmaceutical company, which I have thorough documentation of in my research portfolio.

My skill sets won’t disappoint you! Check out my work and my research. I take pride in what I do as a professional hacker.



- The Hacker Who Laughs πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

Penetration TestingπŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ
Web Application Pen-Testing πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ
Network Pen-Testing πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ
Network Security & Vulnerability Analysis πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ
Malware Analysis/Development & Forensics πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ
Reverse Engineering πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ
portfolio img

πŸŽƒ WHAT I DO

πŸ•Έ White Paper Research πŸ•Έ

I create research material focused on Penetration Testing and Offensive Security: Exploit guides, Tool Guides, Tool Development, Malware/Code Analysis, Reverse Engineering, as well as mentoring services, where I show you how to apply it on both a PRACTICAL and REAL WORLD level!

I also run a CTF server with bundle material to help train Cyber Security professionals. You can find out more about that here! Free to play version can be found here!

You can find out more about my research in my Patreon here! Reviews can be found here!


My research was also recently featured at the University of Washington, where I covered DLP mitigation strategies to prevent Ransomware!

πŸ•Έ Penetration Testing πŸ•Έ

One of my main specialisites is Offensive Security and Penetration testing. I do also happen to provide other services ranging from:

πŸŽƒ Vulnerability Assessments

πŸŽƒ Incident Response Services

πŸŽƒ Secure Coding Assessments

πŸŽƒ Malware Analysis & Forensics

πŸŽƒ Threat & Risk Assessment

I’m currently partnered with a company called CypSec as a part of their Security center, where I also provide said services to them and their clientele!

You can find out more about that here!

πŸ•Έ Red Teaming πŸ•Έ

I design custom Penetration testing tools from scratch, whether it be digital tools via Software Development, or physical ones via Electrical Engineering/Robotics.

Exploit development is also one of my specialties, since part of my job is not only to perform various Threat & Vulnerability assessments against infrastructures, but to craft various exploits that further simulate them in order to properly demonstrate and raise awareness of the dangers should a system be exposed to one!

You can sample some of my custom tools here! that are up for display and SAFE to test out!

My exploitation development research was also featured at "Wild West Hacking Fest" here! in my "Evil Twin" custom exploit!

πŸŽƒ Experience

CypSec: Cyber Security Researcher & Penetration Tester

11/2024 - Present (8 mnths)

My collaboration with CypSec aims to significantly enhance the cybersecurity posture of our clients in the Northern American region. Integrating my advanced auditing techniques and forensic capabilities into our offerings effectively empowers organizations to adopt proactive security measures that mitigate risks before they escalate.

I also collaborate with them on various secure coding processes across all joint initiatives, providing expertise in secure development.

The following services are provided through my cooperation with CypSec, which directly stems from my personal brand "Futaba_Webs"

πŸŽƒ Penetration Testing

πŸŽƒ Exploit Development

πŸŽƒ Vulnerability Assessments

πŸŽƒ Incident Response Services

πŸŽƒ Secure Coding Assessments

πŸŽƒ Malware Analysis & Forensics

πŸŽƒ Threat & Risk Assessment


πŸŽƒ Full Cover Letter Can Be Found Here


Brainnest: Cyber Security Internship (Remote)

Feb 2023 - Mar 2023 (2 months)

I was a part of the Cyber Security Internship under Brainnest Consulting for their industry standard cyber security training. During the training and instruction, I received real hands-on experience in a variety of formats: Programming, Web application pentesting, and CTF challenges. I was one of their top interns and solved many complex problems and challenges during my time there.

I Participated in simulated hacking exercises, utilizing Python and OSINT to discover potential exploit vulnerabilities on live web servers, further growing and expanding my pentesting methodology. I got to work with tools such as: dirbuster, gobuster, dirsearcher for web server enumeration, Burp Suite for brute forcing web application login pages and pitch fork brute forcing to bypass login timeout mechanics, Fuzzing, and various forms of critical vulnerability assessment tools such as nikto, and additional tools like httrack to further analyze any and all files that come from web server applications ton parse them for sensitive information during a pentest. I even participated in advanced high level forensics challenges that involved Python programming, data compressions/decompressions, database files, and even data encryption. I also got experience with stuff like hashcat and john the ripper for cracking passwords and hashes via the use of word lists, as well as cookie session hijacking and working with robot.txt files from web applications in order to uncover various site maps that could allow me to secure sensitive data.


Roles and Responsibilities Included

πŸŽƒ Participated in simulated hacking exercises, utilizing Python and OSINT to discover potential exploit vulnerabilities on live web servers.

πŸŽƒ Developed expertise in reverse engineering methodologies and malware analysis to further engage in CTF challenges

πŸŽƒ Applied advanced Python coding techniques to create custom scripts and tools for vulnerability assessment.

πŸŽƒ Engaged in various competition style CTF challenges to further develop web application penetration testing skills, along

with tactical coordination with fellow peers in order to complete advanced CTF's.


πŸŽƒ Full Cover Letter Can Be Found Here


Soni-Resources(Pfizer): AV/IT Conference Room Technician

4/2021 - 4/2023 (2 years & 1 mnths)

I worked as a AV Technician for β€œPFizer”, where my role involved providing AV/IT support for Microsoft Teams conference rooms meetings with Crestron hardware integration. with the occasional Zoom or WebEx meetings integrated in to Microsoft Teams Rooms.

I took advantage of our reservation system to stay a head EVERYDAY, even arriving an hour early, so I could focus on optimizing high quality end user support without any distractions: Performing room sweeps, Staying ahead of tickets, contacting clients to further plan ahead support for them, as well as coordinating with the various coordinator admins to stay ahead of future bookings and scheduling, including room tests for the meetings in advance and any other specifications they might need for the meeting and such, and testing trouble shooting anomalies to prepare for onsite support.

Training the staff and faculty on how to use the equipment was one of my biggest strategies in that it made my job even easier, in that I could focus on the people that really do need the support. This thinned out the number of rooms I had to check up on, and reduced 80 tickets to sometimes 40 tickets, saving me so much time to work on other things and focus on supporting major meetings, as well as gaining a healthy client based, and of course getting more tickets in since I had time to help more people. raising my ticket count higher.


Roles and Responsibilities Included

πŸŽƒProviding AV/IT support levels 1-3 for any and all staff and faculty,

πŸŽƒPlan AV conference room bookings for staff and executives: Microsoft Teams/Rooms, Webex, and Zoom

πŸŽƒProvide Training and support to staff and faculty, as well as fellow AV support technicians, including any and all documentation write-ups

πŸŽƒCoordinating with coordinator admins to plan ahead for future bookings days, weeks, and months in advance.


πŸŽƒ Full Cover Letter Can Be Found Here


WePlayed Sports: Cyber Security Researcher & Penetration Tester

4/2021 - 4/2023 (2 years & 1 mnths)

During my time there, I focused on finding any and all possible vulnerabilities within their main domain, as well as any and all other possible sub domains that they had. I got to spend a giant chunk of my time getting experience with the overall phases of the pen-testing methodology: Information gathering and recon with tools like: Nmap, dirbuster, gobuster, checking DNS records and various port configurations, and a lot more.

During my time there I also found a critical flaw in their systems, a Zero day exploit, one that allowed you to bypass a login timeouts, as well as a critical flaw in the system that allowed you to easily grep end user login information to better test against for the exploit.

I also got to various services that were on their systems and get a good feel on how to navigate various domains and keep track of it, as well as learn how to develop my own personal documentation style for reporting information.


Roles and Responsibilities Included

πŸŽƒ Web Application Pen-Testing via Gray-Box testing and OWASP

πŸŽƒ Threat, Risk, and Vulnerability assessments

πŸŽƒ Exploitation design for Offensive Security Testing and Recon

πŸŽƒ Root cause of analysis diagnosis and Security mitigation design


πŸŽƒ Full Cover Letter Can Be Found Here


The Bachrach Group/SourceLab Search: IT Level 1 Helpdesk

11/2021 - 02/2022 (4 mths)

During my time at β€œThe Bachrach Group”, as well as its sister company β€œSourcelab Search”. I served as their main level 1 support technician and played a vital role in ensuring all technical equipment is constantly maintained and provided technical and hardware support to all staff and faculty via on site as well as remotely for various end users in the company, as well as providing a series of hardware and software installations and topology designs.

Although my title indicates I was a level 1 tech support, due to my past experience with technology and cyber security/reverse engineering skill set, I took part in a lot of investigations regarding a lot of technical issues that went on in the company, as well as writing documentation on said matters, essentially being a well rounded level support technician operating at any and all levels: 1, 2, and 3.

I also ran a few security audits/assessments on their infrastructures, offering remedies to address any issues related to their: Citrix remote desktop setup, network topology, and even security solutions that mitigate potential risk factors for remote employees.


Roles and Responsibilities Included

πŸŽƒ Provided onsite/remote technical support (Team-Viewer/Zoho)

πŸŽƒ AV Conference room setups (Teams/Zoom) and Network Support

πŸŽƒ System Administrator: Fresh Service, Office 365 Active Directory

πŸŽƒ Technical write ups and training for staff and faculty

πŸŽƒ Threat, Risk, and Vulnerability assessments


πŸŽƒ Full Cover Letter Can Be Found Here


Futaba_Webs Cyber Security & IT Consulting: Founder

3/2020 - Present (4 years & 3 mths)

Futaba_Webs is a Cyber Security/IT firm I run where I provide the following services

πŸŽƒ Penetration Testing

πŸŽƒ Exploit Development

πŸŽƒ Vulnerability Assessments

πŸŽƒ Incident Response Services

πŸŽƒ Secure Coding Assessments

πŸŽƒ Malware Analysis & Forensics

πŸŽƒ Threat & Risk Assessment

I’m currently partnered with two Cyber Security companies, one named β€œCypSec”, and another soon to be announced.

I also create research material focused on Penetration Testing and Offensive Security: Exploit guides, Tool Guides, Tool Development, Malware/Code Analysis, Reverse Engineering, as well as mentoring services, where I show you how to apply it on both a PRACTICAL and REAL WORLD level! I also run a CTF server known as β€œFutaba’s Playground”, its purpose being train up and coming Cyber Security professionals.

My research was also recently featured at the University of Washington, where I covered DLP mitigation strategies to prevent Ransomware, as well as β€œWild West Hacking Fest”, where I did a live demonstration of some of my network security research featuring my custom β€œEvil Twin Attack” exploit.

Part of my brand also involves the creation of physical tool development.

Another aspect of my brand is that I build gaming PC’s and provide home setups for people.


πŸŽƒ Security Engineer Cover Letter
πŸŽƒ Cyber Security Researcher Cover Letter
πŸŽƒ Cyber Security Mentor Cover Letter
πŸŽƒ Gaming PC/PC Technician Cover Letter


Junior C++ Dev Intern - Durst Sebring Revolution

3/2017 - 6/2017 (4 mths)

During my time at β€œDurst Sebring Revolution(DSR)” I was heavily involved in the overall API development and automation process of proprietary SONY cameras that were releasing at the time, the SONY DSR-100 via Gphoto in the Ubuntu Linux environment.

This was also where I dived more into API security, since one of their biggest goals was to figure out online remote automation for various camera photo shoots, giving photographers the flexibility to perform photoshoots virtually anywhere.

I was also heavily involved in any and all main python projects that involved Graphical User Interface development via PYQT5. The purpose for this was to devise an app that would allow easy automation of photo shoots whether it be physically on site, or remotely.

Essentially, my goal was to reverse engineer and dissect the core API of the SONY DSR-100, automate, and set up a secure Linux environment where photo shoots can be pre-automated either physically on site or remotely off site.


Roles and Responsibilities Included

πŸŽƒ Software development and API programming for proprietary SONY camera hardware and software technology

πŸŽƒ Quality assurance and Security testing for camera hardware and software using GPhoto2

πŸŽƒ Developing graphical user interfaces using PYQT5

πŸŽƒ Onsite technical assistance with camera equipment.

πŸŽƒ Devised data diagrams to breakdown and explain hardware and software

πŸŽƒ Sorted and organized files, spreadsheets and reports., and database entry

πŸŽƒ Delivered clerical support by handling a range of routine and special requirements.

πŸŽƒ Maintained organized inventory

πŸŽƒ Analyzed problems, identified solutions and made decisions.


πŸŽƒ Full Cover Letter Can Be Found Here


CISCO Mouse Squad IT: Network Security & System Administrator/IT Help Desk Support - Intern

9/2010 9/2013 (3 yrs 1 mth)

During my time as a Network Security & System Administrator/IT Support Technician intern for the "CISCO Mouse Squad Program" I was responsible for overall: network security, system administration for student and teacher accounts, as well as overall physical security and network topology design for school computer lab systems. I was also in charge of virus removal and data recovery operations where needed.

I was also responsible for answering phone calls and emails in regards to ticketing issues that might arise for technical problems on my school floor, and was responsible for troubleshooting: hardware, software, network issues, as well as any and all forms of issues that might arise.

I also managed and assisted various staff and faculty, including students and executives in any format. I also assisted with large technical setups for any official conference room and large scale AV setups and ran various tests each time. Any and all technical support was done either on site or remotely via Teamviewer.


Roles and Responsibilities Included

πŸŽƒ Network Security & System Administration for the school network

πŸŽƒ Onsite Hardware/Software repairs, imaging systems, and support

πŸŽƒ Apply security updates and firewall setups

πŸŽƒ Switch and router configuration setups to enable MAC Filtering

πŸŽƒ Creating allow and block list for applications on systems

πŸŽƒ Perform regular: full, differential, and incremental backups.

πŸŽƒ Imaging systems. and system recovery


πŸŽƒ Full Cover Letter Can Be Found Here


πŸŽƒ Cyber Security Portfolio

Pen-Testing Tools & Other Projects

πŸŽƒ Man In The Browser Exploit (Demo Code Only)

πŸŽƒ Rubber Ducky (Demo Code Only)

πŸŽƒ SQL Injection (Solves a CTF ) (Demo Code Only)

πŸŽƒ Crypto Malware (Demo Code Only)

πŸŽƒ Kali Master Script Installer (Demo Code Only)

πŸŽƒ TCP Backdoor exploit (Demo Code Only)

πŸŽƒ Exploit Videos (Demo Only)

πŸŽƒ Futaba’s Playground(Custom CTF)

πŸŽƒ CTF Competitions Write-Ups: (Click Here)

πŸŽƒ Pen-Testing App Ver2: (Click Here)

πŸŽƒ Pen-Testing Drone Prototype: (Click Here)

πŸŽƒ Cyber Security Research

πŸŽƒ YouPic Photography Feature

πŸŽƒ TBG/Sourcelab Search Portfolio

πŸŽƒ Gaming PC/PC Technician



πŸŽƒ Cyber Security Tool Proficiency


πŸŽƒ Nmap, Dirbuster/Gobuster/Dirsearcher

πŸŽƒ Wireshark, Netcat, Metasploit/Meterpreter

πŸŽƒ Burp Suite, OSINT, SQLMap, Nikto

πŸŽƒ Shodan API, theHarvester/emailharvester

πŸŽƒ OpenVPN, WPScan, GTFOBins

πŸŽƒ Smbmap/Smbclient

πŸŽƒ Macchanger/Arpspoof/Dnsspoof

πŸŽƒ Evil-winrm, Parseo, Hydra, Patator

πŸŽƒ John the ripper/Zip2john, Hashcat

πŸŽƒ Aws, Settoolkit, Httrack, Searchsploit

πŸŽƒ Sfuzz, zzuf, wfuzz, ffuf, strace, GDB Debugger

πŸŽƒ Aircrack-NG, wash, reaver, wifite, besside-NG

πŸŽƒ Hostapd, Bettercap, Hciconfig

πŸŽƒ Hcitool, Blueranger, Sdptool, Btscanner

πŸŽƒ Fang, Bluelog, Rkhunter, Cewl/Crunch

πŸŽƒ Bkhive, Samdump2, Chntpwn, Md5sum

πŸŽƒ Net,Nbtscan, Anon-SM, Dotdotpwn, Exiftool

πŸŽƒ Fluxion, Hyperion, Impackets, Fragrouter

πŸŽƒ Phoneinfoga, Routersploit, Venom, Tor, PEAS



πŸŽƒ Technical Skills


πŸŽƒ Kali Linux/Windows/Mac OS

πŸŽƒ Penetration Testing /Offensive Security

πŸŽƒ Software Engineering/Electrical Engineering

πŸŽƒ Web/Network Pen-Testing

πŸŽƒ Malware Analysis/Malware Development

πŸŽƒ Malware Reverse Engineering

πŸŽƒ Windows and Linux System Administration

πŸŽƒ Network & System Administration

πŸŽƒ Network Security

πŸŽƒ Operating System Hardening

πŸŽƒ Defensive Coding Practices

πŸŽƒ Dynamic and Static Code Analysis

πŸŽƒ Virtual machines (VirtualBox VMware)

πŸŽƒ Vulnerability Management

πŸŽƒ Security Strategy & Engineering

πŸŽƒ User Awareness training

πŸŽƒ TCP/IP, UDP, ARP, DNS, and DHCP



πŸŽƒ Cyber Security Skills

Bypassing system security measures via BIOS

πŸŽƒ Extracting SAM file password hashes on both Windows and Linux systems for decryption

πŸŽƒ Excavating web browser configuration files for end user saved passwords

πŸŽƒ Disabling security systems and antivirus software via trackbacking configuration files for them

πŸŽƒ Popping in backdoors and other malicious companion type viruses to manipulate the end user

πŸŽƒ Excavating the entire file system if needed for both data recovery purposes and exploits



GDB debugger: Code Flow Analysis/Buffer Overflow injections

πŸŽƒ Checking system architecture info

πŸŽƒ Disabling all DEP/ASLR protection

πŸŽƒ Disabling all needed settings to buffer inject a program

πŸŽƒ Finding the offset values for the program's registers: ESP/RSP, EBP/RBP, EIP/RIP, etc for the registers of the program

πŸŽƒ Analyzing all: registers, function, variable addresses, etc.

πŸŽƒ Disassembling the program to find the mainline register addresses

πŸŽƒ Bypassing x64/x86_64 system issues reading null bytes to overwrite using 6-bit byte sized addresses

πŸŽƒ Overwritting the EIP/RIP of the program for buffer overflow injection



SQL Injections (Blind/Union)

πŸŽƒ Searching and testing for injection points via: Burp Suite, Code flow analysis, and SqlMap

πŸŽƒ Breaching login credentials using the 'or 1=1== method

πŸŽƒ Testing for injections using the "and 1=1--, "and 1=2--, or the single quote method to uncover possible error messages

πŸŽƒ Locating the version of the database server via union error response based or blind conditional based

πŸŽƒ Uncovering the number of columns at play for a database query union or blind based

πŸŽƒ Probing for possible columns in a database table using a series of Union placed NULL statements



Burp Suite

πŸŽƒ Intercepting web data communications

πŸŽƒ Using the repeater to study and more in depth analyze client and server-side responses

πŸŽƒ Launching payloads for brute forcing using the intruder

πŸŽƒ Analyzing HTTP history of data communications

πŸŽƒ Analyzing web socket data to study possible heart beats that could be at play from SSL data communications

πŸŽƒ Studying and intercepting various: HTTP headers, protocol at play, HTTP requests at play, URL/body/cookie

parameters, end user credentials, re-routing targets to desired locations

πŸŽƒ SQL injecting through Burp Suite

πŸŽƒ Configuring usage of proxy server via foxy proxy or OS system means

πŸŽƒ Configuring proxy server manually within Burp Suite



Port scanning via NMAP

πŸŽƒ Ping sweep and network analysis

πŸŽƒ OS/Version fingerprinting

πŸŽƒ Tracing data packets (traceroute)

πŸŽƒ Evading detection systems for filter bypassing

πŸŽƒ Understanding of NMAP service probes



Metasploit Framework

πŸŽƒ Gathering information on potential exploits for service versions detected

πŸŽƒ Setting and configuring exploits and payloads

πŸŽƒ Using the exploit/multi/handler for reverse shell/meterpreter payload exploits

πŸŽƒ Using msfvenom to generate shell code for payloads, as well as: set the architecture, escape bad characters, set

the encoder, format the payload, as well as setting the various payloads for implementation

πŸŽƒ Cracking CCTV systems using the Shodan_search exploit

πŸŽƒ Hijacking camera systems using the meterpreter payload's web_stream cmd

πŸŽƒ Using the check option to probe and check whether the target system is vulnerable to an exploit



NetCat

πŸŽƒ Banner Grabbing

πŸŽƒ Pre-piping in command line execution for buffer overflow exploits

πŸŽƒ Setting up listening ports, including command execution

πŸŽƒ Setting up clients with code execution upon connecting to target system

πŸŽƒ Piping in HTTP request types for further banner grabbing on web servers



Cracking Wireless data encryptions: WEP/WPA/WPA2

πŸŽƒ Setting the NAC card of appropriate technology into promiscuous mode

πŸŽƒ Studying data channels

πŸŽƒ DE-authenticating systems in order to secure 4-way handshakes from access points

πŸŽƒ Closing interfering processes

πŸŽƒCracking the handshake with John the ripper brute forcing algorithms/scripts



Programming Languages:

πŸŽƒ C/C++

πŸŽƒ Arduino

πŸŽƒ Python 3

πŸŽƒ Bash Shell Scripting

πŸŽƒ PowerShell Scripting

πŸŽƒ HTML, CSS, & JavaScript

πŸŽƒ C#

πŸŽƒ Java:

πŸŽƒ MYSQL

πŸŽƒ Assembly



πŸŽƒ Special Features

πŸŽƒ My Most Famous Article

portfolio img

πŸŽƒ My Evil Twin Attack Demonstration

portfolio img

πŸŽƒ My Women's History Month (2025) Article

portfolio img

The Hacker Who Laughs πŸ•ΈπŸ•ΈπŸŽƒπŸ•ΈπŸ•Έ

πŸŽƒ CONTACT ME

AnOnYmOuS

futaba.webs@gmail.com

New York, NY United States