Self-Taught Cyber Security Professional with a background in Software Engineering, IT Technical Support, Security Engineering, and proficiency in Electrical engineering and Reverse Engineering.
I have a love and passion for offensive security. I reverse engineer various core APIโs and technologies in order to explore and fabricate new ideas that will make my projects come to life.
I use my Software Engineering skills to design custom exploits and penetration testing tools, and CTF servers that demonstrate my Security Engineering skills and ingenious ingenuity.
My Electrical Engineering skills allow me to devise various custom tools such as keyboard injection exploits that manipulate the virtual keyboard API of a system in order to inject payloads and bypass security measures for security testing, some with the ability to write their own code, which I use to extend further C/C++ Win32API and LinuxAPI exploits along with python scripts.
On top of being proficient in C/C++ Iโm also proficient in 13 programming languages in total, my main ones being: C/C++, Python3, Bash, SQL, HTML/CSS/JS, PHP, and of course a bit of Powershell scripting as well.
My IT skills are on par with level 4 tier experience. I use my reverse engineering skills in order to deduce probable causes and solutions for technical problems.
Reverse engineering is my specialty and is how I learn. Given my level of ingenuity, I was allowed to operate above my tier level and demonstrate my skill sets to the fullest and solve lots of complex technical problems at the companies that I worked at, including the infamous Pfizer Pharmaceutical company, which I have thorough documentation of in my research portfolio.
My skill sets wonโt disappoint you! Check out my work and my research. I take pride in what I do as a professional hacker.
- The Hacker Who Laughs ๐ธ๐ธ๐๐๐ธ๐ธ
CTF_Write_Ups
Iโve participated in various high level complex CTF challenges, some of which landed me interviews at companies that had them as a part of their hiring process such as: โSecurity Innovationโ, โBrainnest Consultingโ, as well as โChip Scanโ.
I also do a bunch of platforms like HackTheBox and TryHackMe, as well as the many 6 that are available on โCanyouhack[.]usโ which was provided by โSecurity Innovationโ.
Iโm also a Pico CTF competitor, and have even done a few high level forensics challenges that involve high level cryptanalysis techniques to decipher hidden data, as well as rebuild, analyze, and compile them.
All of the CTFโs Iโve participated in inspired me to create my own known as โFutabaโs Playgroundโ
- The Hacker Who Laughs ๐ธ๐ธ๐๐๐ธ๐ธ
Crypto_Malware
I wrote a test sample to demonstrate how ransomware targets and infects a victim system via file enumeration and disk encryption tactics such as RSA and AES encryption.
For this test specifically I am only using RSA encryption.
The code basically creates a directory with a series of files with a bit of sample data in them, creates crypto keys to use for the experiment, enumerates and locates all the root files in the folder, and then handles them via encrypting the files, showing you the cipher text, and then reversing the process to decrypt it in front of you. It even tests the keys by asking you to input data when it launches so that you see the program works.
- The Hacker Who Laughs ๐ธ๐ธ๐๐๐ธ๐ธ
Lan_Turtle
I've always wanted to have one of my rubber ducky scripts write its own code In a cool way, so I figured why not combine that with a LAN turtle.
I'm even working on a version of this that acts as retro malware to disable security systems in place, allowing me to install any backdoor.
- The Hacker Who Laughs ๐ธ๐ธ๐๐๐ธ๐ธ
Man-In-The-Browser
I wrote a Man-In-The-Browser exploit that is able to sit in place via the use of exceptions to monitor and track end user browser sessions to keylog facebook credentials from the end user.
I ran into a HUGE issue during trial and error with the code. Whenever the end user would clickoff off the page, the code would be unable to find the form elements, breaking the code. What I NEED it to do is, when the end user leaves the page, or should they be on the same site but the code canโt find the elements, is for the for loop to break, bringing us back to the main while loop so that the process to check for sites begins again. To get around this I set up an exception handler.
- The Hacker Who Laughs ๐ธ๐ธ๐๐๐ธ๐ธ
TCP_Client
This is a TCP Client that I wrote that connects to a server in a listening state on a victim machine, that can check the OS and version of the system, and then install and run payloads I set based on that, even tools that I might need to pwn the system.
Iโm upgrading this in the future to combine data encryption to mask my network traffic on internal networks to stay hidden for exploits.
- The Hacker Who Laughs ๐ธ๐ธ๐๐๐ธ๐ธ
TCP_Server
This is a TCP Server that I wrote that listens on a victim machine for TCP Client side connections, so that it can interpret and handle any and all shell code commands that are sent by the botmaster.
Iโm upgrading this in the future to combine data encryption to mask my network traffic on internal networks to stay hidden for exploits.
- The Hacker Who Laughs ๐ธ๐ธ๐๐๐ธ๐ธ
Hero_Signal
I designed a custom bash script that makes Kali Linux more accessible to new comers. It's on version 5 but I have a demo version that you can try out here.
You can find that right here on my GitHub
- The Hacker Who Laughs ๐ธ๐ธ๐๐๐ธ๐ธ
SQL_Inject_Script
This is a script that I designed that solves one of โSecurity Innovationsโ first SQL injection based CTFโs.
The script is able to inject a payload into the URL parameter of the web server while pre-loading a cookie session that has been assigned to it, solving the challenge, and storing the results for us in a file, in which we can parse through to check for the flag.
- The Hacker Who Laughs ๐ธ๐ธ๐๐๐ธ๐ธ