I create research material focused on Penetration Testing and Offensive Security: Exploit guides, Tool Guides, Tool Development, Malware/Code Analysis, Reverse Engineering, as well as mentoring services, where I show you how to apply it on both a PRACTICAL and REAL WORLD level! I also run a CTF server with bundle material to help train Cyber Security professionals. You can find out more about that here! Free to play version can be found here! You can find out more about my research in my Patreon here! Reviews can be found here!
My research was also recently featured at the University of Washington, where I covered DLP mitigation strategies to prevent Ransomware!One of my main specialisites is Offensive Security and Penetration testing. I do also happen to provide other services ranging from: π Vulnerability Assessments π Incident Response Services π Secure Coding Assessments π Malware Analysis & Forensics π Threat & Risk Assessment Iβm currently partnered with a company called CypSec as a part of their Security center, where I also provide said services to them and their clientele! You can find out more about that here!
I design custom Penetration testing tools from scratch, whether it be digital tools via Software Development, or physical ones via Electrical Engineering/Robotics. Exploit development is also one of my specialties, since part of my job is not only to perform various Threat & Vulnerability assessments against infrastructures, but to craft various exploits that further simulate them in order to properly demonstrate and raise awareness of the dangers should a system be exposed to one! You can sample some of my custom tools here! that are up for display and SAFE to test out! My exploitation development research was also featured at "Wild West Hacking Fest" here! in my "Evil Twin" custom exploit!
I create research material focused on Penetration Testing and Offensive Security: Exploit guides, Tool Guides, Tool Development, Malware/Code Analysis, Reverse Engineering, as well as mentoring services, where I show you how to apply it on both a PRACTICAL and REAL WORLD level! I also run a CTF server with bundle material to help train Cyber Security professionals. You can find out more about that here! Free to play version can be found here! You can find out more about my research in my Patreon here! Reviews can be found here!
My research was also recently featured at the University of Washington, where I covered DLP mitigation strategies to prevent Ransomware!One of my main specialisites is Offensive Security and Penetration testing. I do also happen to provide other services ranging from: π Vulnerability Assessments π Incident Response Services π Secure Coding Assessments π Malware Analysis & Forensics π Threat & Risk Assessment Iβm currently partnered with a company called CypSec as a part of their Security center, where I also provide said services to them and their clientele! You can find out more about that here!
I design custom Penetration testing tools from scratch, whether it be digital tools via Software Development, or physical ones via Electrical Engineering/Robotics. Exploit development is also one of my specialties, since part of my job is not only to perform various Threat & Vulnerability assessments against infrastructures, but to craft various exploits that further simulate them in order to properly demonstrate and raise awareness of the dangers should a system be exposed to one! You can sample some of my custom tools here! that are up for display and SAFE to test out! My exploitation development research was also featured at "Wild West Hacking Fest" here! in my "Evil Twin" custom exploit!
I create research material focused on Penetration Testing and Offensive Security: Exploit guides, Tool Guides, Tool Development, Malware/Code Analysis, Reverse Engineering, as well as mentoring services, where I show you how to apply it on both a PRACTICAL and REAL WORLD level! I also run a CTF server with bundle material to help train Cyber Security professionals. You can find out more about that here! Free to play version can be found here! You can find out more about my research in my Patreon here! Reviews can be found here!
My research was also recently featured at the University of Washington, where I covered DLP mitigation strategies to prevent Ransomware!One of my main specialisites is Offensive Security and Penetration testing. I do also happen to provide other services ranging from: π Vulnerability Assessments π Incident Response Services π Secure Coding Assessments π Malware Analysis & Forensics π Threat & Risk Assessment Iβm currently partnered with a company called CypSec as a part of their Security center, where I also provide said services to them and their clientele! You can find out more about that here!
I design custom Penetration testing tools from scratch, whether it be digital tools via Software Development, or physical ones via Electrical Engineering/Robotics. Exploit development is also one of my specialties, since part of my job is not only to perform various Threat & Vulnerability assessments against infrastructures, but to craft various exploits that further simulate them in order to properly demonstrate and raise awareness of the dangers should a system be exposed to one! You can sample some of my custom tools here! that are up for display and SAFE to test out! My exploitation development research was also featured at "Wild West Hacking Fest" here! in my "Evil Twin" custom exploit!
I create research material focused on Penetration Testing and Offensive Security: Exploit guides, Tool Guides, Tool Development, Malware/Code Analysis, Reverse Engineering, as well as mentoring services, where I show you how to apply it on both a PRACTICAL and REAL WORLD level! I also run a CTF server with bundle material to help train Cyber Security professionals. You can find out more about that here! Free to play version can be found here! You can find out more about my research in my Patreon here! Reviews can be found here!
My research was also recently featured at the University of Washington, where I covered DLP mitigation strategies to prevent Ransomware!One of my main specialisites is Offensive Security and Penetration testing. I do also happen to provide other services ranging from: π Vulnerability Assessments π Incident Response Services π Secure Coding Assessments π Malware Analysis & Forensics π Threat & Risk Assessment Iβm currently partnered with a company called CypSec as a part of their Security center, where I also provide said services to them and their clientele! You can find out more about that here!
I design custom Penetration testing tools from scratch, whether it be digital tools via Software Development, or physical ones via Electrical Engineering/Robotics. Exploit development is also one of my specialties, since part of my job is not only to perform various Threat & Vulnerability assessments against infrastructures, but to craft various exploits that further simulate them in order to properly demonstrate and raise awareness of the dangers should a system be exposed to one! You can sample some of my custom tools here! that are up for display and SAFE to test out! My exploitation development research was also featured at "Wild West Hacking Fest" here! in my "Evil Twin" custom exploit!
Iβll perform various secure coding assessments in various programming languages and technologies Iβm proficient in, which also include areas Iβm proficient in when it comes to Penetration Testing/Offensive Security such as Web Application Security for example. Secure by design should be a standard when it comes to any form of modern computing technology: Biotechnology, Nanotechnology, A.I., etc. As technology evolves, so does the capacity and toolset of threat actors.
In order to emphasize the level of risk a lack of secure code by design has on business infrastructures, I offer services where I engage in exploitation development, showing the REAL level of damage that can be done if left unattended. Iβll be diving into stuff like attack models/trees, diagraming all plausible and logical attack surfaces. Not only will this give my clients a deep perspective of the possible risks/threats that exist, but itβll also get them into the habit of thinking several steps ahead when implementing ANY form of technology into their infrastructure.
Part of my services will also include, should clients choose to mitigate the risk, will involve me not only devising various mitigation strategies, but also implementing them. This means that a mere Secure Coding assessment could turn into me working with actual developers to figure out how to patch their systems.
If you have ANY system that has been compromised by malware, Iβll take a look at it and go about removing it for you. Services like this, although it might be possible to remote in and do a little inspection on some of the processes running on the system, this oneβs best served via either sending the physical system over to me, OR, an onsite visit if need be. Simply tell me all the symptoms, Iβll look into it and ping you back on how to best deal with the situation.
Need a Malware Researcher? Found an executable you find suspicious and need me to look into it? I can take care of that for you! Simply bring me the executable, Iβll place it in a Sandbox environment and take a look at it for you. I can also take a look at any source code you either suspect of being malware, OR, is in fact malware, breaking down all the root attack vectors and methodologies behind them so you can further your defenses.
This oneβs a bit niche and might not be the case too often for obvious reasons, but in the event you do happen to secure source code for any particular malware, should you need a researcher to interpret and pinpoint any attack vectors in it, I can also do that for you. Again, this service is a bit niche, mainly since the whole point of malware is that itβs typically in binary format requiring you to disassemble it apart safely or analyze itβs behavior in order to interpret it. I doubt threat actors would leave the goods out in the open for you. Foolish mistake. BUT, in the event it does happen send it my way and Iβll take a look at it.
I create research material focused on Penetration Testing and Offensive Security: Exploit guides, Tool Guides, Tool Development, Malware/Code Analysis, Reverse Engineering, as well as mentoring services, where I show you how to apply it on both a PRACTICAL and REAL WORLD level! I also run a CTF server with bundle material to help train Cyber Security professionals. You can find out more about that here! Free to play version can be found here! You can find out more about my research in my Patreon here! Reviews can be found here!
My research was also recently featured at the University of Washington, where I covered DLP mitigation strategies to prevent Ransomware!One of my main specialisites is Offensive Security and Penetration testing. I do also happen to provide other services ranging from: π Vulnerability Assessments π Incident Response Services π Secure Coding Assessments π Malware Analysis & Forensics π Threat & Risk Assessment Iβm currently partnered with a company called CypSec as a part of their Security center, where I also provide said services to them and their clientele! You can find out more about that here!
I design custom Penetration testing tools from scratch, whether it be digital tools via Software Development, or physical ones via Electrical Engineering/Robotics. Exploit development is also one of my specialties, since part of my job is not only to perform various Threat & Vulnerability assessments against infrastructures, but to craft various exploits that further simulate them in order to properly demonstrate and raise awareness of the dangers should a system be exposed to one! You can sample some of my custom tools here! that are up for display and SAFE to test out! My exploitation development research was also featured at "Wild West Hacking Fest" here! in my "Evil Twin" custom exploit!
I create research material focused on Penetration Testing and Offensive Security: Exploit guides, Tool Guides, Tool Development, Malware/Code Analysis, Reverse Engineering, as well as mentoring services, where I show you how to apply it on both a PRACTICAL and REAL WORLD level! I also run a CTF server with bundle material to help train Cyber Security professionals. You can find out more about that here! Free to play version can be found here! You can find out more about my research in my Patreon here! Reviews can be found here!
My research was also recently featured at the University of Washington, where I covered DLP mitigation strategies to prevent Ransomware!One of my main specialisites is Offensive Security and Penetration testing. I do also happen to provide other services ranging from: π Vulnerability Assessments π Incident Response Services π Secure Coding Assessments π Malware Analysis & Forensics π Threat & Risk Assessment Iβm currently partnered with a company called CypSec as a part of their Security center, where I also provide said services to them and their clientele! You can find out more about that here!
I design custom Penetration testing tools from scratch, whether it be digital tools via Software Development, or physical ones via Electrical Engineering/Robotics. Exploit development is also one of my specialties, since part of my job is not only to perform various Threat & Vulnerability assessments against infrastructures, but to craft various exploits that further simulate them in order to properly demonstrate and raise awareness of the dangers should a system be exposed to one! You can sample some of my custom tools here! that are up for display and SAFE to test out! My exploitation development research was also featured at "Wild West Hacking Fest" here! in my "Evil Twin" custom exploit!
I create research material focused on Penetration Testing and Offensive Security: Exploit guides, Tool Guides, Tool Development, Malware/Code Analysis, Reverse Engineering, as well as mentoring services, where I show you how to apply it on both a PRACTICAL and REAL WORLD level! I also run a CTF server with bundle material to help train Cyber Security professionals. You can find out more about that here! Free to play version can be found here! You can find out more about my research in my Patreon here! Reviews can be found here!
My research was also recently featured at the University of Washington, where I covered DLP mitigation strategies to prevent Ransomware!One of my main specialisites is Offensive Security and Penetration testing. I do also happen to provide other services ranging from: π Vulnerability Assessments π Incident Response Services π Secure Coding Assessments π Malware Analysis & Forensics π Threat & Risk Assessment Iβm currently partnered with a company called CypSec as a part of their Security center, where I also provide said services to them and their clientele! You can find out more about that here!
I design custom Penetration testing tools from scratch, whether it be digital tools via Software Development, or physical ones via Electrical Engineering/Robotics. Exploit development is also one of my specialties, since part of my job is not only to perform various Threat & Vulnerability assessments against infrastructures, but to craft various exploits that further simulate them in order to properly demonstrate and raise awareness of the dangers should a system be exposed to one! You can sample some of my custom tools here! that are up for display and SAFE to test out! My exploitation development research was also featured at "Wild West Hacking Fest" here! in my "Evil Twin" custom exploit!
I create research material focused on Penetration Testing and Offensive Security: Exploit guides, Tool Guides, Tool Development, Malware/Code Analysis, Reverse Engineering, as well as mentoring services, where I show you how to apply it on both a PRACTICAL and REAL WORLD level! I also run a CTF server with bundle material to help train Cyber Security professionals. You can find out more about that here! Free to play version can be found here! You can find out more about my research in my Patreon here! Reviews can be found here!
My research was also recently featured at the University of Washington, where I covered DLP mitigation strategies to prevent Ransomware!One of my main specialisites is Offensive Security and Penetration testing. I do also happen to provide other services ranging from: π Vulnerability Assessments π Incident Response Services π Secure Coding Assessments π Malware Analysis & Forensics π Threat & Risk Assessment Iβm currently partnered with a company called CypSec as a part of their Security center, where I also provide said services to them and their clientele! You can find out more about that here!
I design custom Penetration testing tools from scratch, whether it be digital tools via Software Development, or physical ones via Electrical Engineering/Robotics. Exploit development is also one of my specialties, since part of my job is not only to perform various Threat & Vulnerability assessments against infrastructures, but to craft various exploits that further simulate them in order to properly demonstrate and raise awareness of the dangers should a system be exposed to one! You can sample some of my custom tools here! that are up for display and SAFE to test out! My exploitation development research was also featured at "Wild West Hacking Fest" here! in my "Evil Twin" custom exploit!
I create research material focused on Penetration Testing and Offensive Security: Exploit guides, Tool Guides, Tool Development, Malware/Code Analysis, Reverse Engineering, as well as mentoring services, where I show you how to apply it on both a PRACTICAL and REAL WORLD level! I also run a CTF server with bundle material to help train Cyber Security professionals. You can find out more about that here! Free to play version can be found here! You can find out more about my research in my Patreon here! Reviews can be found here!
My research was also recently featured at the University of Washington, where I covered DLP mitigation strategies to prevent Ransomware!One of my main specialisites is Offensive Security and Penetration testing. I do also happen to provide other services ranging from: π Vulnerability Assessments π Incident Response Services π Secure Coding Assessments π Malware Analysis & Forensics π Threat & Risk Assessment Iβm currently partnered with a company called CypSec as a part of their Security center, where I also provide said services to them and their clientele! You can find out more about that here!
I design custom Penetration testing tools from scratch, whether it be digital tools via Software Development, or physical ones via Electrical Engineering/Robotics. Exploit development is also one of my specialties, since part of my job is not only to perform various Threat & Vulnerability assessments against infrastructures, but to craft various exploits that further simulate them in order to properly demonstrate and raise awareness of the dangers should a system be exposed to one! You can sample some of my custom tools here! that are up for display and SAFE to test out! My exploitation development research was also featured at "Wild West Hacking Fest" here! in my "Evil Twin" custom exploit!
Self-Taught Cyber Security Professional with a background in Software Engineering, IT Technical Support, Security Engineering, and proficiency in Electrical engineering and Reverse Engineering.
I have a love and passion for offensive security. I reverse engineer various core APIβs and technologies in order to explore and fabricate new ideas that will make my projects come to life.
I use my Software Engineering skills to design custom exploits and penetration testing tools, and CTF servers that demonstrate my Security Engineering skills and ingenious ingenuity.
My Electrical Engineering skills allow me to devise various custom tools such as keyboard injection exploits that manipulate the virtual keyboard API of a system in order to inject payloads and bypass security measures for security testing, some with the ability to write their own code, which I use to extend further C/C++ Win32API and LinuxAPI exploits along with python scripts.
On top of being proficient in C/C++ Iβm also proficient in 13 programming languages in total, my main ones being: C/C++, Python3, Bash, SQL, HTML/CSS/JS, PHP, and of course a bit of Powershell scripting as well.
My IT skills are on par with level 4 tier experience. I use my reverse engineering skills in order to deduce probable causes and solutions for technical problems.
Reverse engineering is my specialty and is how I learn. Given my level of ingenuity, I was allowed to operate above my tier level and demonstrate my skill sets to the fullest and solve lots of complex technical problems at the companies that I worked at, including the infamous Pfizer Pharmaceutical company, which I have thorough documentation of in my research portfolio.
My skill sets wonβt disappoint you! Check out my work and my research. I take pride in what I do as a professional hacker.
- The Hacker Who Laughs πΈπΈππΈπΈ