- 📕 Teaching
- 🖥️ Hacking
- 📕🖥️ Teaching Hacking
- 😸 My cats, Cosmo and Kiki
- 📒 Learning stuff
- 🌎 Publishing open source
- 🦇 The Dracula Theme
- ⚔️ USMC (Intel, IT Admin)
- 🧪 MIT Lincoln Laboratory (Lead Cybersecurity Analyst, Space Systems and Technology Research Division 🛰️)
- 🏧 [REDACTED] Big Bank 💰 | 🔴 Red Team Operator & Exploit Developer
- 🌐 SimSpace | Principal Security Researcher & Staff Red Team Engineer
- 🏹 Huntress | Principal Security Researcher
- 📚 TCM Security | Instructor
- 🏫 Northeastern University | 🅝🅔🅤
- 🎓 Rochester Institute of Technology | 🆁🅸🆃
- Affordable, accessible cybersecurity training content for everyone.
- Technical mastery of offensive skills for the betterment of the defensive community.
- Craftspersonship, inclusivity, community building, mentorship, menteeship, good vibes 🎵
OSCP | ECPPT | ECPTX | CRTP | CRTO
- 👥ShadowSteal
- 🪐Blue-Jupyter
- 🐞 PMAT
- 🐛 MalAPIReader
- 🦠 Malware Delivery via Notion - LOTS Project: Notion.so | Original Tweet
- 🎯 OffensiveNotion | 🦚 OffensiveNotion Tweet
- 🦀 Experimentation in Rust's Offensive Applications > Rusty Token Manipulation | Rusty Process Injectors | PRs submitted to OffensiveRust
- 👑 MSFVenom Nim shellcode generation support | Merged PR
- 🟡 SharpTokenFinder
- VetSecCon 2020 - Husky vs WannaCry: A Crash Course in Malware RE, Oct 2022
- VetSecCon 2020 - Knowing The Way Broadly: The Craftsperson Mindset, Oct 2022
- DEF CON 615 - The Crown: Exploratory Analysis of Nim Malware, Jan 25th 2022 | Github Repo for the talk
- 📡 Red Team Infrastructure Done Right
- 🎯 We Put A C2 In Your Notetaking App: OffensiveNotion
- 👑 Nim on the Attack: Process Injection Using Nim and the Windows API
- 🔴 Zero-Point Security Red Team Ops 2021 Update
- 💉 DLL Hijacking & DLL Proxying An SNES Emulator
- 🦠 Husky vs. WannaCry: A Crash Course in Malware Reverse-Engineering