Tool I use
Command Lines & Scripting
Bash, Zsh, Powershell, Python, VBScript
Operating Systems
Linux, Windows, Mac OS
Languages I speak
HTML, CSS, Sass, Javascript, PHP, Python
Tools & Libraries
Methodologies:
Agile, Scrum, RAD, Prototype
Software I use
MySQL, Teradata, Microsoft Excel & Access,
Apache Hadoop, Tableau
Languages I speak
Tools I use
Analysing, risk assessing and implementing policies based on an organisation's infrastructure and needs. Consulting with stakeholders and responding with the best practices of applicable security policies and procedures.
Demonstrating how easy it is to hack, track and follow wireless devies using Aircrack-ng, Kismet and Python.
Detecting and analysing Windows and Apache logs for attack patterns determine remediations for these vulnerabilities.
I produced a digital forensics report on an iPhone image whose owner is the accused in a Stamp collection theft.
I performed a penetration test on a fictional company, MegaCorpOne, to determine any vulnerabilities in their systems and provide advice for remediation.
I secured Microsoft Azure services, including VMs and web applications.
Set up containers for privacy with Kasm Workspaces Set up containers for privacy with Kasm Workspaces.
Do you know how to create a strong password? In this post, we'll delve into new concepts you might have yet to consider.
Ever wonder how email spammers get email addresses so easily? Scraping the web for emails is simple, but there are defences.