Iโve participated in various high level complex CTF challenges, some of which landed me interviews at companies that had them as a part of their hiring process such as: โSecurity Innovationโ, โBrainnest Consultingโ, as well as โChip Scanโ.
I also do a bunch of platforms like HackTheBox and TryHackMe, as well as the many 6 that are available on โCanyouhack[.]usโ which was provided by โSecurity Innovationโ.
Iโm also a Pico CTF competitor, and have even done a few high level forensics challenges that involve high level cryptanalysis techniques to decipher hidden data, as well as rebuild, analyze, and compile them.
All of the CTFโs Iโve participated in inspired me to create my own known as โFutabaโs Playgroundโ
- The Hacker Who Laughs ๐ธ๐ธ๐๐๐ธ๐ธ
Collection Tier
This is the final tier for all of my regular patreon content that isn't apart of my mentorship tiers. THERE ARE NO LIMITED SPOTS FOR THIS! It's heavily focused on Cyber Security content and is where my main follower should subscribe if they wish to gain access to highly exclusive content. This will be one of the main tiers I invest a lot of benefits into.
* You get 2 day early access to any and all non-excluisve updates before they are announced on all of my platforms!
* Members of this tier will receive a more advanced version of any and all articles that are released. This means that you get access to exclusive stuff like: exploit guides, videos, including any programming videos if they are set for it that non-patreons won't get.
* Members of this tier will receive 1 additional EXCLUSIVE article on top of the 2 that are set to launch bi-weekly, which will sample some of the main material that will be in my mentorship program when it launches. That way you get to see if you would like the content for it BEFORE you buy it! This includes any and all exploit videos and guides that happen to come with it!
* Members of this tier will receive 1 additional EXCLUSIVE article on top of the 2 that are set to launch bi-weekly, which will sample some of the main material that will be in my mentorship program when it launches. That way you get to see if you would like the content for it BEFORE you buy it! This includes any and all exploit videos and guides that happen to come with it!
* You get access to โlightโ mentorship, where you can ask me any direct questions about the material that is included in this tier. This also includes anything from the FREE material as well! If there is something that you donโt understand, simply message me via discord or LinkedIn and Iโll answer them for you. THIS DOES NOT INCLUDE THE IN DEPTH MENTORSHIP THAT WILL BE APART OF MY MAIN PROGRAM! This is another testing ground to let you see if you like my teaching style BEFORE you join my program.
- The Hacker Who Laughs ๐ธ๐ธ๐๐๐ธ๐ธ
Free Samples
A new version of my FREE samples will be launching soon! There will be a new system, as well as a new mailing list that you will use to gain access!
In order to gain access to it, you will have to review my products!
In order to gain access to it, you will have to review my products!
There will be a total of 5 resources available each month
If you happen to be subscribed to my patreon tier YOU get to vote on which samples get chosen each month based on a poll I will make available!
* You get access to โlightโ mentorship, where you can ask me any direct questions about the material that is included in this tier. This also includes anything from the FREE material as well! If there is something that you donโt understand, simply message me via discord or LinkedIn and Iโll answer them for you. THIS DOES NOT INCLUDE THE IN DEPTH MENTORSHIP THAT WILL BE APART OF MY MAIN PROGRAM! This is another testing ground to let you see if you like my teaching style BEFORE you join my program.
- The Hacker Who Laughs ๐ธ๐ธ๐๐๐ธ๐ธ
Crypto_Malware
I wrote a test sample to demonstrate how ransomware targets and infects a victim system via file enumeration and disk encryption tactics such as RSA and AES encryption.
For this test specifically I am only using RSA encryption.
The code basically creates a directory with a series of files with a bit of sample data in them, creates crypto keys to use for the experiment, enumerates and locates all the root files in the folder, and then handles them via encrypting the files, showing you the cipher text, and then reversing the process to decrypt it in front of you. It even tests the keys by asking you to input data when it launches so that you see the program works.
- The Hacker Who Laughs ๐ธ๐ธ๐๐๐ธ๐ธ
Lan_Turtle
I've always wanted to have one of my rubber ducky scripts write its own code In a cool way, so I figured why not combine that with a LAN turtle.
I'm even working on a version of this that acts as retro malware to disable security systems in place, allowing me to install any backdoor.
- The Hacker Who Laughs ๐ธ๐ธ๐๐๐ธ๐ธ
Man-In-The-Browser
I wrote a Man-In-The-Browser exploit that is able to sit in place via the use of exceptions to monitor and track end user browser sessions to keylog facebook credentials from the end user.
I ran into a HUGE issue during trial and error with the code. Whenever the end user would clickoff off the page, the code would be unable to find the form elements, breaking the code. What I NEED it to do is, when the end user leaves the page, or should they be on the same site but the code canโt find the elements, is for the for loop to break, bringing us back to the main while loop so that the process to check for sites begins again. To get around this I set up an exception handler.
- The Hacker Who Laughs ๐ธ๐ธ๐๐๐ธ๐ธ
TCP_Client
This is a TCP Client that I wrote that connects to a server in a listening state on a victim machine, that can check the OS and version of the system, and then install and run payloads I set based on that, even tools that I might need to pwn the system.
Iโm upgrading this in the future to combine data encryption to mask my network traffic on internal networks to stay hidden for exploits.
- The Hacker Who Laughs ๐ธ๐ธ๐๐๐ธ๐ธ
TCP_Server
This is a TCP Server that I wrote that listens on a victim machine for TCP Client side connections, so that it can interpret and handle any and all shell code commands that are sent by the botmaster.
Iโm upgrading this in the future to combine data encryption to mask my network traffic on internal networks to stay hidden for exploits.
- The Hacker Who Laughs ๐ธ๐ธ๐๐๐ธ๐ธ
Hero_Signal
I designed a custom bash script that makes Kali Linux more accessible to new comers. It's on version 5 but I have a demo version that you can try out here.
You can find that right here on my GitHub
- The Hacker Who Laughs ๐ธ๐ธ๐๐๐ธ๐ธ
SQL_Inject_Script
This is a script that I designed that solves one of โSecurity Innovationsโ first SQL injection based CTFโs.
The script is able to inject a payload into the URL parameter of the web server while pre-loading a cookie session that has been assigned to it, solving the challenge, and storing the results for us in a file, in which we can parse through to check for the flag.
- The Hacker Who Laughs ๐ธ๐ธ๐๐๐ธ๐ธ
Cyber_Portfolio
Self-Taught Cyber Security Professional with a background in Software Engineering, IT Technical Support, Security Engineering, and proficiency in Electrical engineering and Reverse Engineering.
I have a love and passion for offensive security. I reverse engineer various core APIโs and technologies in order to explore and fabricate new ideas that will make my projects come to life.
I use my Software Engineering skills to design custom exploits and penetration testing tools, and CTF servers that demonstrate my Security Engineering skills and ingenious ingenuity.
My Electrical Engineering skills allow me to devise various custom tools such as keyboard injection exploits that manipulate the virtual keyboard API of a system in order to inject payloads and bypass security measures for security testing, some with the ability to write their own code, which I use to extend further C/C++ Win32API and LinuxAPI exploits along with python scripts.
On top of being proficient in C/C++ Iโm also proficient in 13 programming languages in total, my main ones being: C/C++, Python3, Bash, SQL, HTML/CSS/JS, PHP, and of course a bit of Powershell scripting as well.
My IT skills are on par with level 4 tier experience. I use my reverse engineering skills in order to deduce probable causes and solutions for technical problems.
Reverse engineering is my specialty and is how I learn. Given my level of ingenuity, I was allowed to operate above my tier level and demonstrate my skill sets to the fullest and solve lots of complex technical problems at the companies that I worked at, including the infamous Pfizer Pharmaceutical company, which I have thorough documentation of in my research portfolio.
My skill sets wonโt disappoint you! Check out my work and my research. I take pride in what I do as a professional hacker.
- The Hacker Who Laughs ๐ธ๐ธ๐๐๐ธ๐ธ