Pushing the Boundaries

Since 1984


Services offered:

I offer the following services:

  • Cyber Threat Hunting
  • Reverse Engineering
  • Binary Exploitation
  • Malware Analysis
  • Source Code Analysis
  • Host Forensics
  • Network Forensics
  • Network Security Assessment
  • Wireless Security Assessment
  • Web Application Analysis
  • Database Security Analysis
  • Physical Security Assessment

About

 

I am a Cyber Threat Hunter, Reverse Engineer, Ethical Hacker, Software Engineer and CTF Player and have been involved in computer security since 1984. I am a firm believer in sharing information, so I am willing to answer any computer security questions/concerns you might have.

 

Contact