Consulting
Penetration Testing
Web/Mobile Application Security
OWASP Top 10
Hardware/Embedded Security
IoT Security
Enterprise Network Design/Security
Physical Security
Social Engineering
Infrastructure Security
Programming
Scripting
Automation
Cryptography
Vulnerability Assessment
Exploit Development
Architecture Review
Threat Modeling
Source Code Review
Datasheet Review
Training/Education
Secure Software Development
Malware Analysis
Reverse-Engineeering
Fuzz-testing
Technical Writing
Digital Forensics
PCB Design
Analog/Digital Signal Processing
Firmware Extraction/Analysis
Linux, OS X, Windows, Android, Cisco IOS
Assembly, C/C++, Java, Ruby, PHP
Python, Bash
HTML, CSS, JavaScript, SQL
Git, GitHub, GitLab
Eclipse, IDLE, Android Studio, Xcode
Apache, Rails, .NET, Flask, jQuery, Bootstrap
Arduino, Teensy, Raspberry Pi
EAGLE, LTspice
SDR, GQRX, GNU Radio
UART, JTAG, SPI, I2C, ICSP
Bluetooth/BLE, Zigbee, LoRa, Z-Wave, RF
VMware, Virtualbox
beSTORM, Defensics, Coverity, Protecode
GDB, ADB, OllyDBG, WinDBG, Radare2
TCP/IP, HTTP, HTTPS, SSH, DNS, FTP
Nmap, Wireshark, Metasploit
Burp Suite, Scout Suite, Drozer, Nessus, AppSpider
IDA Pro, Ghidra, Binwalk
Cryptocurrency, Blockchain, Chainlink
Lockpicking