| Penetration Testing Tools |
- Installed and managed Kali Linux laptops for on premise testing engagements
- Used network analysis tools such as Wireshark, nmap, scapy, Nessus, TestSSL, and mitmproxy
- Used HTTP analysis tools and proxies such as Charles Proxy, BurpSuite, and mitmweb
- Used reverse engineering and binary analysis tools such as binwalk, IDA Pro, Hooper, and Ghidra
- Used fuzzers such as boofuzz and AFL
- Used container analysis tools such as Clair, Trivy, and Anchore
- Created SBOMs using CycloneDX command line tools such as CycloneDX-CLI and Syft
- Used software composition analysis tools such as OWASP Dependency-Track
- Used password cracking software such as John the Ripper and Hashcat
- Used injection tools such as sqlmap
- Used Linux, macOS, and Windows auditing tools such as Lynis and Wynis
|
| Hardware and Wireless Tools |
- Experienced with JTAG and SWD debugging, JTagulator, Immortal Knight DMA PCILeech, Ubertooth One, Yardstick One, HackRF One, GreatFET, Flipper Zero, Chameleon, and HackRF One
|
| Cryptography Software |
- Developed cryptographic libraries and protocols for embedded, real-time, and general-purpose systems
- Utilized WolfSSL, BoringSSL, and OpenSSL
- Implemented AES (GCM, CTR, CBC, CBC-MAC), KP-ABE, and CP-ABE algorithms for various platforms and targets
- Contributed to Charm Crypto, a framework for prototyping cryptosystems
- Contributed to libfenc, a functional encryption library
- Contributed to OpenABE, an attribute-based encryption library
- Contributed to PBC, a pairing-based cryptography library
- Worked with the W3C WebCrypto API, SJCL, and CryptoJS before native crypto support was available in browsers
|
| PKI and KMS |
- Developed PKI process using HSMs such as YubiHSM, Nitrokey HSM, and SafeNet Luna Network HSM (PCIe, USB, and network appliances)
- Developed using KMSs such as HashiCorp Vault, Azure Key Vault, AWS Key Management Service, and Google Cloud Key Management Service
|