ABOUT ME

Hi! My name's Jack. πŸ‘‹

I'm a veteran security researcher and threat analyst from Brisbane, Australia. I have a strong passion for reverse engineering, malware analysis, pentesting, and threat-hunting.πŸ’»

 

A bit about me: I'm a security researcher with a passion for reverse engineering, embedded device hacking, and sharing my skills with others.

I work with hardware, software, and everything inbetween! I've long been fascinated with information security and have performed security assessments on a wide range of technologies including aerospace, automotive, telecoms, government, finance, and more.

I also design software and hardware exploit toolkits, analysis tools, and training workshops among other things.

I've worked extensively with NGOs, governments, and private sector to ensure their infrastructure is as secure as possible.

RESEARCH & DEVELOPMENT βš™οΈ

I originally started my foray into exploit development through software licence scheme audits which eventually grew into an interest in WIndows/Linux/iOS/Android system internals.

I've since developed and patented several software and hardware implant solutions, as well as tools for detecting and analyzing malware, as well as gathering attribution information.

DESIGN πŸŽ¨

I spent several years working in publishing, UX, and UI. As a result I have a keen sense of design.

Coupled with a degree in visual arts, and a background in application/web design, I bring a cutting-edge creative flair to all my endeavours.

(You're browsing one right now! πŸ’–)

THREAT ANALYSIS πŸ’€

Ever since I was young, I loved taking things apart to see how they worked. That drive has only grown in intensity and has helped hone my skills as an experienced threat analyst, penetration tester and security auditor.

I feel that by keeping a finger on the pulse to cybersecurity developments I can react faster to emerging threats and neutralize attackers more efficiently

WORKSHOPS πŸ“š

The best part about learning new skills and techniques is getting to pass those skills on to others. I run free OSCP preparation courses, and Intro to Infosec courses for zero cost to individuals. I also offer bespoke, enterprise-grade training solutions and hands-on workshops upon demand.

If you're here to learn more about attending a free workshop, please get in touch via the email listed below.

MY WORK

Some of the projects that I've worked on in any time I get to myself. πŸ”§

SPECIALTIES

My unique areas of strength and confidence. πŸŒŸ

PENETRATION TESTING πŸ‘Ύ

I have over 10 years of experience in penetration testing, GRC, and device auditing. My outside-the-box approach allows me to hit targets that people aren't even aware exist. I have experience with an extremely wide variety of tools, and enjoy the challenge presented by attacking secure computer systems.

WORKSHOPS/MENTORING πŸ«

I love teaching, and sharing my skills with others. I also greatly enjoy harnessing this energy and directing it into running workshops, OSCP prep classes, and employee cybersafety training sessions.

DESIGN AND PUBLISHING βœ

With several years of experience in digital and physical publishing, as well as a degree in art, I have a real love for good design. I believe very strongly in attention to detail and apply this philosophy throughout my all facets of my work.

DEVICE AUDITING πŸ“±

Whether it's a smart cart, smartphone or anything inbetween, I can attack it. I have experience in auditing the security of a wide range of devices from smart cars, to alarm systems, to prototype mobile phones. I love a new challenge, and can often be found dissecting consumer electronics.

OPEN SOURCE SOFTWARE

Free and open source hardware/software projects I've designed. 🧰

KEEYPRO

Hardware-based HID-emulation button array.

bit.do/keeypro 

KEEYPRO is a daisychain-enabled hardware input button array that can be surface mounted to almost any device. It can operate over WiFi, Bluetooth, or USB with an external adapter.

 

It's designed to allow for the mapping of complex HID inputs from devices such as keyboards, or mice to single input buttons.

Complex actions and inputs can be prerecorded to be executed over simulated mouse+keyboard input on the target device.

Multiple KEEYPRO devices can be daisychained together for larger button arrays.

πŸ“¬

Get in touch

πŸ’¬πŸ“‘πŸ”

All Rights Reserved