Known Tools & Technologies
This list contains technologies and principles that I have learned through the years.
The horizon of my knowledge extends further than the following subjects but you get the idea.
You might find the same keyword twice or thrice if said keyword is linked to multiple categories.
Web Development
As a security specialist, back-end is my favorite but I'm also relatively fluent with front-end development.
PHP / Java / C# / Python
RESTful (CRUD+ATOMIC) APIs
Model-View-Controller (MVC)
Laravel, Tomcat/J2EE, IIS, Flask
etc
HTML/CSS
General design
Responsive design
Bootstrap, Elementor, etc.
Javascript/Typescript
Sync / Async
Dynamic content
Data handling
Apache2 / NginX / NodeJS
Server management
On-premise
Cloud
Reverse proxying
Load balancing
Redundancy
Templating
Runtime environment
HTTP/HTTP2/HTTP3
Diffie exchange
Certificate/keypair cryptography
QUIC over UDP ( 0-RTT )
Protocol fuzzing
Weak ciphers exploitation
TLS/SSL
Encryption
Cryptography
MQTT
Publish / Subscribe
Brokers
Limited bandwidth
Hashing
One-way functions
Set reduction
Collisions
Software Development
Malware development and analysis, web-scraping and parsing, and/or reverse-engineering. I don't consider myself a programmer but coding is in my daily routine and I am aware of design patterns, time complexity, and DevOps methodologies.
C# / .NET
Rust
Python
Java
C++
MariaDB - RDBMS
MongoDB - DoDBMS
Redis - IMDBMS
InfluxDB - TSDB
Ghidra / IDA
Kotlin
Android
Micro Controllers (Arduinos, ESP8266, ESP32)
Unity / Unreal Engine
Infrastructure & networking
Development often leads to deployment which lead to system and network administration.
Cisco
Active Directory
Kubernetes
PfSense
Docker
AWS/Azure/Linode/OVH
Terraform
Ansible
Bind9, Hostapd, Dhcpd
Batch & Shell scripting
Forti
VMware ESXI
Carbon Black
Security++
Active Directory
Bloodhound mapping
Offline infrastructure analysis
Weak credentials brute-forcing
Hash dump & hash cracking
Kerberos
Windows exploit development
Cobalt Strike/RAT/Backdoor prevention, detection, and response
YARA
Malware persistence
Binary applications
Buffer overflow
ROP exploitation
Dynamic library hijacking
Software logic exploitation
Dependencies, imports, and services hijacking
Privilege escalation
Web applications
API fuzzing
Broken access control
Cryptographic failures
Injection (HTML, Javascript, SQL, etc)
Insecure deserialization exploitation
Server side request forgery
Cross-site request forgery
Sensitive data exposure
Open redirects
WiFi hacking
WEP,WPA,WPA2,WPA3 personal/enterprise (TKIP-AES-MGT)
RADIUS
WPS attacks
Client/Clientless attacks (Krack, etc)
Evil Twin attacks
Denial Of Service (Fuzzing, spoofing, etc.)
Last updated
Was this helpful?