I specialize in building (and designing) awesome digital experiences for the web.
DESIGN & DEVELOPMENT
I love to design and build beautiful responsive websites. Utilizing technologies like React, TypeScript, and Next.js
TRAINING & EDUCATION
I work in education, and currently I work for an organization in Canada, teaching programming to Indigenous, and Marginalized communities.
CYBERSECURITY & DFIR
With comprehensive offensive security and DFIR experience, I provide informative cybersecurity consulting, Malware analysis and data recovery.
A short guide on how to crack protected files.
Prerequisites include a basic understanding of computers and networking in general
New workstation build for the new Intel processors
A Intel x86 based workhorse for your lab.
Books that I've enjoyed, and recommend.
I often get asked, what are the Best books for hacking or programming?
Assembly Language for x86 Processors
Ideal for undergraduate courses...
Assembly Language Step-by-Step
He starts at the very beginning, explaining the basic ideas of programmable computing...
Comprehensive, in-depth introduction to the core Python language ...
React 17 Design Patterns
Build scalable, maintainable, and powerful React web apps with design patterns and insightful best practices...
Build advanced cross-platform projects with React and React Native
Build 12 real-world applications from scratch using React Native
Next.js Quick Start Guide
Learn all you need to know to work with TypeScript, explore modern web application frameworks, and build modular systems...
React and React Native
Fourth Edition of the popular React book, updated to the latest React 18 to help you go from beginner to professional...
Become well-versed with basic networking concepts such as routing, switching, and sub-netting...
C# 10 and .NET 6, Modern Cross-Platform Development
A comprehensive guide for beginners to learn the key concepts, real-world applications, and latest features of C#...
Network+ Certification All-in-One Exam Guide
Mike Meyers exam guide delivers complete coverage of every topic on the N10-008 version of the CompTIA Network+
CompTIA A+ Complete Study Guide
Essential test preparation material for the popular A+ certification...
Metasploit: The Penetration Tester's Guide
The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework...
Hacking : The Art of Exploitation, 2nd Edition
Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective...
Penetration Testing: A Hands-On Introduction to Hacking
Security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques...
zinc Hat Hacking: The Ethical Hacker's Handbook
Explains the enemy's current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-try testing labs
The Hacker Playbook 3
Takes your offensive game to the pro tier. With a combination of new strategies, attacks, exploits, tips and tricks...
The most definitive reference on cryptography ever published and is the seminal work on cryptography...
Automate the Boring Stuff with Python
Learn how to code while you write programs that effortlessly perform useful feats of automation...
Ghidra Software Reverse Engineering for Beginners
Detect potentials bugs in your code or program and develop your own tools using the Ghidra reverse engineering framework developed by the NSA...
Learn Computer Forensics
Get up and running with collecting evidence using forensics best practices to present your findings in judicial or administrative proceedings...
Modern X86 Assembly Language Programming
Gain the fundamentals of x86 64-bit assembly language programming...
Practical Malware Analysis
Practical Malware Analysis will teach you the tools and techniques used by professional analysts...
The Art of Memory Forensics
A step-by-step guide to memory forensics. Beginning with introductory concepts and moving toward the advanced...
The Rootkit Arsenal
The Rootkit Arsenal presents the most accessible, timely, and complete coverage of rootkit technology...
Open Source Intelligence Techniques
It is time to look at OSINT in a different way... take control of our investigative resources and become self-reliant.
The Art of War. Sun Tzu
Sun Tzu is thought to have been a military general and adviser to the king of the southern Chinese state of Wu...
The Red Book of Guerrilla Warfare
This special edition contains the two most important essays by Mao on guerrilla warfare tactics in a new, completely uncensored format...