![]() I also led many security training sessions on different topics such as phishing, physical attacks, malicious mouse, password security, RFID attacks. Python (proxy and IP packet modification with Scapy) JavaScript (development for fiddler and PoC with NodeJS), The download and use of Immunity Debugger is subject to the terms of the Immunity Privacy Policy and the Immunity Debugger License.Privacy Policy and the Immunity. VBA and Powershell (Excel and Word scripting), I developed various internal software in different languages: United-Kingdom: Pentest on various web applications and softwares in C Monaco: Reverse engineering on a software in C Morocco: Reverse engineering on a software in C Switzerland: Reverse engineering on 3 softwares in C, Objective C and Java USA: RedTeam on two different enterprise sites Belgium: Reverse engineering on a software in C RedTeam with phishing campaign and physical intrusion Reverse engineering of binary network protocol ![]() Reverse engineering of compiled software in: Flash, Java, C#, C, C++ Web (WebSphere, Python, PHP, Apache, Tomcat, SharePoint. I performed many pentest in many areas (Aerospace, Internet service provider (ISP), Banking, Research Center, Audio-visual, Cosmetic industry, Department stores, Insurance, Rail transport, Energy. 19Working at NES Security / SERMA NES as Pentester.
0 Comments
Leave a Reply. |