Open Source Intelligence - public information gathering and analysis
Vulnerability exploitation and post-exploitation, lateral movement
WiFi network security testing, WPA2/WPA3, rogue access points
Phishing, vishing, pretexting testing, awareness training
Malicious code analysis, reverse engineering, IoC extraction
Complete APT attack simulations, Purple Team exercises
AWS, Azure, GCP audit, cloud configuration testing
Android/iOS application testing, OWASP Mobile Top 10