An Infosec Research and Development blog:

Security Leader, Security Researcher and Enthusiast. I’m fairly low profile, but share useful info from time to time. I’ve worked in Infosec for over a decade, and have an (ISC)2 CISSP certification. My programming fluency is centered around Python, PHP, C/C++, and x86/x64 assembly. I’ve worked in Healthcare and Higher Education most of my career; the longest time served in Higher Education where I worked at a Law School for a few years and then moved on to yet another higher education entity where I live, and that’s where I remain today. I’ve also been involved (and continue to be involved) in freelance/consulting work as the opportunity arises (This blog has helped considerably in that respect). I will always strive to learn as much as I can surrounding all facets of information Security. Want to see what I’m studying currently? Just keep reading this blog and check out my github! Thanks everyone 😸

The focus on this blog will largely be on offensive security tools and malware research. Outside of the blog, I also share detailed, on-demand video walkthroughs, breaking down tools and concepts shared throughout several of my blog posts via my ko-fi membership. 😸 I also share exclusive content not on my blog via ko-fi.

ko-fi membership offering

You can also find me on X: g3tsyst3m

and on LinkedIn:

Quick caveat here. I like to keep my blog separate from my work identity. However, I also want folks who value and respect the content I produce on this blog to know and connect with the real me if they want. So, here it is, hack the box style! 😸 If you happen to browse my LinkedIn, please connect and shoot me a private message and tell me about yourself, what you think about the blog, etc. I’d like that very much!

6148523063484d364c793933643363756247 6c756132566b61573475593239744c326c75 4c334a76596d4a705a53316a62334a735a58 6b744d6d49784d54517a4d6a6376

As I mentioned earlier. I’m also available to do consultation work and always considering prospective job opportunities. If you have something you would like to collaborate on or interested in discussing work opportunities, please do reach out! The info below can be considered the abridged version of my CV for those interested:

  • Dedicated and results-driven information security leader with 12 years of experience designing and implementing comprehensive cybersecurity strategies in Healthcare and Higher Education. I lead a team of on-site and managed services security engineers, driving proactive threat management / threat detection/monitoring, incident response, and compliance with industry frameworks such as NIST, ISO 27001, and PCI DSS.

  • My expertise spans threat intelligence / threat detection / threat hunting, penetration testing, malware analysis/reverse engineering, and vulnerability / risk assessments. Skilled in leveraging cloud technologies to enhance security architectures, I collaborate seamlessly with key stakeholders to align security initiatives with organizational goals, ensuring resilience in an ever-evolving threat landscape.

  • Certifications: CISSP, CCNA

  • Skills: Python, C/C++, PHP, x86/x64 assembly, JavaScript, Powershell, Application security, Network Security, Security Architecture, Vulnerability Scanning, penetration testing, IDS, IPS, Microsoft DLP, static/dynamic analysis / reverse engineering, Azure, AWS, Elastic SIEM

  • Soft Skills: adaptable to fast paced environments, collaborative, team leader, results oriented, problem solver.

I also contribute to researching software vulnerabilities:

Latest:

(I was among a few other researchers that discovered this Elevation of Privilege vuln with Microsoft’s SDK):

https://msrc.microsoft.com/update-guide/en-US/advisory/CVE-2025-47962

Here’s one for MSI’s software:

https://g3tsyst3m.github.io/cve/msi/Arbitrary-Write-Privilege-Escalation-CVE-2024-50804

Archived: exploit-db.com

Also co-wrote a Metasploit module:

metasploit module

cve link