SEEKING WORK
Location: Los Angeles, CA, USA
Remote: Yes, or local to Los Angeles
Willing to relocate: No
Technologies: Python, C/C++, C#, JavaScript, x86 Assembly, YARA, Snort, Bash/zsh, PowerShell, IDA Pro/Hexrays, x64dbg, DNSpy, Cobalt Strike, Impacket, Mythic, Splunk, XWays, Volatility, Wireshark, Burp Suite, Encase, Microsoft Office/GSuite, AWS, Azure, GCP, Kubectl, IceKube, Jenkins, GitHub Actions, Git
Résumé/CV: https://www.mayer.cool/resume.pdf
Email: dan@mayer.cool
SECURITY ENGINEER/SECURITY RESEARCHER/RED TEAM OPERATOR/REVERSE ENGINEER =====================
Howdy, I'm Dan. I currently am employed as SpecterOps, a premier red team consultancy. I execute bespoke offensive security and application security assessments including binary reverse engineering, vulnerability identification, and attack path assessment via kubernetes and active directory abuse.
In my free time I create video game cheats. You may have seen some of my previous blog posts on the top of Hacker News, emphasis on "hacker" [1][2]!
I will say that I am honestly quite happily employed but I still think it is always worth putting my resume out into the aether.
If my skills seem valuable to your organization, please don't hesitate to reach out - I am very interested in/available for contract work as well!
SEEKING WORK
Location: Los Angeles, CA, USA
Remote: Yes, or local to Los Angeles
Willing to relocate: No
Technologies: Python, C/C++, C#, JavaScript, x86 Assembly, YARA, Snort, Bash/zsh, PowerShell, IDA Pro/Hexrays, x64dbg, DNSpy, Cobalt Strike, Impacket, Mythic, Splunk, XWays, Volatility, Wireshark, Burp Suite, Encase, Microsoft Office/GSuite, AWS, Azure, GCP, Kubectl, IceKube, Jenkins, GitHub Actions, Git
Résumé/CV: https://www.mayer.cool/resume.pdf
Email: dan@mayer.cool
SECURITY ENGINEER/SECURITY RESEARCHER/RED TEAM OPERATOR/REVERSE ENGINEER =====================
Howdy, I'm Dan. I currently am employed as SpecterOps, a premier red team consultancy. I execute bespoke offensive security and application security assessments including binary reverse engineering, vulnerability identification, and attack path assessment via kubernetes and active directory abuse.
In my free time I create video game cheats. You may have seen some of my previous blog posts on the top of Hacker News, emphasis on "hacker" [1][2]!
I will say that I am honestly quite happily employed but I still think it is always worth putting my resume out into the aether.
If my skills seem valuable to your organization, please don't hesitate to reach out - I am very interested in/available for contract work as well!
SEEKING WORK
Location: Los Angeles, CA, USA
Remote: Yes, or local to Los Angeles
Willing to relocate: No
Technologies: Python, C/C++, C#, JavaScript, x86 Assembly, YARA, Snort, Bash/zsh, PowerShell, IDA Pro/Hexrays, x64dbg, DNSpy, Cobalt Strike, Impacket, Mythic, Splunk, XWays, Volatility, Wireshark, Burp Suite, Encase, Microsoft Office/GSuite, AWS, Azure, GCP, Kubectl, IceKube, Jenkins, GitHub Actions, Git
Résumé/CV: https://www.mayer.cool/resume.pdf
Email: dan@mayer.cool
SECURITY ENGINEER/SECURITY RESEARCHER/RED TEAM OPERATOR/REVERSE ENGINEER
=====================
Howdy, I'm Dan. I currently am employed as SpecterOps, a premier red team consultancy. I execute bespoke offensive security and application security assessments including binary reverse engineering, vulnerability identification, and attack path assessment via kubernetes and active directory abuse.
In my free time I create video game cheats. You may have seen some of my previous blog posts on the top of Hacker News, emphasis on "hacker" [1][2]!
I will say that I am honestly quite happily employed but I still think it is always worth putting my resume out into the aether.
If my skills seem valuable to your organization, please don't hesitate to reach out - I am very interested in/available for contract work as well!
SEEKING WORK
Location: Los Angeles, CA, USA
Remote: Yes, or local to Los Angeles
Willing to relocate: No
Technologies: Python, C/C++, C#, JavaScript, x86 Assembly, YARA, Snort, Bash/zsh, PowerShell, IDA Pro/Hexrays, x64dbg, DNSpy, Cobalt Strike, Impacket, Mythic, Splunk, XWays, Volatility, Wireshark, Burp Suite, Encase, Microsoft Office/GSuite, AWS, Azure, GCP, Kubectl, IceKube, Jenkins, GitHub Actions, Git
Résumé/CV: https://www.mayer.cool/resume.pdf
Email: dan@mayer.cool
SECURITY ENGINEER/SECURITY RESEARCHER/RED TEAM OPERATOR/REVERSE ENGINEER
=====================
Howdy, I'm Dan. I currently am employed as SpecterOps, a premier red team consultancy. I execute bespoke offensive security and application security assessments including binary reverse engineering, vulnerability identification, and attack path assessment via kubernetes and active directory abuse.
In my free time I create video game cheats. You may have seen some of my previous blog posts on the top of Hacker News, emphasis on "hacker" [1][2]!
I will say that I am honestly quite happily employed but I still think it is always worth putting my resume out into the aether.
If my skills seem valuable to your organization, please don't hesitate to reach out - I am very interested in/available for contract work as well!
Thanks for the tips! I live in the middle of the concrete jungle that is LA so I instead have the kushiest moon-shoes I could find. As for the klondike bar I’ll have to train up my neck :)
SEEKING WORK
Location: Los Angeles, CA, USA
Remote: Yes, or local to Los Angeles
Willing to relocate: No
Technologies: Python, C/C++, C#, JavaScript, x86 Assembly, YARA, Snort, Bash/zsh, PowerShell, IDA Pro/Hexrays, x64dbg, DNSpy, Cobalt Strike, Impacket, Mythic, Splunk, XWays, Volatility, Wireshark, Burp Suite, Encase, Microsoft Office/GSuite, AWS, Azure, GCP, Kubectl, IceKube, Jenkins, GitHub Actions, Git
Résumé/CV: https://www.mayer.cool/resume.pdf
Email: dan@mayer.cool
SECURITY ENGINEER/SECURITY RESEARCHER/RED TEAM OPERATOR/REVERSE ENGINEER
=====================
Howdy, I'm Dan. I currently am employed as SpecterOps, a premier red team consultancy. I execute bespoke offensive security and application security assessments including binary reverse engineering, vulnerability identification, and attack path assessment via kubernetes and active directory abuse.
In my free time I create video game cheats. You may have seen some of my previous blog posts on the top of Hacker News, emphasis on "hacker" [1][2]!
I will say that I am honestly quite happily employed but I still think it is always worth putting my resume out into the aether.
If my skills seem valuable to your organization, please don't hesitate to reach out - I am very interested in contract work as well!
Location: Los Angeles, CA, USA
Remote: Yes, or local to Los Angeles
Willing to relocate: No
Technologies: Python, C/C++, C#, JavaScript, x86 Assembly, YARA, Snort, Bash/zsh, PowerShell, IDA Pro/Hexrays, x64dbg, DNSpy, Cobalt Strike, Impacket, Mythic, Splunk, XWays, Volatility, Wireshark, Burp Suite, Encase, Microsoft Office/GSuite, AWS, Azure, GCP, Kubectl, IceKube, Jenkins, GitHub Actions, Git
Résumé/CV: https://www.mayer.cool/resume.pdf
Email: dan@mayer.cool
SECURITY ENGINEER/SECURITY RESEARCHER/RED TEAM OPERATOR/REVERSE ENGINEER
=====================
Howdy, I'm Dan. I currently am employed as SpecterOps, a premier red team consultancy. I execute bespoke offensive security and application security assessments including binary reverse engineering, vulnerability identification, and attack path assessment via kubernetes and active directory abuse.
In my free time I create video game cheats. You may have seen some of my previous blog posts on the top of Hacker News, emphasis on "hacker" [1][2]!
I will say that I am honestly quite happily employed but I still think it is always worth putting my resume out into the aether.
If my skills seem valuable to your organization, please don't hesitate to reach out - I am very interested in contract work as well!
iMessage automation. I love technologies so ubiquitous that they end up registering in our brain as “real life.”
We spend so much time texting each other that it has become transparent, so one expects a cute little chatbot or small game to show up, and it delights people!
I recently made a framework to allow playing Twine games through iMessage and people really love it:
Another one that brought a lot of joy was hooking up a friend’s iMessage to immediately respond to all messages with a chatbot. It was before ChatGPT came out, so it was just convincing enough to have people for a few messages, but scuffed enough to have some very funny off-kilter responses. It sowed a lot of chaos in our group chats :)