Network Administration

Technical Support

Cyber Security

Guardians of the Digital Forest: An Ode to Cybersecurity in the Age of AI

Gen-AI is no longer a fleeting trend—it is a permanent fixture in a technological evolution.

As such, ignoring its implications, whether out of skepticism or apathy, is no longer an option.

We must seek to embrace it.

Are You a Content Creator, Imitator, or Cybersecurity Innovator?

They’re stealing
our identities
and all we got to lose,

No longer
can we sit
and watch the brawl
we gots to choose.

Brute Forcing Secrets, Scenarios, and Situations

If you’re
this reckless,
The question is:
How Safe Is Your Schmooze?

Poetic Reflections Of XXE Injections

If an app
displays an error
but don’t handle
the exception, 

Then we can circumvent
this flaw
and use it
as our weapon.

Advanced XXE Injection- The Blind and CDATA Kind

No denying….
that we must hide
our variables
with filters,

En-code our files
like Jesus did
in parables
through scriptures. 

LFI Through XXE Injection

Can he
dupe it?

Hit the Dark Web
to get a Root Kit,
Searching for a shell
so he can
try and execute it.

Groupies Want Autographs, Hackers Want Email Addresses

But do
we listen?
We upload shows
and we forget,
that to a cyber-criminal
we’re nothing but a lic.

A Quantum Computer Hacking Future

NS Memorandum 10,
“ah, here we go again”,
This war is fought
through hacking
they can’t win this with no pen.

Stay Invisible To Remain Untouchable

So be careful what you share,

So it won’t work against you,

Get skilled in anonymity

And this won’t be an issue.

Bypassing Encoded References: The Hidden Code and How It Can Be Cracked

Some developers mess up
and put their functions on the front,
Forgetting it be hackers just like us who like to hunt.

Answers to Your Questions

What is Grey Hat Developer?

Grey Hat Developer is a company that offers managed IT services. We also offer IT and Cyber-Security training to those who request us to provide it.

Isn’t “Grey Hat” a hacker term?

Yes, that is correct.  While we do embrace the spirit of such term in the sense that we believe that hacking isn’t good nor evil, that isn’t what Grey Hat Developer is about. We see IT and Cyber-Security skills as a viable path for someone to forge a very promising future for themselves. Unfortunately one mishap in someone’s past could derail that person from ever having a career as a White Hat Hacker. But that doesn’t mean that person should turn to the allure of becoming a Black Hat Hacker.  So that’s where that grey area has become a part of our philosophy. We have witnessed Cyber-Security completely change a person’s life around. That fueled us with inspiration and Grey Hat Developer was born.

Will you teach my child to hack?

No. Your child already knows how to hack. 🙂

How do I sign up for training and what do I need?

Signing up is simple. Just contact us and let us know that you’re interested. One of our reps will guide you through the on-boarding process. In most cases, all you’ll need is a solid internet connection, a compatible device, the patience of Job, and the desire to learn.

Are your services expensive, there aren’t any rates listed on any of your products or services?

As mentioned, we understand that everyone’s budget and requirements are unique. At this time there are no “fixed” prices on any of our services. We aim to get a feel for your project as a whole before we throw any numbers in your face. Contact us for a quote on your next project or idea.

Grey Hat Developer

Office

704 W. 15th Street
San Angelo, Tx. 76903

Hours

M-F: 8am - 10pm
Sat. 10am - 3pm

S: Closed

Call Us

(432)212-8959