About Grey Hat Developer
When we polled people of a certain demographic, we asked them why they were not taking advantage of free and open resources to educate themselves in the rapidly growing field of IT/Cyber-Security? The response we heard most was that the time needed to train until actually gaining employment is too long and too expensive.
Grey Hat Developer is an organization that provides Free IT/Cyber-security training to ex-felons, adult learners, minorities, and disadvantaged youth. Our mission is simple: To help as many people who feel that they are trapped but who possess the desire and willingness to change, be open to the idea that change can be fostered through learning IT/Cybrary security skills.
We Are An Organization That Trains, Certifies, and Employs.
We Help Clients Get Trained, Get Certified, and Get Working. Its Simple.
How We Got Started
At home in Texas, we noticed a trend. Initially, we noticed that there’s a lot of people with a blemished past who have reformed, rehabilitated, and out of either sheer drive to become their own bosses or being forced to start their own companies due to society not giving them the opportunity to advance themselves beyond positions that pay very low wages (or jobs that may pay high wages but are very labor intensive and require them to spend more time away from their families), these people have managed to start reasonably successful businesses for themselves. The constant variable that we noticed among this demographic was their failure to properly implement the use of IT/Information Systems. These entrepreneurs were lacking something that every business needs to remain competitive, evolve, and remain successful.
We also noticed there was a huge desire among not only convicted felons, but also among minorities (i.e., Blacks, Latinos, etc.) to learn and secure employment in the IT/Cyber-Security fields.
It didn’t take long to consider that this trend is not unique to the Southern state, but also applies to individuals in similar situations across the United States, if not globally. We set out with the vision to bridge the gap between these two demographics. We arm the second group with the knowledge and skills necessary to be employed by the first group. Everybody Wins!
Answers to Your Questions
What is Grey Hat Developer?
Grey Hat Developer is a company that offers managed IT services. We also offer IT and Cyber-Security training to those who request us to provide it.
Isn’t “Grey Hat” a hacker term?
Yes, that is correct. While we do embrace the spirit of such term in the sense that we believe that hacking isn’t good nor evil, that isn’t what Grey Hat Developer is about. We see IT and Cyber-Security skills as a viable path for someone to forge a very promising future for themselves. Unfortunately one mishap in someone’s past could derail that person from ever having a career as a White Hat Hacker. But that doesn’t mean that person should turn to the allure of becoming a Black Hat Hacker. So that’s where that grey area has become a part of our philosophy. We have witnessed Cyber-Security completely change a person’s life around. That fueled us with inspiration and Grey Hat Developer was born.
Will you teach my child to hack?
No. Your child already knows how to hack. 🙂
How do I sign up for training and what do I need?
Signing up is simple. Just contact us and let us know that you’re interested. One of our reps will guide you through the on-boarding process. In most cases, all you’ll need is a solid internet connection, a compatible device, the patience of Job, and the desire to learn.
Are your services expensive, there aren’t any rates listed on any of your products or services?
As mentioned, we understand that everyone’s budget and requirements are unique. At this time there are no “fixed” prices on any of our services. We aim to get a feel for your project as a whole before we throw any numbers in your face. Contact us for a quote on your next project or idea.
Blog / Latest News
Authentication and Authorization Attacks – Part 2
Identify the weaknesses
before they reach production,
Cause IDOR vulnerabilities
Don’t need no introduction.
If a user somehow
can access the pages that’s restricted,
This may lead to the elevation
of that user’s privilege.
Authentication and Authorization Attacks – Part 1
Authentication & Authorization Attacks: Part 112October, 2023Practical Bug Bounty: Authentication & Authorization Attacks- Part 1Photo by Markus Spiske Everything, and we mean absolutely everything on this blog that surrounds the term “hacking” is meant for...
Grinding Towards the PNPT: Windows Privilege Escalation Part 1
Grinding towards the PNPT: Windows Privilege Escalation- Part 131March, 2023Grinding towards the PNPT: Windows Escalation- Part 1Photo by Johny Vino Greetings, Community! In this post we are still traveling the path to reach the goal that we had set earlier last year:...
Grinding Towards the PNPT: Attacking Black Pearl
Grinding towards the PNPT: Attacking Black Pearl26January, 2023Grinding towards the PNPT: Attacking Black Pearl.Photo Creds - Barry Weatherall In this post we are still traveling the path to reach the goal that we had set earlier last year: To obtain the Practical...
Grinding Towards the PNPT: Attacking Dev
Grinding towards the PNPT: Attacking Dev9December, 2022Grinding towards the PNPT: Attacking DevPhoto Creds - Hannah Xu In this post we are still traveling the path to reach the goal that we had set earlier this year: To obtain the Practical Network Penetration Tester...
Penetration Test Report
Internal Penetration Test Report of FindingsTable of Contents Statement of Confidentiality Engagement Contacts Executive Summary Approach Scope Assessment Overview and Recommendations Network Penetration Test Assessment Summary Summary of Findings Internal Network...
Grinding towards the PNPT: Attacking Active Directory
Grinding towards the PNPT: Attacking Active Directory24October, 2022Grinding towards the PNPT: Attacking Active DirectoryPhoto Creds - Schildpaddie and matnapo, respectively. After taking a necessary fork in the road, I found myself chiseling pieces off another goal...
SQLMap and Web Attacks
SQLMap Essentials Web Attacks 13October, 2022 Days 58 - 68 SQLMap and Web Attacks 100 Days of HackingPhoto cred - Ovidiu and campaign_creators, respectively. Once again, we are still grinding along HTB’s Bug Bounty Job Role Path and although SQLMap is used while...
SQL Injection Fundamentals
SQL Injection - Fundamentals26September, 2022Days 55 - 57SQL Injection - Fundamentals100 Days of HackingPhoto Cred --> Caspar_Rubin SQL Injections In this Days of Hacking session, we covered SQL and SQL Injections. To learn more about the subject in depth, please...
Practical Web Application Security
Practical Web Application Security and Testing15September, 2022Days 49 - 54 Practical Web Application Security 100 Days of HackingPhoto cred - Markus Spiske For these Days of Hacking I wanted to take a break from the Bug Bounty Job Role path on HTB and turn my...
Get In Contact With Us
Office
704 W. 15th Street
San Angelo, Tx. 76903
Hours
M-F: 8am - 10pm
Sat. 10am - 3pm
S: Closed
Call Us
(432)212-8959